define a number of password management rules, as well as
requirements for authentication processing.
ds-cfg-password-policy
ds-cfg-authentication-policy
org.opends.server.core.PasswordPolicyFactory
Specifies the attribute type used to hold user passwords.
This attribute type must be defined in the server schema, and it
must have either the user password or auth password syntax.
ds-cfg-password-attribute
Specifies the names of the password storage schemes that are used
to encode clear-text passwords for this password policy.
The referenced password storage schemes must be enabled.
ds-cfg-default-password-storage-scheme
Specifies the names of the password storage schemes that are
considered deprecated for this password policy.
If a user with this password policy authenticates to the server
and his/her password is encoded with a deprecated scheme, those
values are removed and replaced with values encoded using the
default password storage scheme(s).
The referenced password storage schemes must be enabled.
ds-cfg-deprecated-password-storage-scheme
Specifies the names of the password validators that are used
with the associated password storage scheme.
The password validators are invoked when a user attempts to provide
a new password, to determine whether the new password is acceptable.
The referenced password validators must be enabled.
ds-cfg-password-validator
Specifies the names of the account status notification handlers
that are used with the associated password storage scheme.
The referenced account status notification handlers must be
enabled.
ds-cfg-account-status-notification-handler
Indicates whether users can change their own
passwords.
This check is made in addition to access control evaluation.
Both must allow the password change for it to occur.
true
ds-cfg-allow-user-password-changes
Indicates whether user password changes must use
the password modify extended operation and must include the user's
current password before the change is allowed.
false
ds-cfg-password-change-requires-current-password
Indicates whether users are forced to change their passwords
upon first authenticating to the directory server after their
account has been created.
false
ds-cfg-force-change-on-add
Indicates whether users are forced to change their passwords
if they are reset by an administrator.
For this purpose, anyone with permission to change a given user's
password other than that user is considered an administrator.
false
ds-cfg-force-change-on-reset
Indicates whether passwords set by administrators are allowed
to bypass the password validation process that is required
for user password changes.
false
ds-cfg-skip-validation-for-administrators
Specifies the name of the password generator that is used
with the associated password policy.
This is used in conjunction with the password modify extended
operation to generate a new password for a user when none was
provided in the request.
The referenced password generator must be enabled.
ds-cfg-password-generator
Indicates whether users with the associated password policy are
required to authenticate in a secure manner.
This might mean either using a secure communication channel
between the client and the server, or using a SASL mechanism that
does not expose the credentials.
false
ds-cfg-require-secure-authentication
Indicates whether users with the associated password policy are
required to change their password in a secure manner that does
not expose the credentials.
false
ds-cfg-require-secure-password-changes
Indicates whether user entries can have multiple
distinct values for the password attribute.
This is potentially dangerous because many mechanisms used to
change the password do not work well with such a configuration. If
multiple password values are allowed, then any of them can be used
to authenticate, and they are all subject to the same policy
constraints.
false
ds-cfg-allow-multiple-password-values
Indicates whether users can change their passwords
by providing a pre-encoded value.
This can cause a security risk because the clear-text version of
the password is not known and therefore validation checks cannot
be applied to it.
false
ds-cfg-allow-pre-encoded-passwords
Specifies the minimum length of time after a
password change before the user is allowed to change the
password again.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. This setting can
be used to prevent users from changing their passwords repeatedly
over a short period of time to flush an old password from the
history so that it can be re-used.
0 seconds
ds-cfg-min-password-age
Specifies the maximum length of time that a user can continue
using the same password before it must be changed (that is, the
password expiration interval).
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds disables password expiration.
0 seconds
ds-cfg-max-password-age
Specifies the maximum length of time that users have to change
passwords after they have been reset by an administrator before
they become locked.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds disables this feature.
0 seconds
ds-cfg-max-password-reset-age
Specifies the maximum length of time before a user's password
actually expires that the server begins to include warning
notifications in bind responses for that user.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds disables the warning interval.
5 days
ds-cfg-password-expiration-warning-interval
Indicates whether the directory server allows a user's
password to expire even if that user has never seen an expiration
warning notification.
If this property is true, accounts always expire when the
expiration time arrives. If this property is false or disabled, the user
always receives at least one warning notification, and the
password expiration is set to the warning time plus the
warning interval.
false
ds-cfg-expire-passwords-without-warning
Indicates whether a user whose password is expired is still
allowed to change that password using the password modify extended
operation.
false
ds-cfg-allow-expired-password-changes
Specifies the number of grace logins that a user is allowed
after the account has expired to allow that user to choose a new
password.
