<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Passwords</title>
    <link>/en/security-and-authentication/client-authentication/hash-authentication/passwords/</link>
    <description>Recent content in Passwords on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/security-and-authentication/client-authentication/hash-authentication/passwords/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Security-and-Authentication: Profiles</title>
      <link>/en/security-and-authentication/client-authentication/hash-authentication/passwords/profiles/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/hash-authentication/passwords/profiles/</guid>
      <description>
        
        
        &lt;p&gt;You can set password policies for users by assigning them profiles. You can create multiple profiles to manage the password policies for several categories of users. For example, you could create one profile for interactive users that requires frequent password changes and another profile for user accounts that never requires password changes.&lt;/p&gt;
&lt;h2 id=&#34;defining-profiles&#34;&gt;Defining profiles&lt;/h2&gt;
&lt;p&gt;You create profiles with &lt;a href=&#34;../../../../../en/sql-reference/statements/create-statements/create-profile/#&#34;&gt;CREATE PROFILE&lt;/a&gt; and alter existing profiles with &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-profile/#&#34;&gt;ALTER PROFILE&lt;/a&gt;. Both statements let you set one or more profile parameters which can control, among other things, the minimum lifetime of a password, password complexity, and password-reset rules.&lt;/p&gt;
&lt;p&gt;Each profile can specify one or more of the following policies.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;How often users must change their passwords&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How long a password must be set before it can be reset&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How many times users must change their passwords before they can reuse an old password&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How many times a user can fail to log in before the account is locked&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The required length and content of the password:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Maximum and minimum number of characters&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Minimum number of capital letters, lowercase letters, digits, and symbols required in a password&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How different a new password must be from the old password&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;assigning-profiles&#34;&gt;Assigning profiles&lt;/h2&gt;
&lt;p&gt;After you define a profile, you can assign it to new and existing users with &lt;a href=&#34;../../../../../en/sql-reference/statements/create-statements/create-user/#&#34;&gt;CREATE USER&lt;/a&gt; and &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-user/#&#34;&gt;ALTER USER&lt;/a&gt;, respectively.&lt;/p&gt;
&lt;p&gt;Changes to profile policies for password content—for example, &lt;code&gt;PASSWORD_MAX_LENGTH&lt;/code&gt; and &lt;code&gt;PASSWORD_MIN_SYMBOLS&lt;/code&gt;—affect users only when they change their passwords. OpenText™ Analytics Database does not test existing passwords to verify that they comply with new password requirements. To enforce immediate compliance with new profile requirements, use &lt;code&gt;ALTER USER...PASSWORD EXPIRE&lt;/code&gt; to immediately expire the current user&#39;s password. The next time the user logs in, the database prompts them to supply a new password, which must comply with the current policy.&lt;/p&gt;
&lt;h2 id=&#34;default-profile&#34;&gt;Default profile&lt;/h2&gt;
&lt;p&gt;Each database contains a &lt;code&gt;DEFAULT&lt;/code&gt; profile. The database assigns the default profile to users who are not explicitly assigned a profile. The default profile also sets parameters of non-default profiles in two cases:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Profile parameters that are not explicitly set by &lt;code&gt;CREATE PROFILE&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Parameters that &lt;code&gt;ALTER PROFILE&lt;/code&gt; sets to &lt;code&gt;DEFAULT&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;All parameters in the default profile are initially set to &lt;code&gt;unlimited&lt;/code&gt;. You can use &lt;code&gt;ALTER PROFILE&lt;/code&gt; to change these settings. For example, the following statement modifies the default profile parameter &lt;code&gt;PASSWORD_MIN_SYMBOLS&lt;/code&gt;. The change requires passwords to contain at least one symbol, such as $, #, @. This change affects all profiles where &lt;code&gt;PASSWORD_MIN_SYMBOLS&lt;/code&gt; is set to &lt;code&gt;default&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;ALTER PROFILE DEFAULT LIMIT PASSWORD_MIN_SYMBOLS 1;
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;profile-settings-and-client-authentication&#34;&gt;Profile settings and client authentication&lt;/h2&gt;
&lt;p&gt;The following profile settings affect &lt;a href=&#34;../../../../../en/security-and-authentication/client-authentication/&#34;&gt;client authentication methods&lt;/a&gt;, such as LDAP or GSS:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;FAILED_LOGIN_ATTEMPTS&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_LOCK_TIME&lt;/code&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;All other profile settings are used only by the database to manage its passwords.&lt;/p&gt;

