User Level
System Administrator
Only Business Administrators with Person access are allowed to set system-wide password settings.
User LevelSystem Administrator Only Business Administrators with Person access are allowed to set system-wide password settings. SyntaxSet Password
Minsize Clause This clause requires
that all passwords be at least a certain number of characters. To remove a
minimum size password setting, use the keywords Defining a minimum password size of at least 1 ensures that users actually create a password when changing their password. If there is no minimum password size, a user could leave the new password boxes blank when changing passwords, resulting in the user having no password. Maxsize Clause This clause sets an
upper limit on the number of characters a password can contain. To remove a
maximum size password setting, use the keywords For example, to require that users’ passwords are least 6 characters and not more than 15, use:
By default, passwords are limited to 8 significant characters, in which case a password of 12345678xxxx is the same as password 12345678. The number of significant characters can, however, be controlled using the Cipher Clause. Lockout ClauseThe Lockout clause of the Set Password command prevents a user from logging in after entering an incorrect password n number of times during a session. After being locked out, the user’s person definition is changed to “inactive.” The only way for the user to log in again is to contact the Business Administrator to have the setting changed. In the event that all Business Administrators are locked out, it is possible to resort to the use of SQL to access the database. To remove a lockout setting, use the keywords For example, the following command allows the user three tries to provide the correct password:
Expires Clause This clause requires
that users create a new password every n number of days.
After the specified number of days has elapsed, the system requires users to
create a new password to log in. To remove the setting, use the keywords
For example, use the following command if you want users to provide a new password every month:
When you turn on password expiration, passwords that were created prior to version 8 will expire the next time users attempt to log in. If an implementation has the need for wide-spread expiring passwords but also uses “secret agents” that perform work programmatically, you can remove the necessity for updating these kinds of programs for expiring passwords by making the user agent’s password never expire. Allowusername ClauseThis clause allows users to create a password that is the same as their username. This is the default. To prevent users from having the same username and password, use the following:
Allowreuse ClauseThis clause allows users to enter the same password as their old password. This is the default. To prevent users from keeping the same password, use the following:
Mixedalphanumeric Clause This
clause requires that passwords contain at least one number and at least one
letter. To remove the setting, use the keyword Cipher ClauseThis clause specifies the algorithm used to encrypt passwords.
Setting a new cipher for password encryption does not affect existing passwords. That is, only passwords created or changed after the cipher is specified with the above command will be stored using the new encryption algorithm. To make use of the new cipher, existing users must change their password. Business Administrators can include the Expires Clause when setting the cipher to ensure that all users redefine their password. For example: set password cipher ssha expires 1; After the above command is issued, existing user passwords will expire in one day, forcing users to enter a new password. Newly defined passwords will be encrypted using the ssha cipher. Business Administrators can determine which cipher is in use (as well as other
system-wide settings) using the For more information on ciphers, see http://www.openldap.org/faq/data/cache/346.html. Print PasswordYou can use this syntax to print the current global password settings.
The output of this command lists the current settings of each PASSWORD_ITEM. For example: no minimum length no maximum length no consecutive lockout no cumulative lockout no expiration user name allowed reuse allowed mixed alphanumeric not required cipher crypt Encrypt PasswordFor LDAP environments, the following MQL command encrypts a password using the same algorithm used for encrypting the bootstrap file password. encrypt password PASSWORD_STRING After executing the command, MQL outputs the encrypted text string. Copy and paste it to the file or location where you want to save it. |