Changes

Jump to: navigation, search

Password Policy

3,107 bytes added, 23:30, 18 January 2022
no edit summary
__TOC__
 
 
 
==Overview==
'''Password PolicyPolicy ''' is used to configure the Password Policies password policies within [[SmartSimple ]] with your organizational policiesstandards. It is best practice to ensure that these policies match the other systems that are deployed by your organization. Consequently ; consequently, these policies provide allow for extensive configuration options. 
'''Password Policies include the ability to control; the length and complexity of passwords, password expiration and frequency usage, the method for sending new requested passwords, word restrictions, the number of retries allowed, the lockout time for the account if they exceed the number of retries, email alerts for invalid passwords.following:'''
'''Multiple * The ability to control the length and complexity of passwords* The password expiration time period * The password policies''' can be supported by the system. This feature provides frequency usage * The method for less stringent policies sending new requested passwords (via Email Templates) * Word restrictions * The number of retries allowed* The lockout time for types of users that infrequently access the system such as external contacts. Alternative password policies can be set account if they exceed retry quota * Email alerts for any level in the organizational hierarchy.invalid passwords 
There Multiple password policies can also be individual Password supported by the system. This feature provides for less stringent policies for types of users that ''infrequently ''access the different companies in your organizations hierarchy. Howeversystem - for example, they will [[External]] contacts who would only be able to edit use the policy and not the Activation Emailssystem for an application. These emails Alternative password policies can only be configured from set for any level in the [[Global SettingsOrganization hierarchy|Global settingsorganization hierarchy]]. 
You can also set individual password policies for the different companies of your organization hierarchy. However, they will be able to '''Common Words or known common passwords'edit '' cannot  be used as passwordsthe policy only, and not edit the [[Email#Email Templates for User Activation and Password|the Activation Emails]], which can only be configured from [[Global Settings]] by a [[User|user]] with [[Global User Administrator|System Administrator]] [[User Role|privileges]]. 
: '''Note: '''In all cases of password policies, '''common words '''or '''known common passwords '''are ineligible to be used as [[SmartSimple]] passwords. 
==Configuration - Essentials==
===How to Access the Password Settings Settings===
1. Click on the 9-square menu icon on the top right of your page.
:: {{Icon-Menu}} 
 
2. Under the heading '''Configuration, '''select '''[[Global Settings]]. '''
A page displayed with numerous settings and tabs related to your system's password and activation policies will appear. On this page, you can modify the required complexities of passwords, email templates for activating users and setting passwords, disable inactive accounts, and more. 
:: [[File:General password activation policies.png|900px|border]] 
{| class="wikitable"
|-
||'''Tab Name'''
||'''Overview of Features and Functionality'''
|-
||'''[[Password Policy#Password Settings|General]]'''
||Provides access to modify, configure, or enable/disable general password settings, the deactivation of inactive accounts, activation settings, password reset messages, and persistent login.
|-
||'''[[Email#Email Templates for User Activation and Password|Activation Email Templates]]'''
||Allows modification and configuration of Email Templates for the following functions: New User, Request Password, and Password Change Notification. Can also set a default language and From Address. 
|-
||'''[[Password Policy#Intruder Lockout Settings and Intruder Email Alert|Intruder Alert Settings]]'''
||Allows modification of intruder settings, including the amount of retries, the lockout duration, and the content for an email alert when there is an intrusion.
|-
||'''[[Login Page#Invalid Login Audit|Invalid Login Audit]]'''
||Provides a [[List View Overview|list]] of invalid logins by username, IP Address, and time for auditing and record-keeping purposes.
|-
||'''[[Password Policy#View Locked Users|Locked Users]]'''
||Provides a list of locked users by name, Lockout Time, and the feature to directly set that user with a new password. 
|-
||'''[[Disable User Account After Inactive Period|Disabled Inactive Users]]'''
||Provides a list of disabled, inactive users by name and date of disabling. 
|}
===Password Encryption===
For your information, if necessary: 
 
{{PasswordEncryption}}
===Password Settings===
This section, under the first tab of the '''Password and Activation Policies '''labelled '''General, '''is used to set password attributes. 
:: [[File:General password settings.png|400px|border]]
{| class="wikitable"
|-
||'''Password Length'''
||The minimum length allowed for a password; the number inputted must be between '''6 - 32 characters.'''
|-
||'''Complexity'''
||
Set the level of character-type complexity required for a password. The options are as follows: 
===Persistent Login * '''No Restriction - '''any character can be used; this is the default. * '''Alpha Only - '''only letters are able to be used.* '''Alpha & Numeric - '''both letters and Expiration numbers must be used in the password.* '''Alpha & Numeric & Special Characters - '''a combination of Inactive Accounts===letters, numbers, and special characters must be used. [[image:* '''Custom Policy - '''a password 001policy can be custom-defined.png|border]] 
'''Persistent LoginDisable Restriction of Common Passwords - ''' provides for the use use of a persistent secure cookie Toggling on the users computer to eliminate the need to use a username and password to log into the system. '''This feature this function will be deprecated in the July 2016 upgrade.then '''enable ''the user'Disable Inactive Accounts''' provides the s ability to automatically disable a user account after a predetermined period of timeuse common passwords as their password. A password reset This is required by the user not recommended for security reasons, as common passwords are easier to regain access guess and to the systemenable security breaches. The main options are: 
* |-||'''Disable user accounts after Force Password Change''[X]'' days''' - The number of days a user account is inactive before it is disabled. Leave this field blank to disable this feature.* ||'''Apply Policy to All SubForce New Password on First Login -Companies ''' - Click button This will ensure that each individual user will be forced to force-update the change their password policy of the current company and all subfrom a system-companies. '''Note:'''This is applicable when an organization has a root company and a one generated or more subSysAdmin-companies each with it's determined password into one of their own password policies.* '''Disabled Inactive Account Message''' - The text to be displayed to a user trying to access an expired accountaccord. 
===* '''Note: '''This first login does not count towards the Maximum Password Settings Section===This section is used to set password attributesUpdate in 24 Hours setting. 
::: [[File:Password general settings.png|450px|border]]
'''Maximum Password Update in 24 Hours''' – Sets the maximum number of password changes a user can make within a 24 hour period can be defined. This is to prevent users bypassing the password history restriction by changing their password repeatedly to return to a previously used password. This setting only pertains to password changes by use of "Update Password" by user, not to the "Forgot Password" link or system administrators using "Set Password."
'''Password lengthExpire All Passwords Now - ''' This is a handy button that will immediately invalidate all passwords in the minimum length allowed for a [[Password|system, ensuring that each user will have to reset their passwords when they next log in. A good use-case of this function might be if you updated your password]]policy to require more complex passwords; by expiring all passwords, between '''6 and 32 characters'''every user in your system will have to create new passwords that fall under the new password criteria. 
|-||'''Data RestrictionsPassword Expiration''' - passwords set by users can ||Each user will be restricted forced to change their password once the selected number of days has passed. Doing so every quarter or so values such as first nameis good security practice; however, last name or organization name cannot any number of days can be used in set. On each login, the system will check how many days until the password expires and will notify the user their passwordis about to expire in X days. Any |-||'''Password History Check'''||You can set the number of fields can previous passports (to a maximum of 32) that the system will remember for each user. When changing their password, users will not be selected from both permitted to re-use a previous password that is remembered by the '''Password History '''until the organization or specified number of unique passwords have been used. |-||'''Maximum Password Changes in 24 Hours'''||This will set the maximum number of password changes any individual user profile; standard and custom fields are supportedis able to make within a 24-hour period. This is to prevent users from bypassing the password history restriction by changing their password repeatedly in order to return to a previously used password.
* This setting only pertains to password changes by use of '''Update Password '''by the user - it is not relevant to the '''Forgot Password '''link nor to the [[image:password-008.pngGlobal User Administrator|System Administrators]]ability to '''Set Password '''for users. 
