Oh right, how did I miss this. So one needs to set "altStateAttrName: createTimestamp", and configure "accountInactivityLimit". In this case this will globally apply to all accounts with the policy, isn't it? It still won't allow me to set expiration date per account (Unless I create a policy for each account?)
Cenk On Tue, Oct 3, 2023 at 9:39 AM Thierry Bordaz <tbor...@redhat.com> wrote: > > On 10/3/23 09:34, Cenk Y. wrote: > > Thanks Mark, Thierry, > > I've looked quite a bit into account policy. It allows locking an account > after an inactivity limit, but from my understanding, it doesn't offer a > way to lock it in a pre-configured future time without inactivity. > > > Not only inactivity but also account expiration (createtimestamp). > https://access.redhat.com/documentation/en-us/red_hat_directory_server/11/html/administration_guide/account-policy-plugin#account-policy-plugin-config > > regards > thierry > > > I think this would be a useful feature. I may open a RFE. > > Cheers > Cenk > > On Tue, Oct 3, 2023 at 8:55 AM Thierry Bordaz <tbor...@redhat.com> wrote: > >> >> On 10/3/23 01:11, Mark Reynolds wrote: >> >> >> On 10/2/23 4:13 AM, Cenk Y. wrote: >> >> Hi Mark, thanks for the response. >> >> We already use password lockout plugin, but what I need is the opposite. >> >> I want to >> * Create an account, activate it >> * Set an expiration date, so that after that date account is locked. >> >> >> Hi Cenk, >> >> I agree with Mark, password base expiration is likely not what you are >> looking for (because of reset). >> >> Before opening a RFE, you may check if the account policy plugin may >> match you need >> https://access.redhat.com/documentation/en-us/red_hat_directory_server/11/html/administration_guide/account-policy-plugin >> >> best regards >> thierry >> >> Yeah there is no way to "lock" an account that way. You can set the >> password to expire, but its not the same thing and a password reset will >> bump that expiration time anyway. >> >> Please file an RFE for this feature, but it could take some time until >> it's implemented. >> >> https://github.com/389ds/389-ds-base/issues/new >> >> Thanks, >> Mark >> >> >> Cheers >> Cenk >> >> On Fri, Sep 29, 2023 at 9:50 PM Mark Reynolds <marey...@redhat.com> >> wrote: >> >>> Actually, I was wrong there is more you need to do. >>> >>> You need to enable account lockout and set a max failure count: >>> >>> # dsconf slapd-INSTANCE config set passwordLockout=on >>> passwordMaxFailure=3 >>> >>> Then set in each user entry: >>> >>> passwordRetryCount: 3 --> number equal to passwordMaxFailure >>> >>> retryCountResetTime: 20230929193912Z --> you must calculate this >>> value (and use it for these two attributes) >>> >>> accountUnlockTime: 20230929193912Z >>> >>> >>> That works for me. >>> >>> HTH, >>> >>> Mark >>> >>> >>> On 9/29/23 11:40 AM, Cenk Y. wrote: >>> > Hello, >>> > >>> > We are running 389-ds-base.2.2.7 . >>> > >>> > While creating accounts, sometimes we know until when they need to be >>> > active. Is there a way to manually set a "expiration date" for the >>> > account, so after that date nsAccount is set to true? >>> > >>> > Having gone through rhds and 389-ds pages, it seems it's only possible >>> > to create a policy to deactivate accounts after an inactivity limit. >>> > >>> > I can always create a mechanism myself (such as adding a new attribute >>> > and checking it by a cron job ...) , but I want to see if there is a >>> > native way to do this? >>> > >>> > Thanks >>> > Cenk >>> > >>> > _______________________________________________ >>> > 389-users mailing list -- 389-users@lists.fedoraproject.org >>> > To unsubscribe send an email to >>> 389-users-le...@lists.fedoraproject.org >>> > Fedora Code of Conduct: >>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/ >>> > List Guidelines: >>> https://fedoraproject.org/wiki/Mailing_list_guidelines >>> > List Archives: >>> https://lists.fedoraproject.org/archives/list/389-users@lists.fedoraproject.org >>> > Do not reply to spam, report it: >>> https://pagure.io/fedora-infrastructure/new_issue >>> >>> -- >>> Directory Server Development Team >>> >>> -- >> Directory Server Development Team >> >> >> _______________________________________________ >> 389-users mailing list -- 389-users@lists.fedoraproject.org >> To unsubscribe send an email to 389-users-le...@lists.fedoraproject.org >> Fedora Code of Conduct: >> https://docs.fedoraproject.org/en-US/project/code-of-conduct/ >> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines >> List Archives: >> https://lists.fedoraproject.org/archives/list/389-users@lists.fedoraproject.org >> Do not reply to spam, report it: >> https://pagure.io/fedora-infrastructure/new_issue >> >>
_______________________________________________ 389-users mailing list -- 389-users@lists.fedoraproject.org To unsubscribe send an email to 389-users-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/389-users@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue