9 |
- |
1 |
# $OpenLDAP$
|
4 |
- |
2 |
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
|
3 |
##
|
9 |
- |
4 |
## Copyright 2004-2014 The OpenLDAP Foundation.
|
4 |
- |
5 |
## All rights reserved.
|
|
|
6 |
##
|
|
|
7 |
## Redistribution and use in source and binary forms, with or without
|
|
|
8 |
## modification, are permitted only as authorized by the OpenLDAP
|
|
|
9 |
## Public License.
|
|
|
10 |
##
|
|
|
11 |
## A copy of this license is available in the file LICENSE in the
|
|
|
12 |
## top-level directory of the distribution or, alternatively, at
|
|
|
13 |
## <http://www.OpenLDAP.org/license.html>.
|
|
|
14 |
#
|
|
|
15 |
## Portions Copyright (C) The Internet Society (2004).
|
|
|
16 |
## Please see full copyright statement below.
|
|
|
17 |
|
|
|
18 |
# Definitions from Draft behera-ldap-password-policy-07 (a work in progress)
|
|
|
19 |
# Password Policy for LDAP Directories
|
|
|
20 |
# With extensions from Hewlett-Packard:
|
|
|
21 |
# pwdCheckModule etc.
|
|
|
22 |
|
|
|
23 |
# Contents of this file are subject to change (including deletion)
|
|
|
24 |
# without notice.
|
|
|
25 |
#
|
|
|
26 |
# Not recommended for production use!
|
|
|
27 |
# Use with extreme caution!
|
|
|
28 |
|
|
|
29 |
#Network Working Group J. Sermersheim
|
|
|
30 |
#Internet-Draft Novell, Inc
|
|
|
31 |
#Expires: April 24, 2005 L. Poitou
|
|
|
32 |
# Sun Microsystems
|
|
|
33 |
# October 24, 2004
|
|
|
34 |
#
|
|
|
35 |
#
|
|
|
36 |
# Password Policy for LDAP Directories
|
|
|
37 |
# draft-behera-ldap-password-policy-08.txt
|
|
|
38 |
#
|
|
|
39 |
#Status of this Memo
|
|
|
40 |
#
|
|
|
41 |
# This document is an Internet-Draft and is subject to all provisions
|
|
|
42 |
# of section 3 of RFC 3667. By submitting this Internet-Draft, each
|
|
|
43 |
# author represents that any applicable patent or other IPR claims of
|
|
|
44 |
# which he or she is aware have been or will be disclosed, and any of
|
|
|
45 |
# which he or she become aware will be disclosed, in accordance with
|
|
|
46 |
# RFC 3668.
|
|
|
47 |
#
|
|
|
48 |
# Internet-Drafts are working documents of the Internet Engineering
|
|
|
49 |
# Task Force (IETF), its areas, and its working groups. Note that
|
|
|
50 |
# other groups may also distribute working documents as
|
|
|
51 |
# Internet-Drafts.
|
|
|
52 |
#
|
|
|
53 |
# Internet-Drafts are draft documents valid for a maximum of six months
|
|
|
54 |
# and may be updated, replaced, or obsoleted by other documents at any
|
|
|
55 |
# time. It is inappropriate to use Internet-Drafts as reference
|
|
|
56 |
# material or to cite them other than as "work in progress."
|
|
|
57 |
#
|
|
|
58 |
# The list of current Internet-Drafts can be accessed at
|
|
|
59 |
# http://www.ietf.org/ietf/1id-abstracts.txt.
|
|
|
60 |
#
|
|
|
61 |
# The list of Internet-Draft Shadow Directories can be accessed at
|
|
|
62 |
# http://www.ietf.org/shadow.html.
|
|
|
63 |
#
|
|
|
64 |
# This Internet-Draft will expire on April 24, 2005.
|
|
|
65 |
#
|
|
|
66 |
#Copyright Notice
|
|
|
67 |
#
|
|
|
68 |
# Copyright (C) The Internet Society (2004).
|
|
|
69 |
#
|
|
|
70 |
#Abstract
|
|
|
71 |
#
|
|
|
72 |
# Password policy as described in this document is a set of rules that
|
|
|
73 |
# controls how passwords are used and administered in Lightweight
|
|
|
74 |
# Directory Access Protocol (LDAP) based directories. In order to
|
|
|
75 |
# improve the security of LDAP directories and make it difficult for
|
|
|
76 |
# password cracking programs to break into directories, it is desirable
|
|
|
77 |
# to enforce a set of rules on password usage. These rules are made to
|
|
|
78 |
#
|
|
|
79 |
# [trimmed]
|
|
|
80 |
#
|
|
|
81 |
#5. Schema used for Password Policy
|
|
|
82 |
#
|
|
|
83 |
# The schema elements defined here fall into two general categories. A
|
|
|
84 |
# password policy object class is defined which contains a set of
|
|
|
85 |
# administrative password policy attributes, and a set of operational
|
|
|
86 |
# attributes are defined that hold general password policy state
|
|
|
87 |
# information for each user.
|
|
|
88 |
#
|
|
|
89 |
#5.2 Attribute Types used in the pwdPolicy ObjectClass
|
|
|
90 |
#
|
|
|
91 |
# Following are the attribute types used by the pwdPolicy object class.
|
|
|
92 |
#
|
|
|
93 |
#5.2.1 pwdAttribute
|
|
|
94 |
#
|
|
|
95 |
# This holds the name of the attribute to which the password policy is
|
|
|
96 |
# applied. For example, the password policy may be applied to the
|
|
|
97 |
# userPassword attribute.
|
|
|
98 |
|
|
|
99 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.1
|
|
|
100 |
NAME 'pwdAttribute'
|
|
|
101 |
EQUALITY objectIdentifierMatch
|
|
|
102 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
|
|
103 |
|
|
|
104 |
#5.2.2 pwdMinAge
|
|
|
105 |
#
|
|
|
106 |
# This attribute holds the number of seconds that must elapse between
|
|
|
107 |
# modifications to the password. If this attribute is not present, 0
|
|
|
108 |
# seconds is assumed.
|
|
|
109 |
|
|
|
110 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.2
|
|
|
111 |
NAME 'pwdMinAge'
|
|
|
112 |
EQUALITY integerMatch
|
34 |
- |
113 |
ORDERING integerOrderingMatch
|
4 |
- |
114 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
115 |
SINGLE-VALUE )
|
|
|
116 |
|
|
|
117 |
#5.2.3 pwdMaxAge
|
|
|
118 |
#
|
|
|
119 |
# This attribute holds the number of seconds after which a modified
|
|
|
120 |
# password will expire.
|
|
|
121 |
#
|
|
|
122 |
# If this attribute is not present, or if the value is 0 the password
|
|
|
123 |
# does not expire. If not 0, the value must be greater than or equal
|
|
|
124 |
# to the value of the pwdMinAge.
|
|
|
125 |
|
|
|
126 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.3
|
|
|
127 |
NAME 'pwdMaxAge'
|
|
|
128 |
EQUALITY integerMatch
|
34 |
- |
129 |
ORDERING integerOrderingMatch
|
4 |
- |
130 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
131 |
SINGLE-VALUE )
|
|
|
132 |
|
|
|
133 |
#5.2.4 pwdInHistory
|
|
|
134 |
#
|
|
|
135 |
# This attribute specifies the maximum number of used passwords stored
|
|
|
136 |
# in the pwdHistory attribute.
|
|
|
137 |
#
|
|
|
138 |
# If this attribute is not present, or if the value is 0, used
|
|
|
139 |
# passwords are not stored in the pwdHistory attribute and thus may be
|
|
|
140 |
# reused.
|
|
|
141 |
|
|
|
142 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.4
|
|
|
143 |
NAME 'pwdInHistory'
|
|
|
144 |
EQUALITY integerMatch
|
34 |
- |
145 |
ORDERING integerOrderingMatch
|
4 |
- |
146 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
147 |
SINGLE-VALUE )
|
|
|
148 |
|
|
|
149 |
#5.2.5 pwdCheckQuality
|
|
|
150 |
#
|
|
|
151 |
# {TODO: Consider changing the syntax to OID. Each OID will list a
|
|
|
152 |
# quality rule (like min len, # of special characters, etc). These
|
|
|
153 |
# rules can be specified outsid ethis document.}
|
|
|
154 |
#
|
|
|
155 |
# {TODO: Note that even though this is meant to be a check that happens
|
|
|
156 |
# during password modification, it may also be allowed to happen during
|
|
|
157 |
# authN. This is useful for situations where the password is encrypted
|
|
|
158 |
# when modified, but decrypted when used to authN.}
|
|
|
159 |
#
|
|
|
160 |
# This attribute indicates how the password quality will be verified
|
|
|
161 |
# while being modified or added. If this attribute is not present, or
|
|
|
162 |
# if the value is '0', quality checking will not be enforced. A value
|
|
|
163 |
# of '1' indicates that the server will check the quality, and if the
|
|
|
164 |
# server is unable to check it (due to a hashed password or other
|
|
|
165 |
# reasons) it will be accepted. A value of '2' indicates that the
|
|
|
166 |
# server will check the quality, and if the server is unable to verify
|
|
|
167 |
# it, it will return an error refusing the password.
|
|
|
168 |
|
|
|
169 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.5
|
|
|
170 |
NAME 'pwdCheckQuality'
|
|
|
171 |
EQUALITY integerMatch
|
34 |
- |
172 |
ORDERING integerOrderingMatch
|
4 |
- |
173 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
174 |
SINGLE-VALUE )
|
|
|
175 |
|
|
|
176 |
#5.2.6 pwdMinLength
|
|
|
177 |
#
|
|
|
178 |
# When quality checking is enabled, this attribute holds the minimum
|
|
|
179 |
# number of characters that must be used in a password. If this
|
|
|
180 |
# attribute is not present, no minimum password length will be
|
|
|
181 |
# enforced. If the server is unable to check the length (due to a
|
|
|
182 |
# hashed password or otherwise), the server will, depending on the
|
|
|
183 |
# value of the pwdCheckQuality attribute, either accept the password
|
|
|
184 |
# without checking it ('0' or '1') or refuse it ('2').
|
|
|
185 |
|
|
|
186 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.6
|
|
|
187 |
NAME 'pwdMinLength'
|
|
|
188 |
EQUALITY integerMatch
|
34 |
- |
189 |
ORDERING integerOrderingMatch
|
4 |
- |
190 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
191 |
SINGLE-VALUE )
|
|
|
192 |
|
|
|
193 |
#5.2.7 pwdExpireWarning
|
|
|
194 |
#
|
|
|
195 |
# This attribute specifies the maximum number of seconds before a
|
|
|
196 |
# password is due to expire that expiration warning messages will be
|
|
|
197 |
# returned to an authenticating user.
|
|
|
198 |
#
|
|
|
199 |
# If this attribute is not present, or if the value is 0 no warnings
|
|
|
200 |
# will be returned. If not 0, the value must be smaller than the value
|
|
|
201 |
# of the pwdMaxAge attribute.
|
|
|
202 |
|
|
|
203 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.7
|
|
|
204 |
NAME 'pwdExpireWarning'
|
|
|
205 |
EQUALITY integerMatch
|
34 |
- |
206 |
ORDERING integerOrderingMatch
|
4 |
- |
207 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
208 |
SINGLE-VALUE )
|
|
|
209 |
|
|
|
210 |
#5.2.8 pwdGraceAuthNLimit
|
|
|
211 |
#
|
|
|
212 |
# This attribute specifies the number of times an expired password can
|
|
|
213 |
# be used to authenticate. If this attribute is not present or if the
|
|
|
214 |
# value is 0, authentication will fail.
|
|
|
215 |
|
|
|
216 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.8
|
|
|
217 |
NAME 'pwdGraceAuthNLimit'
|
|
|
218 |
EQUALITY integerMatch
|
34 |
- |
219 |
ORDERING integerOrderingMatch
|
4 |
- |
220 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
221 |
SINGLE-VALUE )
