On Sat, Nov 21, 2015 at 7:50 PM, Jim Willeke <j...@willeke.com> wrote:

> Does ApacheDS support the  pwdEndTime from
> https://tools.ietf.org/html/draft-behera-ldap-password-policy-10 ?
>
it does

>
> This attribute specifies the time the entry's password becomes invalid for
> authentication. Authentication attempts made after this time will fail,
> regardless of expiration or grace settings. If this attribute does not
> exist, then this restriction does not apply.
> Note: that pwdStartTime may be set to a time greater than or equal to
> pwdEndTime; this simply disables the password.
>
> Appears this is the "drafts" method for administrative disablement of the
> account.
>
> yep, this is another way to disable, but again no user modification
allowed on this attribute
as well, other than by the default admin account

> --
> -jim
> Jim Willeke
>
> On Sat, Nov 21, 2015 at 1:25 AM, Kiran Ayyagari <kayyag...@apache.org>
> wrote:
>
> > On Sat, Nov 21, 2015 at 4:54 AM, Hal Deadman <hal.dead...@gmail.com>
> > wrote:
> >
> > > I am trying to lock a user by a setting the pwdAccountLockedTime
> > > to 000001010000Z but I only seem to be able to do that as admin, not as
> > > another user with an ACI granting them all rights to all user
> > attributes. I
> > > realize pwdAccountLockedTime is an operational attribute so  that makes
> > > sense.
> > >
> > > Two questions:
> > >
> > > Is there a way for an aci to grant rights to specific users to update
> > > operational attributes?
> > >
> > > even if there is such an ACI, server is strict on not allowing other
> > users
> > other than
> > the default admin user (uid=admin,ou=system)
> > This is currently a limitation of the server
> > (DefaultCoreSession.isAdministrator() returns
> > true for the default admin account instead of checking for group
> > membership)
> >
> > Is there a better way to lock out a user (e.g. someone who incorrectly
> > > answers forgot password security questions too many times) other than
> > > binding with an incorrect password until they are locked out by the
> > > password policy?
> > >
> > > no, cause the current policy implementation works purely based on the
> > combination
> > of defined config parameters
> >
> > otoh, it is upto the application to do such job, LDAP server knows
> nothing
> > about security
> > questions and answers.
> >
> >
> > > Thanks, Hal
> > >
> >
> >
> >
> > --
> > Kiran Ayyagari
> > http://keydap.com
> >
>



-- 
Kiran Ayyagari
http://keydap.com

Reply via email to