No, we looked at that.  The User record “looks” fine, and was not updated 
(since the manual pwd change the previous day).  It is the user_cache record 
that is being invalidated.

Christopher Strauss, Ph.D.
Call Tracking Administration Manager
University of North Texas Computing & IT Center
http://itsm.unt.edu/
From: Action Request System discussion list(ARSList) 
[mailto:[email protected]] On Behalf Of Kelly Deaver
Sent: Friday, March 26, 2010 12:48 PM
To: [email protected]
Subject: Re: ARS 7.5 User Cache Gremlin

**
just a thought.. Does the Demo user record have the change password on next 
login flag set? Is it maybe getting set by a gone crazy password management 
rule of 1 day.

Kelly Deaver
L-3 Stratis / FAA Contractor
[email protected] (ARSlist mail)
[email protected]<mailto:[email protected]> (Business mail)


-------- Original Message --------
Subject: Re: ARS 7.5 User Cache Gremlin
From: strauss <[email protected]>
Date: Fri, March 26, 2010 11:18 am
To: [email protected]

**
Wouldn’t matter – there is no “Demo” account in LDAP, and LDAP is only 
consulted when the password is blank.  There are no groups defined in LDAP, 
either, nor is AREA mapped to look at groups.

Christopher Strauss, Ph.D.
Call Tracking Administration Manager
University of North Texas Computing & IT Center
http://itsm.unt.edu/
From: Action Request System discussion list(ARSList) 
[mailto:[email protected]] On Behalf Of Rick Cook
Sent: Friday, March 26, 2010 10:57 AM
To: [email protected]
Subject: Re: ARS 7.5 User Cache Gremlin

**
I would ask if anything on the LDAP side changed. Would a new group policy on 
that side override your password?
Rick
________________________________
From: strauss <[email protected]>
Date: Fri, 26 Mar 2010 10:41:05 -0500
To: <[email protected]>
Subject: ARS 7.5 User Cache Gremlin

This week we started seeing a brand new gremlin on our two ARS 7.5.00.004 – 
ITSM 7.6.00.001 servers.  The Demo account gets flagged as having an “INVALID” 
password overnight.  If you reset its password, it’s good for the day, but the 
next morning it is not valid again.  When you look at the actual record in the 
dbo.user.cache table on the SQL Server, the password value is “INVALID”.  When 
you look in the User form, there is a valid-looking encrypted value in field 
102 (password), not an INVALID flag, so this is happening in the User cache!!

Has anyone (a) seen this on their system, (b) located the obscene code or 
process that must be doing this, and (c) figured out how to kill it off?

Needless to say, it’s an unacceptable behavior, and we can’t just blank out the 
password in SQL Server since we have the AREA LDAP authentication integration 
active.  It’s a good thing that we always have several other 
administrator-privileged accounts available.

Christopher Strauss, Ph.D.
Call Tracking Administration Manager
University of North Texas Computing & IT Center
http://itsm.unt.edu/
_attend WWRUG10 www.wwrug.com ARSlist: "Where the Answers Are"_
_attend WWRUG10 www.wwrug.com ARSlist: "Where the Answers Are"_
_attend WWRUG10 www.wwrug.com ARSlist: "Where the Answers Are"_

Reply via email to