|
|
|
222 |
|
|
|
223 |
#5.2.9 pwdLockout
|
|
|
224 |
#
|
|
|
225 |
# This attribute indicates, when its value is "TRUE", that the password
|
|
|
226 |
# may not be used to authenticate after a specified number of
|
|
|
227 |
# consecutive failed bind attempts. The maximum number of consecutive
|
|
|
228 |
# failed bind attempts is specified in pwdMaxFailure.
|
|
|
229 |
#
|
|
|
230 |
# If this attribute is not present, or if the value is "FALSE", the
|
|
|
231 |
# password may be used to authenticate when the number of failed bind
|
|
|
232 |
# attempts has been reached.
|
|
|
233 |
|
|
|
234 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.9
|
|
|
235 |
NAME 'pwdLockout'
|
|
|
236 |
EQUALITY booleanMatch
|
|
|
237 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
|
|
238 |
SINGLE-VALUE )
|
|
|
239 |
|
|
|
240 |
#5.2.10 pwdLockoutDuration
|
|
|
241 |
#
|
|
|
242 |
# This attribute holds the number of seconds that the password cannot
|
|
|
243 |
# be used to authenticate due to too many failed bind attempts. If
|
|
|
244 |
# this attribute is not present, or if the value is 0 the password
|
|
|
245 |
# cannot be used to authenticate until reset by a password
|
|
|
246 |
# administrator.
|
|
|
247 |
|
|
|
248 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.10
|
|
|
249 |
NAME 'pwdLockoutDuration'
|
|
|
250 |
EQUALITY integerMatch
|
34 |
- |
251 |
ORDERING integerOrderingMatch
|
4 |
- |
252 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
253 |
SINGLE-VALUE )
|
|
|
254 |
|
|
|
255 |
#5.2.11 pwdMaxFailure
|
|
|
256 |
#
|
|
|
257 |
# This attribute specifies the number of consecutive failed bind
|
|
|
258 |
# attempts after which the password may not be used to authenticate.
|
|
|
259 |
# If this attribute is not present, or if the value is 0, this policy
|
|
|
260 |
# is not checked, and the value of pwdLockout will be ignored.
|
|
|
261 |
|
|
|
262 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.11
|
|
|
263 |
NAME 'pwdMaxFailure'
|
|
|
264 |
EQUALITY integerMatch
|
34 |
- |
265 |
ORDERING integerOrderingMatch
|
4 |
- |
266 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
267 |
SINGLE-VALUE )
|
|
|
268 |
|
|
|
269 |
#5.2.12 pwdFailureCountInterval
|
|
|
270 |
#
|
|
|
271 |
# This attribute holds the number of seconds after which the password
|
|
|
272 |
# failures are purged from the failure counter, even though no
|
|
|
273 |
# successful authentication occurred.
|
|
|
274 |
#
|
|
|
275 |
# If this attribute is not present, or if its value is 0, the failure
|
|
|
276 |
# counter is only reset by a successful authentication.
|
|
|
277 |
|
|
|
278 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.12
|
|
|
279 |
NAME 'pwdFailureCountInterval'
|
|
|
280 |
EQUALITY integerMatch
|
34 |
- |
281 |
ORDERING integerOrderingMatch
|
4 |
- |
282 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
|
|
283 |
SINGLE-VALUE )
|
|
|
284 |
|
|
|
285 |
#5.2.13 pwdMustChange
|
|
|
286 |
#
|
|
|
287 |
# This attribute specifies with a value of "TRUE" that users must
|
|
|
288 |
# change their passwords when they first bind to the directory after a
|
|
|
289 |
# password is set or reset by a password administrator. If this
|
|
|
290 |
# attribute is not present, or if the value is "FALSE", users are not
|
|
|
291 |
# required to change their password upon binding after the password
|
|
|
292 |
# administrator sets or resets the password. This attribute is not set
|
|
|
293 |
# due to any actions specified by this document, it is typically set by
|
|
|
294 |
# a password administrator after resetting a user's password.
|
|
|
295 |
|
|
|
296 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.13
|
|
|
297 |
NAME 'pwdMustChange'
|
|
|
298 |
EQUALITY booleanMatch
|
|
|
299 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
|
|
300 |
SINGLE-VALUE )
