📄 slapo-ppolicy.5
字号:
.\" $OpenLDAP: pkg/ldap/doc/man/man5/slapo-ppolicy.5,v 1.4.2.7 2007/01/02 21:43:45 kurt Exp $.\" Copyright 2004-2007 The OpenLDAP Foundation All Rights Reserved..\" Copying restrictions apply. See COPYRIGHT/LICENSE..TH SLAPO_PPOLICY 5 "RELEASEDATE" "OpenLDAP LDVERSION".SH NAMEslapo-ppolicy \- Password Policy overlay.SH SYNOPSISETCDIR/slapd.conf.SH DESCRIPTION.LPThe .B ppolicyoverlayis an implementation of the most recent IETF PasswordPolicy proposal for LDAP. When instantiated, it intercepts,decodes and applies specific password policy controls to overalluse of a backend database, changes to user password fields, etc..PThe overlay provides a variety of password control mechanisms. Theyinclude password aging--both minimum and maximum ages, passwordreuse and duplication control, account time-outs, mandatory passwordresets, acceptable password content, and even grace logins.Different groups of users may be associated with different passwordpolicies, and there is no limit to the number of password policiesthat may be created..PNote that some of the policies do not take effect when the operationis performed with the.B rootdnidentity; all the operations, when performed with any other identity,may be subjected to constraints, like access control..SH CONFIGURATIONThese .B slapd.confconfiguration options apply to the ppolicy overlay. They should appearafter the.B overlaydirective..TP.B ppolicy_default <policyDN>Specify the DN of the pwdPolicy object to use when no specific policy isset on a given user's entry. If there is no specific policy for an entryand no default is given, then no policies will be enforced..TP.B ppolicy_hash_cleartextSpecify that cleartext passwords present in Add and Modify requests shouldbe hashed before being stored in the database. This violates the X.500/LDAPinformation model, but may be needed to compensate for LDAP clients thatdon't use the Password Modify extended operation to manage passwords. Itis recommended that when this option is used that compare, search, andread access be denied to all directory users. .TP.B ppolicy_use_lockoutA client will always receive an LDAP.B InvalidCredentialsresponse whenBinding to a locked account. By default, when a Password Policy controlwas provided on the Bind request, a Password Policy response will beincluded with no special error code set. This option changes thePassword Policy response to include the.B AccountLockederror code. Notethat sending the.B AccountLockederror code provides useful informationto an attacker; sites that are sensitive to security issues should notenable this option..SH OBJECT CLASSThe .B ppolicyoverlay depends on the.B pwdPolicyobject class. The definition of that class is as follows:.LP.RS 4( 1.3.6.1.4.1.42.2.27.8.2.1 NAME 'pwdPolicy' AUXILIARY SUP top MUST ( pwdAttribute ) MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheckQuality $ pwdMinLength $ pwdExpireWarning $ pwdGraceAuthnLimit $ pwdLockout $ pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $ pwdMustChange $ pwdAllowUserChange $ pwdSafeModify ) ).REThis implementation also provides an additional.B pwdPolicyCheckerobjectclass, used for password quality checking (see below)..LP.RS 4( 1.3.6.1.4.1.4754.2.99.1 NAME 'pwdPolicyChecker' AUXILIARY SUP top MAY ( pwdCheckModule ) ).RE.PEvery account that should be subject to password policy control shouldhave a.BpwdPolicySubentryattribute containing the DN of a valid.B pwdPolicyentry, or they can simply use the configured default.In this way different users may be managed according todifferent policies..SH OBJECT CLASS ATTRIBUTES.PEach one of the sections below details the meaning and use of a particularattribute of this.B pwdPolicyobject class..P.B pwdAttribute.PThis attribute contains the name of the attribute to which the passwordpolicy is applied. For example, the password policy may be appliedto the.B userPasswordattribute..PNote: in this implementation, the onlyvalue accepted for.B pwdAttributeis.IR " userPassword "..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.1 NAME 'pwdAttribute' EQUALITY objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 ).RE.B pwdMinAge.PThis attribute contains the number of seconds that must elapsebetween modifications allowed to the password. If this attributeis not present, zero seconds is assumed (i.e. the password may bemodified whenever and however often is desired)..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.2 NAME 'pwdMinAge' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdMaxAge.PThis attribute contains the number of seconds after which a modifiedpassword will expire. If this attribute is not present, or if itsvalue is zero (0), then passwords will not expire..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.3 NAME 'pwdMaxAge' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdInHistory.PThis attribute is used to specify the maximum number of usedpasswords that will be stored in the.B pwdHistoryattribute. If the.B pwdInHistoryattribute is not present, or if its value iszero (0), used passwords will not be stored in.B pwdHistoryand thus any previously-used password may be reused.No history checking occurs if the password is being modified by the.BR rootdn ,although the password is saved in the history..