<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2 in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151894#M100614</link>
    <description>Using uaf.zip I am able to query authorize by non-standard criteria as provided by itself in uaf. Hence, I am able now to display all disabled users with pwdmix set and so on.&lt;BR /&gt;&lt;BR /&gt;Also, I have found a code in macro 32 which allows to force password complexity to user. I am able to specify the level of complexity between lower, upper, number and special characters. Very convenient.&lt;BR /&gt;&lt;BR /&gt;Thank you.</description>
    <pubDate>Mon, 02 Feb 2009 08:29:19 GMT</pubDate>
    <dc:creator>Thanassis Papadimitriou</dc:creator>
    <dc:date>2009-02-02T08:29:19Z</dc:date>
    <item>
      <title>password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151853#M100573</link>
      <description>I would like to enforce all users to enter password strings containing at least 3 characters from 1 upper, 1 lower, 1 numeric and 1 special character.&lt;BR /&gt;&lt;BR /&gt;I know that this is enabled per user by assigning /pwdmix flag to the account. But, it is limited to upper, lower characters.&lt;BR /&gt;&lt;BR /&gt;It is time consuming to write down a new code using VMS$PASSWORD_POLICY.EXAMPLE, can we find any existing code to use.&lt;BR /&gt;&lt;BR /&gt;I would like to be able to specify the number of upper, lower, numeric and special that a password must contain and also to define the total number of complexity characters that the password must at least contain.</description>
      <pubDate>Thu, 22 Jan 2009 09:25:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151853#M100573</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T09:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151854#M100574</link>
      <description>&lt;BR /&gt;Too complex? because the examples are written in ADA and Bliss ?&lt;BR /&gt;&lt;BR /&gt;maybe start with this example, if You can handle C source:&lt;BR /&gt; &lt;A href="http://wwwvms.mppmu.mpg.de/vmssig/src/c/VMS$PASSWORD_POLICY.C" target="_blank"&gt;http://wwwvms.mppmu.mpg.de/vmssig/src/c/VMS$PASSWORD_POLICY.C&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 09:42:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151854#M100574</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T09:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151855#M100575</link>
      <description>Yes, it is complex.&lt;BR /&gt;&lt;BR /&gt;But, the C example is to weak to use. It counts only digits.&lt;BR /&gt;&lt;BR /&gt;What I need is the following:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/643" target="_blank"&gt;http://64.223.189.234/node/643&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;it is written in Macro 32. Can you help me and guide how to install it in my platform?</description>
      <pubDate>Thu, 22 Jan 2009 10:23:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151855#M100575</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T10:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151856#M100576</link>
      <description>&amp;gt; But, the C example is to weak to use. It counts only digits.&lt;BR /&gt;&lt;BR /&gt;Yes, I meant start with this example, and extend it, or You are no C programmer and have none available ?&lt;BR /&gt;&lt;BR /&gt;The Macro code on Hoffs site seems to be ready to be used: follow the "usage" comment: Macro,link,copy the .EXE to sys$common:[syslib], and set the system parameter  LOAD_PWD_POLICY to 1.&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 10:42:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151856#M100576</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T10:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151857#M100577</link>
      <description>forgot in the list the INSTALL command of course after copying the module to sys$common:[syslib].&lt;BR /&gt;And also note to do the INSTALL from systartup_vms.com !</description>
      <pubDate>Thu, 22 Jan 2009 11:03:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151857#M100577</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T11:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151858#M100578</link>
      <description>Thanassis,&lt;BR /&gt;&lt;BR /&gt;These examples were never meant as finished products. They are merely examples of the means and methods to interface a custom password policy module.&lt;BR /&gt;&lt;BR /&gt;Since OpenVMS is language agnostic, it is possible to write such a module in any language that one (or one's colleagues) is familiar with, with the possible direct exceptions of non-compiled languages such as Java, PERL, and DCL).&lt;BR /&gt;&lt;BR /&gt;Alternatively, outside expertise may be retained to implement what ever policy is eventually decided. (Disclosure: We do provide services in this area, as do other frequent contributors to this forum).&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Thu, 22 Jan 2009 11:18:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151858#M100578</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2009-01-22T11:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151859#M100579</link>
      <description>Robert,&lt;BR /&gt;&lt;BR /&gt;Thank you for your input but the code in macro 32 works fine. I managed to make it function.&lt;BR /&gt;&lt;BR /&gt;I have tested it in OpenVMS 7.3-2 &amp;amp; OpenVMS 7.2-1 and I got results in each OS version tested.&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 12:03:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151859#M100579</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T12:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151860#M100580</link>
