Previous Topic: Failed User Initiated Password Change Results in Incorrect User Status (96197, 99640)Next Topic: OneView Monitor Setting Inadvertently Modified (97421)


User Accounts Incorrectly Disabled (96283)

Valid for password policies configured with Active Directory.

Symptom:

When a password policy was configured with an Active Directory user store that was part of a cluster, unexpected behavior occurred when a user exceeded the maximum number of failed login attempts. SiteMinder disabled the user account instead of locking it.

Solution:

In a clustered Active Directory environment, each member of the cluster has its own failed login count. Until one of the cluster nodes hits the limit, the user is not locked out. For example, if an Active Directory cluster contains three members and each member has a lockout threshold of three failed login attempts, between three through seven failed login attempts can be allowed.

To configure SiteMinder to track failed logins correctly and lock user accounts when user stores are part of an Active Directory cluster

  1. Log into the Policy Server host system.
  2. Do one of the following:
  3. Create the ADLockoutMode registry key with a registry value type of DWORD.

    Value: 1 or 0

    1

    Enables the registry key.

    0

    Disables the registry key.

    If the registry value is zero (0) or does not exist, the default existing behavior is executed.

  4. Do one of the following:
  5. Restart the Policy Server.

STAR Issue: 18593389