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.4 NAME 'pwdInHistory' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdCheckQuality.PThis attribute indicates if and how password syntax will be checkedwhile a password is being modified or added. If this attribute isnot present, or its value is zero (0), no syntax checking will bedone. If its value is one (1), the server will check the syntax,and if the server is unable to check the syntax,whether due to a client-side hashed password or some other reason,it will beaccepted. If its value is two (2), the server will check the syntax,and if the server is unable to check the syntax it will return anerror refusing the password..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.5 NAME 'pwdCheckQuality' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdMinLength.PWhen syntax checking is enabled(see also the.B pwdCheckQualityattribute), this attribute contains the minimumnumber of characters that will be accepted in a password. If thisattribute is not present, minimum password length is notenforced. If the server is unable to check the length of the password,whether due to a client-side hashed password or some other reason,the server will, depending on thevalue of.BR pwdCheckQuality ,either accept the passwordwithout checking it (if.B pwdCheckQualityis zero (0) or one (1)) or refuse it (if.B pwdCheckQualityis two (2))..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.6 NAME 'pwdMinLength' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdExpireWarning.PThis attribute contains the maximum number of seconds before apassword is due to expire that expiration warning messages will bereturned to a user who is authenticating to the directory.If this attribute is notpresent, or if the value is zero (0), no warnings will be sent..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.7 NAME 'pwdExpireWarning' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdGraceAuthnLimit.PThis attribute contains the number of times that an expired passwordmay be used to authenticate a user to the directory. If thisattribute is not present or if its value is zero (0), users withexpired passwords will not be allowed to authenticate to thedirectory..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.8 NAME 'pwdGraceAuthnLimit' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdLockout.PThis attribute specifies the action that should be takenby the directory when a user has made a number of failed attemptsto authenticate to the directory. If.B pwdLockoutis set (its value is "TRUE"), the user will not be allowed toattempt to authenticate to the directory after there have been aspecified number of consecutive failed bind attempts. The maximumnumber of consecutive failed bind attempts allowed is specified bythe.B pwdMaxFailureattribute. If.B pwdLockoutis not present, or if its value is "FALSE", the password may beused to authenticate no matter how many consecutive failed bindattempts have been made..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.9 NAME 'pwdLockout' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE ).RE.B pwdLockoutDuration.PThis attribute contains the number of seconds duringwhich the password cannot be used to authenticate theuser to the directory due to too many consecutive failedbind attempts.(See also.B pwdLockoutand.BR pwdMaxFailure .)If.B pwdLockoutDurationis not present, or if its value is zero (0), the passwordcannot be used to authenticate the user to the directoryagain until it is reset by an administrator..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.10 NAME 'pwdLockoutDuration' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdMaxFailure.PThis attribute contains the number of consecutive failed bindattempts after which the password may not be used to authenticatea user to the directory.If.B pwdMaxFailureis not present, or its value is zero (0), then a user willbe allowed to continue to attempt to authenticate tothe directory, no matter how many consecutive failed bind attempts have occurred with that user's DN.(See also.B pwdLockoutand.BR pwdLockoutDuration .).LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.11 NAME 'pwdMaxFailure' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdFailureCountInterval.PThis attribute contains the number of seconds after which oldconsecutive failed bind attempts are purged from the failure counter,even though no successful authentication has occurred.If.B pwdFailureCountIntervalis not present, or its value is zero (0), the failurecounter will only be reset by a successful authentication..LP.RS 4( 1.3.6.1.4.1.42.2.27.8.1.12 NAME 'pwdFailureCountInterval' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ).RE.B pwdMustChange.PThis attribute specifies whether users must change their passwordswhen they first bind to the directory after a password is set orreset by the administrator, or not. If.B pwdMustChangehas a value of "TRUE", users must change their passwords when theyfirst bind to the directory after a password is set or reset bythe administrator. If.B pwdMustChangeis not present, or its value is "FALSE",
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -