Passwords Tab
Use this tab to set up a password policy for the currently selected subtree or user.
Create subtree/user level password policy. The caption of this checkbox reflects whether you opted to create a subtree or user level password policy. Selecting the checkbox adds the attributes required for defining the subtree- or user-level password policy. Once the policy is created, the caption changes to reflect that the existing policy can be modified or deleted. To delete the policy, unselect the checkbox.
User Password Change
User must change password after reset. When selected, users must change their passwords when they first log in or after the administrator resets the passwords.
User may change password. When selected, allows users to change their own passwords.
Allow changes in X day(s). Defines how often users can change their password. Use this value in conjunction with "Keep password history" to discourage users from recycling old passwords.
Keep password history. Specifies that the server keep a list of user passwords. Use this in conjunction with "Allow changes in X day(s)" to discourage users from reusing old passwords. If you select this option, enter the number of passwords users must cycle through before they can reuse a password.
Remember X passwords. If the server is keeping a password history, this option specifies how many old passwords the server should store in the history list. The valid value range is from 1 to 24. The default value is 6.
Password Expiration
Password never expires. Select this if you do not require users to change their passwords periodically.
Password expires after X days. Select this if you want users to change their passwords periodically. If you select the option, in the text box, you must enter the number of days in which the password will expire.
Note that the maximum value for the password age is derived by subtracting January 18, 2038 from today's date. The value you enter must not be set to the maximum value or too close to the maximum value. If you set the value to the maximum value, Directory Server may fail to start because the number of seconds will go past the epoch date. In such an event, the error log will indicate that the password maximum age is invalid. To resolve this problem, you must correct the
paswordMaxAge
attribute value in thedse.ldif
file.A common policy is to have passwords expire every 30 to 90 days. By default, the password maximum age is set to 8640000 seconds (100 days).
Send warning X day(s) before password expires. Indicates the number of days before a user's password is due to expire that the user will be sent a warning message. The valid value range is from 1 to 24,855 days. The default value is 1 day.
Allow up to X attempt(s) after password expires. Indicates the number of grace logins permitted after a user's password has expired. Grace logins are not permitted by default.
Password Syntax
Check password syntax. Select this checkbox to enforce password syntax checking. Syntax checking ensures that the password strings conform to the syntax guidelines, such as minimum password length.
Password minimum length. If syntax checking is on, this option specifies the minimum number of characters that must be used in directory server passwords. The valid value range is from 2 to 512 characters. The default value is 8.
Minimum required digit characters. If syntax checking is on, this option specifies the minimum number of digit characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Minimum required alpha characters. If syntax checking is on, this option specifies the minimum number of alpha characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Minimum required uppercase characters. If syntax checking is on, this option specifies the minimum number of uppercase characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Minimum required lowercase characters. If syntax checking is on, this option specifies the minimum number of lowercase characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Minimum required special characters. If syntax checking is on, this option specifies the minimum number of special characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Minimum required 8-bit characters. If syntax checking is on, this option specifies the minimum number of 8-bit characters that must be used in directory server passwords. The valid value range is from 0 to 64 characters. The default value is 0.
Maximum number of repeated characters. If syntax checking is on, this option specifies the maximum number of repeated characters that is allowed to used in directory server passwords. The valid value range is from 0 to 64 characters. If 0 is set, the server does not check the repeated characters. The default value is 0.
Minimum required character categories. If syntax checking is on, this option specifies the minimum number of character categories that must be used in directory server passwords. The valid value range is from 1 to 5 characters. The default value is 3.
Minimum token length. If syntax checking is on, this option specifies the minimum token length that must be used in directory server passwords. The valid value range is from 1 to 64 characters. The default value is 3.
Password encryption. Identifies how user passwords are stored in the directory. You can specify one of the following encryption formats:
Salted Secure Hashing Algorithm (SSHA). This method is recommended as the most secure. SSHA is the default encryption method.
UNIX crypt algorithm (CRYPT). Provided for compatibility with UNIX passwords.
Secure Hashing Algorithm (SHA, SHA256, SHA384, SHA512). One-way hash algorithms.
No encryption (CLEAR). This encryption type indicates that the password will appear in plain text.
Passwords stored using SSHA, CRYPT, or SHA formats cannot be used for secure login through SASL Digest MD5.