Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Tip

Configuring automatic response when Axxon One integrity check fails

IP address filtering configuration

To configure the user security policy, do as follows:

  1. Go to SettingsOptions
  2. (1)
  3.  → Security
  4. Policy (2)
  5. policy.
    Image Modified
  6. Set
  7. In the Minimum password length field, set the minimum password length
  8. (3)
  9. .
  10. Set
  11. In the Number of passwords in history field, set the number of the most recent passwords for each user to be stored in history
  12. (4 )
  13. . 0
  14. – do
  15. —do not store password history. If this value is
  16. non-zero
  17. different from 0, the passwords that are stored in history
  18. may not be reused.
  19. cannot be used when setting a new password.
  20. In the Password validity period field, set the password validity period in days. After the validity period
  21. Set the password expiration time interval in days (5). After the time interval
  22. expires, the user
  23. will be
  24. is prompted to set a new password. 0
  25. — the
  26. —the password validity period never expires.
  27. Select
  28. In the Username and password must meet complexity requirements field, select the positions to meet complexity requirements:
  29. nothing, password only, user name and password (6).
    1. Nothing.
    2. Password only.
    3. Username and password.
      Note
      titleAttention!

      The requirements:

  30. user name
      • Username:
    1. should contain no less than 6
          • must contain at least six characters and at least
    2. 2
          • two digits;
    3. should
          • must not include common role names, such as: user, admin, administrator,
    4. admin1
          • administrator1, root, super, superuser, supervisor.
    5. The password has to
        • Password must contain at least
    6. 8 characters, which should meet at least 3 requirements listed below:
        • eight characters that must meet at least three requirements for passwords containing less than 10 characters and at least two requirements for passwords containing 10 or more characters:
          • At least one uppercase letter;
          • At least two lowercase letters;
          • At least three digits;
          • At least four special characters: . , : ; ! ? \ | / ( ) [ ] { } + − = < >" @ ' # * $ ` % ^ & _ ~.
    7. at least 1 capital letter;
    8. at least 2 lowercase letters;
    9. at least 3 digits;
    10. at least 4 special characters: !\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~
    11. If you need to limit the number of sessions per user to one, set the
    12. corresponding checkbox (7)
    13. Prevent multiple logins of the same user account checkbox. This requirement also applies to
    14. web
    15. Web-Clients and mobile Clients.
    16. Set
    17. In the Maximum failed logon attempts field, set the number of failed

    18. login
    19. logon attempts to lock

    20. a
    21. the user's account

    22. (8)
    23. . 0

    24. – no
    25. —no account locking on incorrect passwords. If this value is

    26. non-zero
    27. different from 0, when a new user is created, they

    28. will be
    29. are given the name

    30. user
    31. User with a random number from 10000 to 99999. The name can be changed in the user settings.

      Note
      titleAttention!

      When

    32. unblocked
    33. unlocked, the user is offered only one authentication attempt. A successful authentication

    34. will reset the failed attempts counter to
    35. resets the failed attempts counter to zero, otherwise the user account

    36. will be blocked
    37. is locked again.

    38. Set
    39. In the Account lockout duration field, set the duration of user account
    40. locking
    41. lockout on failed login attempts in minutes
    42. (9)
    43. . 0
    44. – the
    45. —the account can be unlocked by the administrator only (
    46. see Locking a user account
    47. see Configuring local usersConfiguring LDAP users).
    48. Click the Apply Image Added button.

    Configuring the user security policy is complete.

    Note
    titleAttention!

    If any user accounts created in your system before you applied changes in security policy are incompatible with the new requirements, the users will be are prompted to change their credentials upon their next login.

    Image Modified