In the example above City, Country and Phone fields have been selected from the user|-||'''Password Data Restriction'''s organization record and ||Configuring this setting will restrict password settings so that values such as first name, last name, birthplace and nickname or organization name ''cannot ''be used in the password. Any number of fields have been can be selected from the user profileboth the '''Organization '''or the '''Contact '''[[Profile]]. 
'''Organization Field '''- Both [[Standard Fields|standard]] and [[Custom Fields|custom fields]] are supported. 
'''Contact Field '''- Both [[Standard Fields|standard]] and [[Custom Fields|custom fields]] are supported. 
|}====Password ComplexityDisable Inactive Accounts and Activation Settings====Scrolling down further on the '''ComplexityGeneral ''' – the level of complexity required in password settings page will bring you to the [[Password|password]], sections that allow you to set the options are:criteria for disabling and activating accounts. 
* '''No Restriction''' – any character [[User]] accounts can be usedconfigured to automatically become disabled after a predetermined period of inactivity. Once disabled, a [[Password Policy#Password Reset Message|password reset]] is required by the user to regain access to the system. This is feature adds to the default.* '''Alpha Only''' – only letters can be used.* '''Alpha & Numeric''' – letters and numbers must be used in many user management options within the password.* '''Alpha & Numeric & Special characters''' – letters, numbers and special characters must be used.* '''Custom Policy''' - a password policy can be custom definedsystem.
:: [[File:Password disable and activate.png|500px|border]]{| class====Custom Policy===="wikitable"|-* The ||'''Disable user accounts after '''Compose Custom Password Policy'days'' table provides the ability to define the custom password policy that matches your organization's security standards and provides control of each character type desired (upper case, lower case, numeric and/or symbols). You can also specify ||Insert the minimum number of characters required for that character typedays a user account is inactive before it is disabled.* The character mask used In order to define your selection will appear in disable this feature, simply leave the '''Custom Password Policy''' fieldblank. You can also write your own code and paste it into this field if desired.* The |-||'''Validate PatternApply Policy to All Sub-Companies''' ||Click this button will open a window where you can test various passwords against to force-update the password policy related to see if they will pass or fail.* The value in the '''Custom Password Policy Description''' field will be displayed to users when setting/changing their password. You can use plain text or html in this field (For example, to insert a line break use ''<br>'')* '''Note''': See also [[Custom Password Policy Examples]][[Image:Custpwpolicycurrent organization and all sub-companies.png]] 
'''ImportantNote: ''' When defining This is applicable when an organization has a custom password policy be sure to provide a detailed description of the policy in the '''Custom Password Policy Description''' field so that users are aware of the minimum requirement to enable them to create a valid [[The Root Company|root organization]], and one or more sub-companies each with its own passwordpolicies.
If you need |-||'''Disabled Inactive Account Message'''||Write in the text that will be displayed when a user is attempting to translate the access an expired account.|-||'''Enable reCAPTCHA Validation'''|||-||'''Custom Password Policy DescriptionActivation link life span''' message you can use ||This function works with the @activationlink@ [[sslogicPassword Variables to Set or Reset User Passwords|password variable]]. It If the '''https://@url@@activationlink@ '''syntax is often easiest to use used in the '''Request Password '''section of [[System VariablesEmail#Email Templates for User Activation and Password|email templates]] , this setting sets the duration that the activation link will be valid for thesethe user in ''number of hours. Example: ''
<pre style="white-space* '''Note: -o-pre-wrap; word-wrap: break-word;">&lt;!--@sslogic('@langid@ '='2')-->&lt;br>@systemBest practice is to provide around 24 hours.Password Policy - French@&lt;!--@else-->&lt;br>@systemProviding too little time will force you to continuously resend links as users will be more likely to forget to activate their accounts in time.Password Policy@&lt;!--@end--></pre> 
===New Password Settings===|-||'''Default Security Code'''||This is a hard-coded value to be entered when users request new passwords.  For example, 12345. |-||'''Challenge Questions, delimited by semi-colons'''||You can set a series of challenge questions through which all users will be prompted to select one upon next login. Their answer to that question will be stored in the system, and if they forget their password, they will be prompted to enter this answer and click the activation link in the '''Forgot Password '''[[image:password003.pngEmail#Email Templates for User Activation and Password|borderemail template]]
* '''Force Password ChangeNote: ''' - Appears with button marked '''Expire All Passwords Now'''. Ensures The best challenge questions will have answers that all users are simple, memorable, not easy to guess, and will be forced to rest their password when they next log innot change over time. 