      <description>Joseph,&lt;BR /&gt;&lt;BR /&gt;I did what is written in usage guides. But, I issued the INSTALL from command prompt. Should I add an INSTALL line in the startup file as well to enable VMS$PASSWORD_POLICY whenever the server is rebooted?&lt;BR /&gt;&lt;BR /&gt;BR,</description>
      <pubDate>Thu, 22 Jan 2009 12:08:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151860#M100580</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T12:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151861#M100581</link>
      <description>Thanassis,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;Should I add an INSTALL line in the startup file as well to enable VMS$PASSWORD_POLICY whenever the server is rebooted?&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;BR /&gt;Most definitely, YES!!!&lt;BR /&gt;&lt;BR /&gt;If you set the LOAD_PWD_POLICY, and do NOT do the install,then there is NO way to log into the system at all!&lt;BR /&gt;(if that SHOULD happen, you must boot conversational, unset it, (so you can log in again) and put the INSTALL in the startup, set LOAD_PWD_POLICY again, and reboot again. No pretty prospect)&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Thu, 22 Jan 2009 12:44:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151861#M100581</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2009-01-22T12:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151862#M100582</link>
      <description>As I have written, put the INSTALL into sysstartup_vms.com,&lt;BR /&gt;this means it is executed at reboot.&lt;BR /&gt;&lt;BR /&gt;And at best follow the advice of Stephen Hoff. NOT  to set the system parameter LOAD_PWD_POLICY permanent to 1, but do it at the ACTIVE sysgen parameter set at every boot;&lt;BR /&gt; this way the parameter stays at 0 when sysartup_vms is aborted for whatever reason.&lt;BR /&gt;&lt;BR /&gt;At best, put the INSTALL together with the SYSGEN commands into a separate commandfile, executed towards the end of systartup-vms.</description>
      <pubDate>Thu, 22 Jan 2009 13:13:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151862#M100582</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T13:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151863#M100583</link>
      <description>To Jans warning: No, it is not so catastrophic to have load_pw_policy set to 1 without installing the policy image: one still can login, only SET PASSWORD will fail in this case. See my example session below.&lt;BR /&gt;&lt;BR /&gt;Username: huber&lt;BR /&gt;Password: &lt;BR /&gt;        Welcome ...&lt;BR /&gt;&lt;BR /&gt;MPIW12_HUB&amp;gt;mcr sysgen      &lt;BR /&gt;SYSGEN&amp;gt;  SHOW LOAD_PWD_POLICY &lt;BR /&gt;Parameter Name           Current    Default     Min.      Max.     Unit  Dynamic&lt;BR /&gt;--------------           -------    -------    -------   -------   ----  -------&lt;BR /&gt;LOAD_PWD_POLICY                 1          0         0          1 Boolean    D&lt;BR /&gt;SYSGEN&amp;gt;   Exit &lt;BR /&gt;MPIW12_HUB&amp;gt;set password&lt;BR /&gt;%LIB-F-ACTIMAGE, error activating image SYS$LIBRARY:VMS$PASSWORD_POLICY.EXE&lt;BR /&gt;-SYSTEM-F-PRIVINSTALL, shareable images must be installed to run privileged imag&lt;BR /&gt;e&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 13:24:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151863#M100583</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T13:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151864#M100584</link>
      <description>Ah, this explains the spike in traffic arriving on that article.  &lt;BR /&gt;&lt;BR /&gt;If you have questions, it's a whole lot easier (for me and then for any other folks that are subsequently looking at the article) if the questions are posted over at /node/643.  Accounts are free, too.  (I have enabled the registration process to keep the site from filling from spam.)&lt;BR /&gt;&lt;BR /&gt;I've updated the comments in the article to more explicitly point to the need of some DCL commands in the system startup or in a filter-specific startup procedure.&lt;BR /&gt;&lt;BR /&gt;The security auditors love this password character selection stuff.  It doesn't work, though.  It's akin to reorganizing the deck chairs on the Titanic.  Password-based authentication is among the weakest options, and it's particularly bad when combined with telnet and ftp and such; cleartext authentication protocols.&lt;BR /&gt;&lt;BR /&gt;Some related reading:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/229" target="_blank"&gt;http://64.223.189.234/node/229&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Then...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/219" target="_blank"&gt;http://64.223.189.234/node/219&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/526" target="_blank"&gt;http://64.223.189.234/node/526&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://64.223.189.234/node/832" target="_blank"&gt;http://64.223.189.234/node/832&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I've also added a passwords tag to the HL site, and sprinkled it around various of the password-related sites.&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 14:30:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151864#M100584</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-01-22T14:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151865#M100585</link>
      <description>Thank you all,&lt;BR /&gt;&lt;BR /&gt;I kept notes on what i have to do to enable password filtering. The only thing I have to do is to write a command procedure which will include the INSTALL and sysgen invocation. After that I have to update systartup_vms.com to call at the bottom the newly created procedure.&lt;BR /&gt;&lt;BR /&gt;Since you mentioned clear text transmission of passwords over telnet &amp;amp; ftp, does this password filtering work over ssh?</description>
