Previous Topic: Configure the Realm Based Max Failures ParameterNext Topic: Event Redirection


Verify That Attempt Failure Thresholds for OTP and Other Authentication Do Not Aggregate to Lock Out Users

Verify that the separate maximum attempt failure threshold that you have defined for a realm that is configured with OTP authentication is correctly configured.

The following procedure assumes the following conditions:

Follow these steps:

  1. Attempt to access a resource that is secured with OTP authentication using an incorrect password N-1 times.

    The account should not be locked.

  2. Attempt to access a resource that is secured with non-OTP authentication using an incorrect password M-1 times.

    The account should not be locked.

  3. Attempt to access a resource this is secured with OTP authentication using an incorrect password one more time (for a total on N times).

    The account should be locked.

  4. Reenable the locked out account.

You have successfully configured a separate maximum attempt threshold for one-time password authentication.

Expiring Password

Password Expiration

Range: 0 or 30-180 days

Default: 0

Recommended: 90

Complexity Level: Basic

If a security breach does occur because a password becomes known, the breach is immediately closed when the password changes. By requiring your users to periodically change their passwords, you can close any breaches that you don't even know about.

This setting controls how often users must change their passwords.

When a password fully expires, the user is disabled and the configured action taken (email, redirection).

This setting controls the amount of time that can pass between when the user last changed his password (or was created) and when the password must be changed. Related settings, described below, control warnings and grace periods.

For users stored in a Windows NT Directory, Expiration Delay is not honored. APS honors the password expiration date set in the NT User record. Expiration Warning is honored as described below, though it is relative to the expiration date set in the NT user record. Expiration Grace and Grace Logins are not honored for NT users, thus, when an NT user's password expires, that user is immediately disabled.

Password Expiration=90
Password Expiration={@Employees} 60

Note: For users stored in LDAP or ODBC directories, the administrator can modify some of the behavior of APS when doing a password expiration check. Before using this setting, APS will check the user's record for a value for the attribute smapsExpirePasswordDays. If set, APS will use the number of days so specified. This feature should be rarely, if ever, used, since it causes a performance hit and creates maintenance problems. It is intended to override specific users, such as administrators, whose password should never expire.

Expiration Warning

Range: 0-99 days

Default: 0

Recommended: 7

Complexity Level: Basic

When a password expires, the user's access to the system is revoked. It is far user-friendlier to warn the user that their password will expire shortly. This setting determines how long before a password expires should the user be warned.

The warning takes the form of email and/or redirection (which must be configured for this setting to work) occurring each time that the user logs in during this period.

Expiration Warning=7
Expiration Warning={@Customers} 10
Offline Expiration Warning

Range: 0-99 days

Default: 0

Recommended: 7

Complexity Level: Basic

If a user logs in during the Expiration Warning period, defined as the Password Expiration Date less the number of days specified by the Expiration Warning setting above, an event fires and the system takes immediate action (redirection and/or mail sent). However, this process is triggered by an actual authentication attempt.

This setting allows a site to send email warning users of password expiration even if the user does not authenticate. The APSExpire utility will send email to users before their password expires using this setting.

Note that this setting may appear more than once. If so, APSExpire will send the email each time within the period that it is run. Thus, a site can send email 15, 10 and 5 days before the password actually expires.

Offline Expiration Warning=15
Offline Expiration Warning=10
Offline Expiration Warning=5
Expiration Grace

Range: 0-99 days

Default: 0

Recommended: 7-14 days

Complexity Level: Intermediate

Once password expiration is reached, APS no longer treats password changes as optional (it becomes required). How many days after the password expires should APS actually disable the user?

This setting is not honored for users in a Windows NT Domain Directory.

Expiration Grace=30
Expiration Grace={@Employees} 7
Grace Logins

Range: 0-5

Default: 0

Recommended: no

Complexity Level: Advanced

Once password expiration is reached, APS no longer treats password changes as optional (it becomes required). This setting indicates how many times the user will be allowed to login after the password expires and before the user is disabled.

All but the last grace login are optional. The last grace login will not be optional (using the default form and AZRedirect).

If both Grace Logins and Expiration Grace settings are used, the first value to be used up will cause the user to be disabled. In other words, if the Expiration Grace period expires before the user has consumed all of the available Grace Logins, the user is disabled. If all Grace Logins are consumed, the user is disabled, even if the Expiration Grace period has not expired.

Note that the user will be allowed to login when this value is reached. However, if the password is not changed, the next login attempt will cause the user to be disabled.

This setting is not honored for users in a Windows NT Domain Directory.

Grace Logins=3
Grace Logins={@Employees} 2

Account Expiration & Purge

Max Inactivity

Range: 0-365 days

Default: 0

Recommended: 90 days

Complexity Level: Basic

This setting controls the maximum amount of time that can occur between user logins. A user attempting to log into an account that has remained dormant for more than this amount of time will cause the account to become disabled. Thus, an old, dormant account that may have been overlooked will be less of a security threat.

For example, one of your employees leaves the company to join one of your competitors. Your Human Resources department does not notify you of the separation. Since the account remains unused for 30 days (before the employee attempts to reconnect), when the attempt is made, the account is disabled (and, optionally, mail can be sent to the administrator).

By default, this setting is reactive, meaning that the account is not actually disabled until it is used, not when the time limit expires. To be proactive, that is, to have APS disable users (LDAP and ODBC users only) when the account actually expires, use the APSExpire utility.

When APSExpire is used, if the user eventually logs in (after being disabled), APS cannot do special redirection to notify the user that he has been disabled due to inactivity, only that the user is disabled.

If APSExpire is used, then you can send warning mail to expiring users several days before the account actually expires. This functionality is controlled by the Inactivity Warning setting below.

For Windows NT Directories, APS honors the Account Expiration date set in the NT User record rather than this setting.

Max Inactivity=90
Max Inactivity={@Admins} 180

Note: For users stored in LDAP and ODBC directories, the administrator can modify some of the behavior of APS when doing this check. Before using this setting, APS will check the user's record for a value for the attribute smapsAccountInactivityDays. If set, APS will use the number of days so specified. This feature should be rarely, if ever, used, since it causes a performance hit and creates maintenance problems. It is intended to override specific users, such as administrators, that are accessed rarely and should never be disabled due to inactivity.

Inactivity Warning

Range: 0-99 days

Default: 0

Recommended: 7-10 days

Complexity Level: Intermediate

If the APSExpire utility is used, then you can send warning mail to expiring users several days before the account actually expires. This setting controls how long before the user record expires such mail is sent.

The mail may not actually be sent this number of days before expiration, since the APSExpire utility may not run. The utility will generate mail when a user's record will expire within this number of days and such mail has not already been sent.

Since APSExpire can only be used for LDAP or ODBC users, this setting does not apply to users in a Windows NT directory.

Inactivity Warning=5
Inactivity Warning={@Customers} 10
Purge After

Range: 0-730 days

Default: 0

Recommended: 30 days

Complexity Level: Advanced

An account disabled due to inactivity will remain in the User Directory, theoretically forever. The APSAdmin utility will report all users that have been disabled (due to Account Inactivity) for this many days as "eligible for purge". Note that APS will never actually delete a user.

Since APSExpire can only be used for LDAP or ODBC users, this setting does not apply to users in a Windows NT directory.

Purge After=30
Purge After={@Customers} 365