|
|
|
301 |
|
|
|
302 |
#5.2.14 pwdAllowUserChange
|
|
|
303 |
#
|
|
|
304 |
# This attribute indicates whether users can change their own
|
|
|
305 |
# passwords, although the change operation is still subject to access
|
|
|
306 |
# control. If this attribute is not present, a value of "TRUE" is
|
|
|
307 |
# assumed. This attribute is intended to be used in the absense of an
|
|
|
308 |
# access control mechanism.
|
|
|
309 |
|
|
|
310 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.14
|
|
|
311 |
NAME 'pwdAllowUserChange'
|
|
|
312 |
EQUALITY booleanMatch
|
|
|
313 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
|
|
314 |
SINGLE-VALUE )
|
|
|
315 |
|
|
|
316 |
#5.2.15 pwdSafeModify
|
|
|
317 |
#
|
|
|
318 |
# This attribute specifies whether or not the existing password must be
|
|
|
319 |
# sent along with the new password when being changed. If this
|
|
|
320 |
# attribute is not present, a "FALSE" value is assumed.
|
|
|
321 |
|
|
|
322 |
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.15
|
|
|
323 |
NAME 'pwdSafeModify'
|
|
|
324 |
EQUALITY booleanMatch
|
|
|
325 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
|
|
326 |
SINGLE-VALUE )
|
|
|
327 |
|
|
|
328 |
# HP extensions
|
|
|
329 |
#
|
|
|
330 |
# pwdCheckModule
|
|
|
331 |
#
|
|
|
332 |
# This attribute names a user-defined loadable module that provides
|
|
|
333 |
# a check_password() function. If pwdCheckQuality is set to '1' or '2'
|
|
|
334 |
# this function will be called after all of the internal password
|
|
|
335 |
# quality checks have been passed. The function has this prototype:
|
|
|
336 |
#
|
|
|
337 |
# int check_password( char *password, char **errormessage, void *arg )
|
|
|
338 |
#
|
|
|
339 |
# The function should return LDAP_SUCCESS for a valid password.
|
|
|
340 |
|
|
|
341 |
attributetype ( 1.3.6.1.4.1.4754.1.99.1
|
|
|
342 |
NAME 'pwdCheckModule'
|
|
|
343 |
EQUALITY caseExactIA5Match
|
|
|
344 |
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
|
|
345 |
DESC 'Loadable module that instantiates "check_password() function'
|
|
|
346 |
SINGLE-VALUE )
|
|
|
347 |
|
|
|
348 |
objectclass ( 1.3.6.1.4.1.4754.2.99.1
|
|
|
349 |
NAME 'pwdPolicyChecker'
|
|
|
350 |
SUP top
|
|
|
351 |
AUXILIARY
|
|
|
352 |
MAY ( pwdCheckModule ) )
|
|
|
353 |
|
|
|
354 |
#5.1 The pwdPolicy Object Class
|
|
|
355 |
#
|
|
|
356 |
# This object class contains the attributes defining a password policy
|
|
|
357 |
# in effect for a set of users. Section 10 describes the
|
|
|
358 |
# administration of this object, and the relationship between it and
|
|
|
359 |
# particular objects.
|
|
|
360 |
#
|
|
|
361 |
objectclass ( 1.3.6.1.4.1.42.2.27.8.2.1
|
|
|
362 |
NAME 'pwdPolicy'
|
|
|
363 |
SUP top
|
|
|
364 |
AUXILIARY
|
|
|
365 |
MUST ( pwdAttribute )
|
|
|
366 |
MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheckQuality $
|
|
|
367 |
pwdMinLength $ pwdExpireWarning $ pwdGraceAuthNLimit $ pwdLockout
|
|
|
368 |
$ pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $
|
|
|
369 |
pwdMustChange $ pwdAllowUserChange $ pwdSafeModify ) )