* '''First Login''' - Ensures that the user selects a password Example of their own choosing the first time they log into [[SmartSimple]]. <br />''(Does not count towards'' Maximum Password Update in 24 Hours 'Challenge Questions: 'setting.)''
* : ''In what city or town was your first job?;''<br />''What is your mother's maiden name?;''<br />''What was your first pet's name?;''<br />''In what year was your father born? ''|}====Password Reset Message====Even further down at the bottom of the '''General '''page of '''Password Expirationand Activation Policies ''' - Each user will be forced are features relating to change their password once the selected number of days has passed. Any number of days can be seta '''Password Reset Message '''and '''Persistent Login. '''
* :: [[File:Password reset message custom.png|800px|border]] In the text field box, write the content for the '''Password History CheckReset Password ''' - You can set the number of previous passwords (to message that a maximum of 32) that the system user will remember for each user. When changing see if they need to reset their password, users will not be permitted . You may select between a default template or you may choose to re-use a previous password until the specified number of unique passwords have been usedmake it custom. 
====Persistent Login====
:: [[File:Persistent login.png|600px|border]] 
The '''Persistent Login''' functionality provides for the use of a persistent secure cookie on the [[SmartSimple]] [[User|user]]'s computer to eliminate the need to use a username and password to log into the system. 
Rather than having to log in to SmartSimple each time you open your web browser, a "cookie" can be installed on your computer that will automatically authenticate you, allowing you to bypass the login screen. (This setting can be [[System_Security_Permissions#Miscellaneous_Feature_Permission|enabled or disabled]] by your system administrator). In order for this feature to work, you must have the user's browser enabled to accept persistent cookies.
====Rules for Password Activation Settings====
When an organization has their password settings configured, then they will be used in full.
When an organization does not have their password settings configured, the system will go up the [[Organization hierarchy|organization hierarchy]] until it finds a parent company with password settings configured, and by default it will allow the organization to inherit those settings. '''Example: '''If only the [[The Root Company|root organization]] has its password settings configured, all other organizations would inherit the same policies, as they all fall under the root organization on the organization hierarchy. 
===Password Activation Settings===Password Activation Settings can be set to add an extra layer of security to * '''Note: '''An organization will display informational text at the system. These settings pertain to users who use the "Forgot Password" link on the login pagetop saying that its password policies have not been configured until they are. 
{| class="wikitable"|-||For when a new user is sent their password for the first time||* If the password activation settings have a '''default security code '''but no challenge questions, the user will be prompted to enter the default security code. * If the password activation settings have a '''default security code '''and '''challenge questions, '''the user will be prompted to enter the default security code and then taken to a second screen to define an answer to one of the challenge questions. The user can then go their [[Image:Password-Activation-Settings.pngProfile]]and access the '''Change Password '''page to view and update their stored challenge question and answer.* The user will be presented with reCAPTCHA validation in all cases.
|-||For when an existing user requests a new password||* If the password activation settings have a '''default security code '''but no challenge questions, the user will be prompted to enter the default security code. * If the password activation settings have a '''default security ''''''code '''and '''Default Security Codechallenge questions, ''' - A hard-coded value the user will only be prompted to answer a challenge question.* The user will be entered when users request new passwordspresented with reCAPTCHA validation in all cases. 
* '''Activation link life span''' - Works with |}After a user has successfully completed the @activationlink@ [[Password Variables to Set or Reset User Passwords|appropriate password variable]]. If the '''<nowiki>https://@url@@activationlink@</nowiki>''' syntax is used in the ''Request Password'' section of activation process, they will be logged into that SmartSimple [[User Email Templatesinstance]], this setting sets the duration that the activation link and their newly created password will be validbecome active. 
