<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Account Lockout Setting on Open VMS 7.3.2 Operating System in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147518#M39346</link>
    <description>Calene,&lt;BR /&gt;&lt;BR /&gt;You want to look at the LGI* SYSGEN parameters.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_DISUSER (D)&lt;BR /&gt;LGI_BRK_DISUSER turns on the DISUSER flag in the UAF record when an&lt;BR /&gt;attempted break-in is detected, thus permanently locking out that account. The&lt;BR /&gt;parameter is off ( 0 ) by default. You should set the parameter ( 1 ) only under&lt;BR /&gt;extreme security watch conditions, because it results in severely restricted user&lt;BR /&gt;service.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_LIM (D)&lt;BR /&gt;LGI_BRK_LIM specifies the number of failures that can occur at login time&lt;BR /&gt;before the system takes action against a possible break-in. The count of failures&lt;BR /&gt;applies independently to login attempts by each user name, terminal, and node.&lt;BR /&gt;Whenever login attempts from any of these sources reach the break-in limit&lt;BR /&gt;specified by LGI_BRK_LIM, the system assumes it is under attack and initiates&lt;BR /&gt;evasive action as specified by the LGI_HID_TIM parameter.&lt;BR /&gt;The minimum value is 1. The default value is usually adequate.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_TMO (D)&lt;BR /&gt;LGI_BRK_TMO specifies the length of the failure monitoring period. This time&lt;BR /&gt;increment is added to the suspectâ  s expiration time each time a login failure&lt;BR /&gt;occurs. Once the expiration period passes, prior failures are discarded, and the&lt;BR /&gt;suspect is given a clean slate.&lt;BR /&gt;&lt;BR /&gt;LGI_HID_TIM (D)&lt;BR /&gt;LGI_HID_TIM specifies the number of seconds that evasive action persists&lt;BR /&gt;following the detection of a possible break-in attempt. The system refuses to&lt;BR /&gt;allow any logins during this period, even if a valid user name and password are&lt;BR /&gt;specified.&lt;BR /&gt;&lt;BR /&gt;LGI_RETRY_LIM (D)&lt;BR /&gt;LGI_RETRY_LIM specifies the number of retry attempts allowed users&lt;BR /&gt;attempting to log in. If this parameter is greater than 0, and a legitimate user&lt;BR /&gt;fails to log in correctly because of typing errors, the user does not automatically&lt;BR /&gt;lose the carrier. Instead (provided that LGI_RETRY_TMO has not elapsed),&lt;BR /&gt;by pressing the Return key, the user is prompted to enter the user name and&lt;BR /&gt;password again. Once the specified number of attempts has been made without&lt;BR /&gt;success, the user loses the carrier. As long as neither LGI_BRK_LIM nor LGI_&lt;BR /&gt;BRK_TMO has elapsed, the user can dial in again and reattempt login.&lt;BR /&gt;&lt;BR /&gt;LGI_RETRY_TMO (D)&lt;BR /&gt;LGI_RETRY_TMO specifies the number of seconds allowed between login retry&lt;BR /&gt;attempts after each login failure. (Users can initiate login retries by pressing the&lt;BR /&gt;Return key.) This parameter is intended to be used with the LGI_RETRY_LIM&lt;BR /&gt;parameter; it allows dialup users a reasonable amount of time and number of&lt;BR /&gt;opportunities to attempt logins before they lose the carrier.&lt;BR /&gt;</description>
    <pubDate>Wed, 20 Feb 2008 03:45:56 GMT</pubDate>
    <dc:creator>Bill Hall</dc:creator>
    <dc:date>2008-02-20T03:45:56Z</dc:date>
    <item>
      <title>Account Lockout Setting on Open VMS 7.3.2 Operating System</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147516#M39344</link>
      <description>Dear all,&lt;BR /&gt;&lt;BR /&gt;Would like to know if it is possible to set the account lockout duration for Open VMS 7.3.2 user account to '0' (or until System Administrator unlocks the account?) For further elaboration, please refer below:&lt;BR /&gt;&lt;BR /&gt;The "HP Advanced Server for OpenVMS&lt;BR /&gt;Server Administrator's Guide" provided the following guideline for setting the Account Lockout Duration:&lt;BR /&gt;&lt;BR /&gt;"Whether a user account is locked out after a specified number of failed attempts to logon --- use the SET ACCOUNT POLICY/LOCKOUT=keyword command. To enable account lockout, you must specify the following three keywords and their values with the /LOCKOUT qualifier:&lt;BR /&gt;&lt;BR /&gt;* ATTEMPTS=n, where n specifies the number of failed attempts to allow before locking the user account.&lt;BR /&gt;* DURATION=n, where n specifies the number of minutes before a locked account is automatically unlocked. The value of this parameter must be greater than, or equal to, the value set for the WINDOW parameter.&lt;BR /&gt;* WINDOW=n, where n specifies the number of minutes to wait after a user account has been locked out, before resetting the logon count."&lt;BR /&gt;&lt;BR /&gt;The big question is, is it possible to set the "Duration=n" value to infinity/indefinite until the administrator unlocks the account?&lt;BR /&gt;&lt;BR /&gt;For illustration purposes, in the Windows environment, it is possible to set the "account lockout duration" value to 0 using the Active Directory. This means the user account will be lockout indefinitely until the Security Administrator unlocks it.Hence, would like to know if it is possible to do the same for Open VMS 7.3.2 operating system.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance!</description>
