z/OS IBM Tivoli Directory Server Administration and Use for z/OS
|
Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Password policy examples z/OS IBM Tivoli Directory Server Administration and Use for z/OS SC23-6788-00 |
|
|
This section contains examples of configuring global, group, and individual password policy entries and associating them with users and groups. This section also contains examples of using the Effective password policy and Account status extended operations. Global password policy exampleWhen the global password policy entry, cn=pwdpolicy,cn=ibmpolicies,
is initially created in the CDBM backend, the policy is not enabled.
This example uses the ldapmodify utility to activate the global
password policy and to change its default values. See z/OS IBM Tivoli Directory Server Client Programming for z/OS for
more information about the ldapmodify utility.
After these modifications are made to the global password policy
entry, the following policy is in effect for all existing entries
that have userPassword attribute values:
Group password policy exampleIf there are a number of users that must have a password policy
that differs from the global password policy, group password policies
are used. These users must be placed in a static, dynamic, or nested
group and those groups are updated to refer to a password policy entry.
This example uses the ldapadd utility to add a password policy
entry in the CDBM backend to be used as a group password policy.
See z/OS IBM Tivoli Directory Server Client Programming for z/OS for
more information about the ldapadd client utility.
The characteristics are:
After the password policy entry is created, the group entry that
must use this special password policy must be modified to set the ibm-pwdGroupPolicyDN operational
attribute value. This example uses the ldapmodify utility
to modify the existing cn=group,c=us entry to add
an ibm-pwdGroupPolicyDN operational attribute value for the cn=group,cn=ibmpolicies password
policy entry.
Although the cn=group,cn=ibmpolicies password
policy entry created earlier is enabled by setting the ibm-pwdPolicy attribute
value to true, the global password policy must be enabled to evaluate
additional password policies (if it is not already). Set the ibm-pwdGroupAndIndividualEnabled attribute
value to true in the global password policy entry. This example uses
the ldapmodify utility to enable the evaluation of additional
password policies in the LDAP server.
After the global password policy is enabled to evaluate additional password policies, users that are members of the cn=group,c=us group are subject to the password policy specified in the cn=group,cn=ibmpolicies entry. Individual password policy exampleIf there are only a few users that must have a password policy that differs from the global password policy, an individual password policy can be created and used. The users that require this special password policy are updated to refer to a password policy entry. This example uses the ldapadd utility to
add a password policy entry in the CDBM backend to be used as an individual
password policy.
The characteristics are:
After the password policy entry is created, the individual users
needed to use this special password policy must be modified to set
the ibm-pwdIndividualPolicyDN operational attribute
value. This example uses the ldapmodify utility
to modify the existing cn=user5,c=us entry to add an ibm-pwdIndividualPasswordPolicyDN operational attribute
value for the cn=individual,cn=ibmpolicies password policy
entry.
Although the cn=individual,cn=ibmpolicies password policy
entry created earlier is enabled by setting the ibm-pwdPolicy attribute
value to true, the global password policy must be enabled to evaluate
additional password policies (if it is not already). Set the ibm-pwdGroupAndIndividualEnabled attribute value
to true in the global password policy entry. This example uses the ldapmodify utility to enable the evaluation of additional
password policies in the LDAP server.
After the global password policy is enabled to evaluate additional password policies, the cn=user5,c=us entry is subject to the password policy specified in the cn=individual,cn=ibmpolicies entry. Effective password policy extended operation exampleThe Effective password policy extended operation in the ldapexop utility
is used to query the effective password policy of a user or group.
The Effective password policy extended operation displays
the password policy attribute values and the password policy entries
that have contributed to the effective password policy for the specified
user or group. See ldapexop utility for more information.
This example uses the Effective password policy extended operation
in the ldapexop utility to query the effective password policy
for user cn=user5,c=us:
Note:
Account status extended operation exampleThe Account status extended operation in
the ldapexop utility is used to query if the
user's account is opened, locked, or the password has expired.
|
Copyright IBM Corporation 1990, 2014 |