      <pubDate>Thu, 22 Jan 2009 14:43:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151865#M100585</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T14:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151866#M100586</link>
      <description>Yes of course, if You login via SSH, then everything flowing over this link is encrypted,&lt;BR /&gt;thus the password in a SET PASSWORD command is encrypted.&lt;BR /&gt;&lt;BR /&gt;This has in particular nothing to do with password policy, it is just the purpose and result of the SSH connection.</description>
      <pubDate>Thu, 22 Jan 2009 15:22:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151866#M100586</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-22T15:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151867#M100587</link>
      <description>In OpenVMS 7.3-1 /pwdmix flag does not exist. Does anybody know if there is an alternative solution for that without the need to upgrade to OpenVMS 7.3-2. /pwdmix flag exists in OpenVMS 7.3-2.</description>
      <pubDate>Thu, 22 Jan 2009 15:27:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151867#M100587</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-22T15:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151868#M100588</link>
      <description>There is no supported means to back-port the mixed-case password mechanisms to V7.3-1.&lt;BR /&gt;&lt;BR /&gt;Better to spend the effort here moving forward to V7.3-2 (which itself is ancient, albeit with Prior Version Support still available) or (better) upgrading to the current OpenVMS Alpha V8.3 release.&lt;BR /&gt;&lt;BR /&gt;Moving from V7.3-1 to V8.3 is arguably not a major upgrade for OpenVMS Alpha; there were minor kernel changes all through the range, and the V7 to V8 upgrade did not (on OpenVMS Alpha) involve significant kernel changes.  In retrospect, the TQE kernel change from V7.3-1 to V7.3-2 probably caused more ripples than V7 to V8.&lt;BR /&gt;&lt;BR /&gt;OpenVMS Alpha V8.3 also adds external authentication into your local LDAP (Active Directory or Open Directory or otherwise) and various other password-related features.&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2009 15:51:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151868#M100588</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-01-22T15:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151869#M100589</link>
      <description>When the user logs in OpenVMS 7.3-2 with pwdmix set and VMS$PASSWORD_POLICY is in place then the user is allowed to enter case sensitive passwords and system interprets these passwords as case sensitive.&lt;BR /&gt;&lt;BR /&gt;Is there a way that we can tell somehow OpenVMS 7.3-1 to accept and interpret case sensitive passwords?</description>
      <pubDate>Fri, 23 Jan 2009 13:42:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151869#M100589</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-23T13:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151870#M100590</link>
      <description>&amp;gt;Is there a way that we can tell somehow OpenVMS 7.3-1 to accept and interpret case sensitive passwords?&lt;BR /&gt;&lt;BR /&gt;No.&lt;BR /&gt;&lt;BR /&gt;A requirement for mixed-case passwords is not compatible with continued use of OpenVMS Alpha V7.3-1.&lt;BR /&gt;&lt;BR /&gt;AFAIK, there is no back-port available.  (This back-port would likely involve changes made to multiple OpenVMS modules and components, too.  It's not a single and isolated change.)&lt;BR /&gt;&lt;BR /&gt;Your choice here is between use of uppercase passwords and upgrading OpenVMS Alpha.&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Jan 2009 17:17:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151870#M100590</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-01-23T17:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151871#M100591</link>
      <description>I have a last question.&lt;BR /&gt;&lt;BR /&gt;Regarding UAF.ALPHA_EXE I observed that I cannot run a query at UAF records having /SELECT=flag=pwdmix.&lt;BR /&gt;&lt;BR /&gt;Also, when I ask to print out the flags a user has, using /DISPLAY=(username,flags), although flag /pwdmix has been assigned and show user displays among other flags pwdmix as well, all other flags are displayed apart from pwdmix.&lt;BR /&gt;&lt;BR /&gt;Do you if there is an updated UAF.ALPHA_EXE which may run queries based on flag=pwdmix?</description>
      <pubDate>Sat, 24 Jan 2009 08:59:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151871#M100591</guid>
      <dc:creator>Thanassis Papadimitriou</dc:creator>
      <dc:date>2009-01-24T08:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: password complexity enforcement for OpenVMS 7.3-1 and OpenVMS 7.3-2</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151872#M100592</link>
      <description>You have the complete source, why not update it  ?&lt;BR /&gt;(I myself have no VMS version new enough).&lt;BR /&gt;&lt;BR /&gt;Extract module UAFDEF from sys$library:sys$lib_c.tlb.&lt;BR /&gt;Look for the flag bits inserted after DISPWDHIS  ,&lt;BR /&gt;add the new ones in the files uafcld.cld and uaf_cld.h, @compile.&lt;BR /&gt;I think that should do it.&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jan 2009 13:08:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/password-complexity-enforcement-for-openvms-7-3-1-and-openvms-7/m-p/5151872#M100592</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2009-01-26T13:08:12Z</dc:date>
    </item>
  </channel>
</rss>