      <pubDate>Wed, 20 Feb 2008 02:47:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147516#M39344</guid>
      <dc:creator>Calene</dc:creator>
      <dc:date>2008-02-20T02:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Account Lockout Setting on Open VMS 7.3.2 Operating System</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147517#M39345</link>
      <description>Duplicate thread and duplicate question (probably yet another ITRC glitch); another and active thread is over at at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums12.itrc.hp.com/service/forums/questionanswer.do?threadId=1205318" target="_blank"&gt;http://forums12.itrc.hp.com/service/forums/questionanswer.do?threadId=1205318&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Feb 2008 03:38:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147517#M39345</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2008-02-20T03:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Account Lockout Setting on Open VMS 7.3.2 Operating System</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147518#M39346</link>
      <description>Calene,&lt;BR /&gt;&lt;BR /&gt;You want to look at the LGI* SYSGEN parameters.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_DISUSER (D)&lt;BR /&gt;LGI_BRK_DISUSER turns on the DISUSER flag in the UAF record when an&lt;BR /&gt;attempted break-in is detected, thus permanently locking out that account. The&lt;BR /&gt;parameter is off ( 0 ) by default. You should set the parameter ( 1 ) only under&lt;BR /&gt;extreme security watch conditions, because it results in severely restricted user&lt;BR /&gt;service.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_LIM (D)&lt;BR /&gt;LGI_BRK_LIM specifies the number of failures that can occur at login time&lt;BR /&gt;before the system takes action against a possible break-in. The count of failures&lt;BR /&gt;applies independently to login attempts by each user name, terminal, and node.&lt;BR /&gt;Whenever login attempts from any of these sources reach the break-in limit&lt;BR /&gt;specified by LGI_BRK_LIM, the system assumes it is under attack and initiates&lt;BR /&gt;evasive action as specified by the LGI_HID_TIM parameter.&lt;BR /&gt;The minimum value is 1. The default value is usually adequate.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_TMO (D)&lt;BR /&gt;LGI_BRK_TMO specifies the length of the failure monitoring period. This time&lt;BR /&gt;increment is added to the suspectâ  s expiration time each time a login failure&lt;BR /&gt;occurs. Once the expiration period passes, prior failures are discarded, and the&lt;BR /&gt;suspect is given a clean slate.&lt;BR /&gt;&lt;BR /&gt;LGI_HID_TIM (D)&lt;BR /&gt;LGI_HID_TIM specifies the number of seconds that evasive action persists&lt;BR /&gt;following the detection of a possible break-in attempt. The system refuses to&lt;BR /&gt;allow any logins during this period, even if a valid user name and password are&lt;BR /&gt;specified.&lt;BR /&gt;&lt;BR /&gt;LGI_RETRY_LIM (D)&lt;BR /&gt;LGI_RETRY_LIM specifies the number of retry attempts allowed users&lt;BR /&gt;attempting to log in. If this parameter is greater than 0, and a legitimate user&lt;BR /&gt;fails to log in correctly because of typing errors, the user does not automatically&lt;BR /&gt;lose the carrier. Instead (provided that LGI_RETRY_TMO has not elapsed),&lt;BR /&gt;by pressing the Return key, the user is prompted to enter the user name and&lt;BR /&gt;password again. Once the specified number of attempts has been made without&lt;BR /&gt;success, the user loses the carrier. As long as neither LGI_BRK_LIM nor LGI_&lt;BR /&gt;BRK_TMO has elapsed, the user can dial in again and reattempt login.&lt;BR /&gt;&lt;BR /&gt;LGI_RETRY_TMO (D)&lt;BR /&gt;LGI_RETRY_TMO specifies the number of seconds allowed between login retry&lt;BR /&gt;attempts after each login failure. (Users can initiate login retries by pressing the&lt;BR /&gt;Return key.) This parameter is intended to be used with the LGI_RETRY_LIM&lt;BR /&gt;parameter; it allows dialup users a reasonable amount of time and number of&lt;BR /&gt;opportunities to attempt logins before they lose the carrier.&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Feb 2008 03:45:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/account-lockout-setting-on-open-vms-7-3-2-operating-system/m-p/4147518#M39346</guid>
      <dc:creator>Bill Hall</dc:creator>
      <dc:date>2008-02-20T03:45:56Z</dc:date>
    </item>
  </channel>
</rss>

