Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

As part of this enhancement, Qbyte Metrix now supports password aging and password verification. This functionality is implemented by leveraging Oracle’s functionality in this area. It is accomplished by creating Database (DB) profiles and then assigning these profiles to DB users. Qbyte Metrix traps various Oracle messages and displays appropriate error messages to the user. Note:

Aura panel
summaryNote
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

Please consult Oracle documentation for information on how to setup Oracle profiles for this purpose.

Requiring a Qbyte Metrix user to be first setup as an Oracle database user provides the client with the ability to set customized password security rules to handle the following situations:

...

  • Password Strength. Password strength is the length of password and the requirement for combinations of numbers, letters and special character. Note:

Aura panel
summaryNote
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

The special characters that are not valid for password use " ` ~ & |

  • Lock out period after failed attempts. The lock out period is the number of failed attempts that will be allowed before a user is locked out and the length of time the user will be locked out.

...

In both cases, any validation errors that are encountered during the password change process will be displayed at the top of the window:

...

Aura panel
summaryNote
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

Once the password is changed, the user must log-out of Qbyte Metrix and log back in for the new password to take effect.

Impact on Hosted Clients

Access Management is the utility that creates and maintains all users for hosted clients. This section is intended to describe how the changes are reflected in a hosted client’s environment.

...