|
|
|
370 |
|
|
|
371 |
#5.3 Attribute Types for Password Policy State Information
|
|
|
372 |
#
|
|
|
373 |
# Password policy state information must be maintained for each user.
|
|
|
374 |
# The information is located in each user entry as a set of operational
|
|
|
375 |
# attributes. These operational attributes are: pwdChangedTime,
|
|
|
376 |
# pwdAccountLockedTime, pwdFailureTime, pwdHistory, pwdGraceUseTime,
|
|
|
377 |
# pwdReset, pwdPolicySubEntry.
|
|
|
378 |
#
|
|
|
379 |
#5.3.1 Password Policy State Attribute Option
|
|
|
380 |
#
|
|
|
381 |
# Since the password policy could apply to several attributes used to
|
|
|
382 |
# store passwords, each of the above operational attributes must have
|
|
|
383 |
# an option to specify which pwdAttribute it applies to. The password
|
|
|
384 |
# policy option is defined as the following:
|
|
|
385 |
#
|
|
|
386 |
# pwd-<passwordAttribute>
|
|
|
387 |
#
|
|
|
388 |
# where passwordAttribute a string following the OID syntax
|
|
|
389 |
# (1.3.6.1.4.1.1466.115.121.1.38). The attribute type descriptor
|
|
|
390 |
# (short name) MUST be used.
|
|
|
391 |
#
|
|
|
392 |
# For example, if the pwdPolicy object has for pwdAttribute
|
|
|
393 |
# "userPassword" then the pwdChangedTime operational attribute, in a
|
|
|
394 |
# user entry, will be:
|
|
|
395 |
#
|
|
|
396 |
# pwdChangedTime;pwd-userPassword: 20000103121520Z
|
|
|
397 |
#
|
|
|
398 |
# This attribute option follows sub-typing semantics. If a client
|
|
|
399 |
# requests a password policy state attribute to be returned in a search
|
|
|
400 |
# operation, and does not specify an option, all subtypes of that
|
|
|
401 |
# policy state attribute are returned.
|
|
|
402 |
#
|
|
|
403 |
#5.3.2 pwdChangedTime
|
|
|
404 |
#
|
|
|
405 |
# This attribute specifies the last time the entry's password was
|
|
|
406 |
# changed. This is used by the password expiration policy. If this
|
|
|
407 |
# attribute does not exist, the password will never expire.
|
|
|
408 |
#
|
|
|
409 |
# ( 1.3.6.1.4.1.42.2.27.8.1.16
|
|
|
410 |
# NAME 'pwdChangedTime'
|
|
|
411 |
# DESC 'The time the password was last changed'
|
|
|
412 |
# EQUALITY generalizedTimeMatch
|
|
|
413 |
# ORDERING generalizedTimeOrderingMatch
|
|
|
414 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
|
|
415 |
# SINGLE-VALUE
|
|
|
416 |
# USAGE directoryOperation )
|
|
|
417 |
#
|
|
|
418 |
#5.3.3 pwdAccountLockedTime
|
|
|
419 |
#
|
|
|
420 |
# This attribute holds the time that the user's account was locked. A
|
|
|
421 |
# locked account means that the password may no longer be used to
|
|
|
422 |
# authenticate. A 000001010000Z value means that the account has been
|
|
|
423 |
# locked permanently, and that only a password administrator can unlock
|
|
|
424 |
# the account.
|
|
|
425 |
#
|
|
|
426 |
# ( 1.3.6.1.4.1.42.2.27.8.1.17
|
|
|
427 |
# NAME 'pwdAccountLockedTime'
|
|
|
428 |
# DESC 'The time an user account was locked'
|
|
|
429 |
# EQUALITY generalizedTimeMatch
|
|
|
430 |
# ORDERING generalizedTimeOrderingMatch
|
|
|
431 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
|
|
432 |
# SINGLE-VALUE
|
|
|
433 |
# USAGE directoryOperation )
|
|
|
434 |
#
|
|
|
435 |
#5.3.4 pwdFailureTime
|
|
|
436 |
#
|
|
|
437 |
# This attribute holds the timestamps of the consecutive authentication
|
|
|
438 |
# failures.
|
|
|
439 |
#
|
|
|
440 |
# ( 1.3.6.1.4.1.42.2.27.8.1.19
|
|
|
441 |
# NAME 'pwdFailureTime'
|
|
|
442 |
# DESC 'The timestamps of the last consecutive authentication
|
|
|
443 |
# failures'
|
|
|
444 |
# EQUALITY generalizedTimeMatch
|
|
|
445 |
# ORDERING generalizedTimeOrderingMatch
|
|
|
446 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
|
|
447 |
# USAGE directoryOperation )
|
|
|
448 |
#
|
|
|
449 |
#5.3.5 pwdHistory
|
|
|
450 |
#
|
|
|
451 |
# This attribute holds a history of previously used passwords. Values
|
|
|
452 |
