Xerox FREEFLOW 701P46740 Manuel de sécurité - Page 24

Parcourez en ligne ou téléchargez le pdf Manuel de sécurité pour {nom_de_la_catégorie} Xerox FREEFLOW 701P46740. Xerox FREEFLOW 701P46740 38 pages. Print server

Xerox FREEFLOW 701P46740 Manuel de sécurité

Strong Passwords

20
NOTE: Please be aware that Xerox Customer Support Personnel
must have access to the new root password for service and
support. It is the customer's responsibility to ensure that the root
and system administrator passwords are available for them.
The Xerox FreeFlow Print Server provides additional security for
users required to adhere to strict security guidelines. It provides a
means in which a strong password policy can be enforced.
Strong Passwords can be Enabled and Disabled (default setting)
via the Password Policies window.
Strong passwords must consist of ALL of the following
A minimum of 8 characters in length
Contain at least one capital letter
Contain at least one number
Contain at least one special character {!, @, #, $, %, ^, &, *},
including open and close parentheses { ( ) }, hyphen{ - },
underscore{ _ }, and period{ . }.
NOTE: The strong password requirements cannot be modified. A
strong password cannot be set for root or any other Solaris user
accounts that are not created by the Xerox FreeFlow Print Server.
NOTE: Remote Network Server: If running NIS+ name service,
strong passwords would be enforced via the NIS + server.
This policy can be set by using the -a <# of allowed attempts>
argument with rpc.nispasswdd. For example, to limit users to no
more than four attempts (the default is 3), you would type:
rpc.nispasswd -a 4.
How to Enable/Disable Strong Password
From the Setup menu select [Users and Groups]
From the Policies drop down menu select [Password]
Enable/Disable Strong Password from the Password Policies
window. The default setting is "Disable".
Login Attempts Allowed
The Xerox FreeFlow Print Server has provided a means to lockout
users after reaching the maximum number of consecutive
attempts. Once this is done, the user will need to apply (reset) a
security policy and reboot the system.
The number of failed attempts and enable/disable is configurable
via the Password Policy screen. When enabled, login attempts
can be set from 1-6 attempts before the user is locked out. This
Security Guide