A value of 0 indicates that no grace logins are allowed.
0
ds-cfg-grace-login-count
Specifies the maximum number of authentication failures that a
user is allowed before the account is locked out.
A value of 0 indicates that accounts are never locked out
due to failed attempts.
0
ds-cfg-lockout-failure-count
Specifies the length of time that an account is locked
after too many authentication failures.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds indicates that the account must remain locked until an
administrator resets the password.
0 seconds
ds-cfg-lockout-duration
Specifies the length of time before an
authentication failure is no longer counted against a user for the
purposes of account lockout.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds indicates that the authentication failures must never
expire. The failure count is always cleared upon a successful
authentication.
0 seconds
ds-cfg-lockout-failure-expiration-interval
Specifies the time by which all users with the associated password
policy must change their passwords.
The value is expressed in a generalized time format. If
this time is equal to the current time or is in the past, then all
users are required to change their passwords immediately. The
behavior of the server in this mode is identical to the
behavior observed when users are forced to change their passwords
after an administrative reset.
.*
STRING
A valid timestamp in generalized time form (for example,
a value of "20070409185811Z" indicates a value of April 9,
2007 at 6:58:11 pm GMT).
ds-cfg-require-change-by-time
Specifies the name or OID of the attribute type that is
used to hold the last login time for users with the associated
password policy.
This attribute type must be defined in the directory server schema
and must either be defined as an operational attribute or must be
allowed by the set of objectClasses for all users with the
associated password policy.
ds-cfg-last-login-time-attribute
Specifies the format string that is used to generate the
last login time value for users with the associated password
policy.
This format string conforms to the syntax described in the
API documentation for the java.text.SimpleDateFormat class.
.*
STRING
Any valid format string that can be used with the
java.text.SimpleDateFormat class.
ds-cfg-last-login-time-format
Specifies the format string(s) that might have been used with the
last login time at any point in the past for users associated with
the password policy.
These values are used to make it possible to parse previous
values, but are not used to set new values. The format
strings conform to the syntax described in the API
documentation for the java.text.SimpleDateFormat class.
.*
STRING
Any valid format string that can be used with the
java.text.SimpleDateFormat class.
ds-cfg-previous-last-login-time-format
Specifies the maximum length of time that an account may remain
idle (that is, the associated user does not authenticate to the
server) before that user is locked out.
The value of this attribute is an integer followed by a
unit of seconds, minutes, hours, days, or weeks. A value of 0
seconds indicates that idle accounts are not automatically
locked out. This feature is available only if the last login
time is maintained.
0 seconds
ds-cfg-idle-lockout-interval
Specifies how the server deals with the inability to update
password policy state information during an authentication
attempt.
In particular, this property can be used to control whether an otherwise
successful bind operation fails if a failure occurs while
attempting to update password policy state information (for example, to
clear a record of previous authentication failures or to update
the last login time). It can also be used to control whether to
reject a bind request if it is known ahead of time that it will not be
possible to update the authentication failure times in the event of an
unsuccessful bind attempt (for example, if the backend writability mode
is disabled).
reactive
If a bind attempt would otherwise be successful, then do not
reject it if a problem occurs while attempting to update the
password policy state information for the user.
Even if a bind attempt would otherwise be successful, reject
it if a problem occurs while attempting to update the
password policy state information for the user.
Proactively reject any bind attempt if it is known ahead of
time that it would not be possible to update the user's
password policy state information.
ds-cfg-state-update-failure-policy
Specifies the maximum number of former passwords to maintain in
the password history.
When choosing a new password, the proposed password is
checked to ensure that it does not match the current password, nor
any other password in the history list. A value of zero indicates
that either no password history is to be maintained (if the
password history duration has a value of zero seconds), or that
there is no maximum number of passwords to maintain in the history
(if the password history duration has a value greater than zero
seconds).
0
ds-cfg-password-history-count
Specifies the maximum length of time that passwords remain
in the password history.
When choosing a new password, the proposed password is
checked to ensure that it does not match the current password, nor
any other password in the history list. A value of zero seconds
indicates that either no password history is to be maintained (if
the password history count has a value of zero), or that there is
no maximum duration for passwords in the history (if the password
history count has a value greater than zero).
0 seconds
ds-cfg-password-history-duration