# of this attribute are transmitted in string format as given by the
|
|
|
453 |
# following ABNF:
|
|
|
454 |
#
|
|
|
455 |
# pwdHistory = time "#" syntaxOID "#" length "#" data
|
|
|
456 |
#
|
|
|
457 |
# time = <generalizedTimeString as specified in 6.14
|
|
|
458 |
# of [RFC2252]>
|
|
|
459 |
#
|
|
|
460 |
# syntaxOID = numericoid ; the string representation of the
|
|
|
461 |
# ; dotted-decimal OID that defines the
|
|
|
462 |
# ; syntax used to store the password.
|
|
|
463 |
# ; numericoid is described in 4.1
|
|
|
464 |
# ; of [RFC2252].
|
|
|
465 |
#
|
|
|
466 |
# length = numericstring ; the number of octets in data.
|
|
|
467 |
# ; numericstring is described in 4.1
|
|
|
468 |
# ; of [RFC2252].
|
|
|
469 |
#
|
|
|
470 |
# data = <octets representing the password in the format
|
|
|
471 |
# specified by syntaxOID>.
|
|
|
472 |
#
|
|
|
473 |
# This format allows the server to store, and transmit a history of
|
|
|
474 |
# passwords that have been used. In order for equality matching to
|
|
|
475 |
# function properly, the time field needs to adhere to a consistent
|
|
|
476 |
# format. For this purpose, the time field MUST be in GMT format.
|
|
|
477 |
#
|
|
|
478 |
# ( 1.3.6.1.4.1.42.2.27.8.1.20
|
|
|
479 |
# NAME 'pwdHistory'
|
|
|
480 |
# DESC 'The history of user s passwords'
|
|
|
481 |
# EQUALITY octetStringMatch
|
|
|
482 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
|
|
483 |
# USAGE directoryOperation )
|
|
|
484 |
#
|
|
|
485 |
#5.3.6 pwdGraceUseTime
|
|
|
486 |
#
|
|
|
487 |
# This attribute holds the timestamps of grace authentications after a
|
|
|
488 |
# password has expired.
|
|
|
489 |
#
|
|
|
490 |
# ( 1.3.6.1.4.1.42.2.27.8.1.21
|
|
|
491 |
# NAME 'pwdGraceUseTime'
|
|
|
492 |
# DESC 'The timestamps of the grace authentication after the
|
|
|
493 |
# password has expired'
|
|
|
494 |
# EQUALITY generalizedTimeMatch
|
|
|
495 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
|
|
496 |
#
|
|
|
497 |
#5.3.7 pwdReset
|
|
|
498 |
#
|
|
|
499 |
# This attribute holds a flag to indicate (when TRUE) that the password
|
|
|
500 |
# has been updated by the password administrator and must be changed by
|
|
|
501 |
# the user on first authentication.
|
|
|
502 |
#
|
|
|
503 |
# ( 1.3.6.1.4.1.42.2.27.8.1.22
|
|
|
504 |
# NAME 'pwdReset'
|
|
|
505 |
# DESC 'The indication that the password has been reset'
|
|
|
506 |
# EQUALITY booleanMatch
|
|
|
507 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
|
|
508 |
# SINGLE-VALUE
|
|
|
509 |
# USAGE directoryOperation )
|
|
|
510 |
#
|
|
|
511 |
#5.3.8 pwdPolicySubentry
|
|
|
512 |
#
|
|
|
513 |
# This attribute points to the pwdPolicy subentry in effect for this
|
|
|
514 |
# object.
|
|
|
515 |
#
|
|
|
516 |
# ( 1.3.6.1.4.1.42.2.27.8.1.23
|
|
|
517 |
# NAME 'pwdPolicySubentry'
|
|
|
518 |
# DESC 'The pwdPolicy subentry in effect for this object'
|
|
|
519 |
# EQUALITY distinguishedNameMatch
|
|
|
520 |
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
|
|
521 |
# SINGLE-VALUE
|
|
|
522 |
# USAGE directoryOperation )
|
|
|
523 |
#
|
|
|
524 |
#
|
|
|
525 |
#Disclaimer of Validity
|
|
|
526 |
#
|
|
|
527 |
# This document and the information contained herein are provided on an
|
|
|
528 |
# "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
|
|
529 |
# OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
|
|
530 |
# ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
|
|
531 |
# INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
|
|
532 |
# INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
|
|
533 |
# WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
534 |
#
|
|
|
535 |
#
|
|
|
536 |
#Copyright Statement
|
|
|
537 |
#
|
|
|
538 |
# Copyright (C) The Internet Society (2004). This document is subject
|
|
|
539 |
# to the rights, licenses and restrictions contained in BCP 78, and
|
|
|
540 |
# except as set forth therein, the authors retain all their rights.
|
|
|
541 |
|