Identikey Administration Logon (Policy)
  • 16 Oct 2024
  • 1 Minute à lire
  • Sombre
    Lumière

Identikey Administration Logon (Policy)

  • Sombre
    Lumière

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

The following is an overview of the relevant default settings of an administration logon with the Authentication component of OneSpan Cloud Authentication.

Identikey Administration Logon—Default parameter settings    

Parameter name

Default value

Description

pwd_diff_to_prev

0

Different From Last # Passwords

Specifies how many different passwords must be used before a previously used password can be used again.

Possible values: 024

pwd_min_length

20

Minimum Password Length

Sets the minimum length required for the static password.

Possible values: 09999

pwd_not_userid_based

No

Not based on user ID

This specifies whether the password is allowed to contain all or parts of the user ID.

Possible values:

  • Default. Use the setting of the parent policy.

  • No. Disables this option.

  • Yes. Enables this option.

static_pwd_max_age

0

Maximum Age in Days

This specifies the maximum amount of time in days during which a local static password is valid. After this time, the password expires. Applies to the local authentication mode DIGIPASS or Password only.

If set to 0, the local static password never expires. Select this to disable local static password expiration if you are using back-end authentication, and to rely on the back-end system to enforce password expiration.

Changes in back-end authentication settings must be implemented by OneSpan administrators.

Possible values: 09999

static_pwd_min_age

0

Minimum Age in Days

This specifies the minimum amount of time in days a static password must be used before it can be changed. It applies to the local authentication mode DIGIPASS or Password only.

dp_type_limit

  • DAL10: one per user

    DAL10 is an MDL license.

  • VIR10: one per user

    VIR10 is a virtual authenticator.

Authenticator Type Limit

Limits of authenticator instances per authenticator type.

Limit of authenticator instances per authenticator type.

This setting allows you to restrict the maximum number of assigned authenticators per user for specific authenticator types. If you need to have more than one authenticator provided to your users, you should still limit the number to avoid that too many authenticators (and/or instances) are assigned to or activated for single users.

For single-device licensing, it is possible to limit the number of assigned authenticators; for multi-device activation/multi-device licensing the setting limits the number of assigned authenticator licenses and activated authenticator instances.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle