Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Managing the password policy using the UI
You can customize the password policies by setting rules for the passwords that are used by the Access Appliance local users. You can set rules for password complexity, password age, and password lockout. Password complexity specifies the number and type of characters a password must include. Password age defines the duration for which the password is valid. Password lockout specifies the number of failed attempts because of incorrect usage of passwords after which a user is prevented from logging in to the account.
If the Security Technical Implementation Guide (STIG) mode is enabled for the cluster, the password policy cannot be modified.
The default password policy for a local user is as follows:
Password complexity:
Minimum characters: 8
Minimum numbers: 1
Minimum lowercase characters: 1
Minimum uppercase characters: 1
Minimum special characters: 1
To change the password policy:
- Log in to the web interface of a configured Access Appliance cluster by opening a supported browser and typing:
http://console-ip:14161
where console-ip is the management console IP address where the web interface is hosted.
- In the left navigation pane, click Settings and then click User management.
- Click Manage password policy.
- On the Manage password policy page, click Edit.
Note:
The Edit button is disabled and the password policy cannot be edited if the STIG mode is enabled.
- If you want your password policy to comply with STIG, select Reset to STIG default values to fill in the default values for all the parameters.
Selecting this option enforces a higher security password policy.
- Edit the parameters as required. To ignore a rule, leave the corresponding parameter blank. After making the changes click Save.
Table:
Parameter | Description |
---|---|
Minimum characters | Minimum number of characters to include in a password |
Minimum uppercase characters | Minimum number of uppercase characters to include in a password |
Maximum repetitive characters of the same class | Maximum number of consecutive uppercase, lowercase, numeric, and special characters |
Minimum numbers | Minimum number of numeric characters |
Minimum special characters | Minimum number of special characters in a password |
Minimum character classes | Minimum character classes to include in a password. Character classes include uppercase, lowercase, numeric, and special characters. |
Minimum lowercase characters | Minimum number of lowercase characters |
Maximum repetitive characters | Maximum number of characters that can be repeated in a password. |
Character difference with old password | Number of characters the new password must differ by from the previous password |
Days after which password can be changed | Number of days after which a password can be changed |
Days after which password must be changed | Number of days after which a password must be changed |
Days before warning message | Number of days before the password expires to display a warning |
Minimum different passwords before allowing reuse | Number of unique passwords before a previous password can be reused |
Number of incorrect login attempts before lockout | Number of failed login attempts after which the account gets locked |
Time before locked account is reenabled | Duration in seconds the account remains locked |
Time between login failures before account lockout | Number of seconds between consecutive failed login attempts |