====Custom Policy====* The '''Challenge Questions, delimited by semi-colonsCompose Custom Password Policy''' - table provides the ability to define the custom password policy that matches your organization's security standards and provides control of each character type desired (upper case, lower case, numeric and/or symbols). You can set a series also specify the minimum number of challenge questions, all users characters required for that character type.* The character mask used to define your selection will be prompted to select a [[Challenge Question]] on next loginappear in the '''Custom Password Policy''' field. You can also write your own code and paste it into this field if desired. Their answer * The '''Validate Pattern''' button will be stored and open a window where you can test various passwords against the policy to see if they will pass or fail.* The value in the '''Custom Password Policy Description''' field will be prompted displayed to enter this answer if they forget users when setting/changing their password and click the activation link . You can use plain text or html in the "Forgot password" email templatethis field (For example, to insert a line break use ''&lt;br>'')* '''Note''': See also [[Custom Password Policy Examples]][[Image:Custpwpolicy.png]]
: [[Image:Challenge-question.png|link=]]: '''NoteImportant:''' An example of When defining a good challenge question would custom password policy be something that is simple, memorable, cansure to provide a detailed description of the policy in the ''t be guessed easily, and won't change over time.===Rules for Custom Password Activation Settings===When Policy Description''' field so that users are aware of the minimum requirement to enable them to create a company has valid password settings configured, then these will be used in full.
When a company does not have password settings configured, If you need to translate the system will go up the Organizational hierarchy until it finds a parent company with password settings configured and then '''Custom Password Policy Description''' message you can use [[sslogic]]. It is often easiest to use [[System Variables]] for these settings.Example:
NOTE: When a company does not have password settings configure it will display informational text at the top saying it has not been configured.  The following rules apply to the above settings when a '''new user is sent their password for the first time''': * If the Activation settings have a default security code but no challenge questions, the user will be prompted to enter the default security code.* If the Activation settings have a default security code and a challenge questions, the user will be prompted to enter the default security code and then taken to second screen to define an answer to one of the the Challenge questions. The user can then go User Profile and access the Change Password page to view and update their stored challenge question and answer.* The user will be presented with [[CAPTCHA]] validation in all cases.  The following rules apply to the above settings when an '''existing user requests a new password''': * If a default security code has been entered and no challenge questions have been entered, the user will be prompted to enter the default security code.* If a default security code has been entered and challenge questions have been entered, the user will only be prompted to answer a challenge question.* The user will be presented with [[CAPTCHA]] validation in all cases. After successful completion of Password Activation, the user will be logged in and their new password will be active. <pre style===Intruder Lockout Settings===[[image"white-space:password-006.png]] These settings determine the actions that should be taken if someone attempts to log into your copy of [[SmartSimple]]. * '''Number of Attempts''' – the number of attempts to log in with an account before the account is locked. * '''Lockout Duration''' – the duration of the account lockout. The [[User|user]] will not be able to log in during this period. Period can be set to 5 minutes, 15 minutes, 30 minutes, 1 hour, 3 hours, 12 hours, 24 hours or forever (until unlocked by [[Administrator|administrator]]). * '''Lockout Message''' o-pre-wrap; word-wrap: break- a custom message to display to users when a user is locked out due to too many failed login attempts. This message will only display when a user has been locked out, and attempts to log in again with the correct password. Therefore, no information will be divulged to users that fail their login. * The '''View Locked Users''' tab will display all [[User|users]] that have had their account locked. * If a user is locked, you can click on the '''Set Password''' button on the '''View Locked Users''' tab to reactivate the account and send the [[User|user]] a new [[Password|password]].  * ''Once an account has been locked for exceeding the number of permitted login attempts it will remain on the word;"locked users" list until the correct password is entered. This allows the administrator to see which users have been unable to log in, even if the configured lockout duration has passed and the account is no longer technically locked.>&lt;!--@sslogic('@langid@* ='2'When an account has been locked for exceeding the allotted number of attempts, after the lockout time has passed they are permitted only one attempt at the correct password. A single incorrect password at this point will re)-lock the account for the configured lockout duration. In other words, once someone is on the "locked user" list they are only permitted a single wrong attempt and they will be locked for the lockout duration again. This prevents would-be intruders from having multiple attempts to guess the password each time the lockout duration has passed>&lt;br>@system. '' ===Password Reset Message===[[image:passwordPolicy -005.png]] This feature provides the ability to overwrite the standard Password Reset message with a custom message for your organization.   ===Intruder Email Alert===These settings define who should be informed by email if an intruder alert is detected. A default emial template is used and contains the following values: [[File:10French@&lt;!-12-2016 1@else-15-24 PM.png]] The Default template uses the primary contact on the root company record to populate the '''Email To'''.  You can save the default template and then modify ifrequired. * '''Email From''' – the “from” address for the email. If you do not set this value, the address: '''donotreply>&lt;br>@smartsimplesystem.com''' will be used.* '''Email To''' – select the [[Internal|internal]] people to receive the email.* '''Subject''' – the subject of the email. See below for the variables that you can use in the subject.* '''Body''' – the body of the alert email. See below for the variables that you can use in the body. '''Intruder Alert Email Variables''' – because the [[User|user]] is not logged into the system, the amount of information available is limited to IP Address '''Password Policy@ip&lt;!--@''', the attempted username '''@username@''' and dateend--></time '''@now@''' of the attempted login.  pre>===Intruder LogLockout Settings and Intruder Email Alert===The third tab in '''View LogPassword and Activation Policies, ''' tab is used to access the called '''Intruder AlertSettings, ''' log. [[Image:Glob13.png]] * The list can be sorted by clicking will determine the column title.* You can filter the list by [[Username|username]], year, and month.  ===Hierarchical Password Policy===When viewing a company in your hierarchy, select '''Settings > Password Policy''' to define. <br/><br/> A different password policy can actions that should be defined for each company within the system. <br/><br/> If there are password policies defined for a company then it will automatically apply taken if someone attempts to all sub-companies in the log into your copy of [[Creating_an_Organization_Chart_and_Company_Hierarchy|hierarchySmartSimple]], unless those sub-companies have defined their own password policy. <br/><br/> If there are no password policies defined for a company, then the system will look at the companies above it in the hierarchy, and if one of these parent companies have a password policy set then it will use these settingsbut cannot provide accurate credentials. <br/><br/>
If there are no :: [[File:Intruder alert settings new.png|600px|border]]{| class="wikitable"|-||'''Number of Attempts'''||Enter a number from 1-32 that will denote the amount of times someone can ''attempt ''to log in with an account (that is, with an incorrect password policies defined for ) before that account is locked. |-||'''Lockout Duration'''||Select from a company, or any number of options the companies above it in duration of the hierarchyaccount lockout. Within this period, then the password policy set user will have no ability to log in [[Global_Settings|Global Settings]] will apply, even if their credentials are correct.<br/><br/> 
* Options: 5 minutes, 15 minutes, 20 minutes, 1 hour, 3 hours, 12 hours, 24 hours or Forever* ''NOTE'Note: '''If the ''' There are Forever '''option is selected for the lockout duration, the user will have no settings stored in the database for a company until someone actually opens access to login ''until ''manually unlocked by the Password Policy page for that company and clicks Save.[[Global User Administrator|System Administrator]] 
==View Locked Users==|}This option is only available from the Password Policy on the [[Category:Global Settings|Global settings]]. It cannot be accessed for The latter half of this page has the individual Password policies for heading '''Intruder Email Alert - '''using a default template, it allows you to customize the different companies in your organizations hierarchyemail alert when someone has been locked out because of intruding attempts. 
{| class="wikitable"|-||'''Email From'''||The From Address for the email alert. If you do not manually set this value, then the address '''donotreply@smartsimple.com '''will be used.|-||'''Email To'''||Select the [[Image:ViewLockedUsers.png|1000pxInternal]]people to receive the email alert. Click the '''binoculars icon '''for a full list of internal staff, from which you can select who to send the email alert to.
The * '''View Locked UsersNote: ''' tab The Default Template will display all use the [[Organization hierarchy#Organization Ownership|primary contact]] of the [[UserThe Root Company|usersroot organization]] that have had their account lockedto populate the '''Email To '''field. 
* Once an account has been locked for exceeding |-||'''Subject'''||The subject of the email. |-||'''Body'''||'''Sample Template - '''Clicking this will populate the number text window automatically with a template of permitted login attempts it what the email alert will contain. It will remain on include [[System Variables]]. |}'''Intruder Alert Email Variables''' – because the [[User|user]] is not logged into the "locked users" list until system, the correct password amount of information available is entered. This allows the administrator to see which users have been unable limited to log inIP Address '''@ip@''', even if the configured lockout duration has passed and attempted username '''@username@''' and date/time '''@now@''' of the account is no longer technically lockedattempted login.
* When an account has been locked for exceeding the alloted number of attempts, after the lockout time has passed they are permitted only one attempt at the correct password. A single incorrect password at this point ===Locked Users===The '''Locked Users '''tab will re-lock the display a [[List View Overview|list]] of all users that have had their account for the configured lockout duration. In other words, once someone is on the "locked user" list they are only permitted a single wrong attempt and they will be locked for the lockout duration again. This prevent would-be intruders from having multiple attempts to guess the password each time the lockout duration has passed. 
* :: [[File:Locked user lists.png|800px|border]]If a user is locked, you can click on the the '''Set Password''' button  button on the '''View Locked Users''' tab to reactivate the account and send the the [[User|user]] a new  a new [[Password|password]].
Once an account has been locked for exceeding the number of permitted login attempts, it will remain on the '''Locked Users '''list until the correct password is entered. This allows the SysAdmin to see which users have been unable to log in, even if the configured lockout duration has passed and the account is no longer technically locked.
==View Expired Users==This option is only available from When an account has been locked for exceeding the Password Policy on number of permitted login attempts, after the [[Category:Global Settings|Global settings]]. It can not be accessed for the individual Password policies for lockout time has passed they are permitted only ''ONE ''attempt at the different companies in your organizations hierarchycorrect password. 
[[Image:ViewExpiredUsers* A single incorrect password at this point will '''re-lock '''the account for the configured lockout duration.png|1000px]] * This is a preventative measure so that would-be intruders do not have multiple attempts to guess the password each time the lockout duration has passed. 
* The ===Disabled Inactive Users===This function is only available from '''View Expired UsersGlobal Settings > Security > Password and Activation Policies; ''' tab will display all it is not accessible from individual password policies for the different companies in your [[UserOrganization hierarchy|usersorganization hierarchy]] that had their accounts disabled due to [[Password_Policy#Section_1:_Persistent_Login_and_Expiration_of_Inactive_Accounts|inactivity]]. There will be page navigation options if there is an overly long list. 
* Once an account has been expired for having been :: [[File:Disabled inactive for longer that users.png|800px|border]] Similarly to the permitted number '''Locked Users '''tab, the '''Disabled Inactive ''''''Users '''tab will provide a [[List View Overview|list]] of days it will remain on the "all expired [[User|users" list until their password is reset]] in your system. This allows the administrator to see which users Their accounts have been expiredas a result of inactivity and a disabling that can be configured after a certain amount of time (see [[Password Policy#Disable Inactive Accounts and Activation Settings|Disable Inactive Accounts]].
* Once an account has been disabled as a result of overly long inactivity, the user will remain on this list until their password is reset. This allows the SysAdmin to see which users have had their accounts disabled because of inactivity.* If a an inactive user is expireddisabled, you can click on the there will be a '''Send PasswordPassword ''' button next to reactivate their name on this tab - that way, you can reactive the account and send the [[User|user]] a new [[Password|password]]with which they can log into the system.
==Single Sign-On==
Smartstaff, administrator
60
edits

Navigation menu