&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../../en/sql-reference/system-tables/v-catalog-schema/profiles/#&#34;&gt;PROFILES&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../../../en/admin/configuring-db/config-procedure/create-an-empty-db/creating-db-name-and-password/#&#34;&gt;Creating a database name and password&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Password guidelines</title>
      <link>/en/security-and-authentication/client-authentication/hash-authentication/passwords/password-guidelines/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/hash-authentication/passwords/password-guidelines/</guid>
      <description>
        
        
        &lt;p&gt;For passwords to be effective, they must be hard to guess. You need to protect passwords from:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Dictionary-style, brute-force attacks&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Users who have knowledge of the password holder (family names, birth dates , etc.)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Use &lt;a href=&#34;../../../../../en/security-and-authentication/client-authentication/hash-authentication/passwords/profiles/#&#34;&gt;Profiles&lt;/a&gt; to enforce good password practices (password length and required content). Make sure database users know the password guidelines, and encourage them not to use personal information in their passwords.&lt;/p&gt;
&lt;p&gt;For guidelines on creating strong passwords go to &lt;a href=&#34;https://support.microsoft.com/en-us/help/4026406/microsoft-account-create-a-strong-password&#34;&gt;Microsoft Tips for Creating a Strong Password&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;../../../../../en/admin/configuring-db/config-procedure/create-an-empty-db/creating-db-name-and-password/#&#34;&gt;Creating a database name and password&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Password expiration</title>
      <link>/en/security-and-authentication/client-authentication/hash-authentication/passwords/password-expiration/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/hash-authentication/passwords/password-expiration/</guid>
      <description>
        
        
        &lt;p&gt;The following PROFILE parameters control the conditions for password expiration, new passwords, and minimum lifetime:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_LIFE_TIME&lt;/code&gt; - The number of days a password remains valid&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_MIN_LIFE_TIME&lt;/code&gt; - The number of days a password must be set before it can be changed&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_GRACE_TIME&lt;/code&gt; - The number of days a password can be used after it expires&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_REUSE_MAX&lt;/code&gt;  - The number of times you must change your password before you can reuse an earlier password&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_REUSE_TIME&lt;/code&gt; - The number of days that must pass after a password is set before you can reuse it&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;PASSWORD_MIN_CHAR_CHANGE&lt;/code&gt; - Minimum number of characters that must be different from the previous password&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details on these and other parameters, see &lt;a href=&#34;../../../../../en/sql-reference/statements/create-statements/create-profile/#&#34;&gt;CREATE PROFILE&lt;/a&gt; and &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-profile/#&#34;&gt;ALTER PROFILE&lt;/a&gt;.

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
Password expiration has no effect on current sessions.
&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;password-expiration-and-grace-period-behavior&#34;&gt;Password expiration and grace period behavior&lt;/h2&gt;
&lt;p&gt;The profile parameter &lt;code&gt;PASSWORD_LIFE_TIME&lt;/code&gt; controls the life time of a password in days. By default, the DEFAULT profile sets PASSWORD_LIFE_TIME to &lt;code&gt;UNLIMITED&lt;/code&gt;, which disables password expiration. You can change this for the DEFAULT and custom profiles with ALTER PROFILE.&lt;/p&gt;
&lt;p&gt;Normally, when a password expires, the database forces users to change their passwords the next time they log in. However, you can set a PASSWORD_GRACE_TIME to allow users to log in after their password expires. If a user logs in during their grace period, the database warns the user that their password has expired. Once this grace period ends, the user will receive a prompt to change their password.&lt;/p&gt;
&lt;h2 id=&#34;expire-a-password&#34;&gt;Expire a password&lt;/h2&gt;
&lt;p&gt;You can expire a user&#39;s password immediately using the &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-user/#&#34;&gt;ALTER USER&lt;/a&gt; statement&#39;s PASSWORD EXPIRE parameter. By expiring a password, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Force users to comply with a change to password policy.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Set a new password when a user forgets the old password.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Account locking</title>
      <link>/en/security-and-authentication/client-authentication/hash-authentication/passwords/account-locking/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/client-authentication/hash-authentication/passwords/account-locking/</guid>
      <description>
        
        
        &lt;p&gt;In a profile, you can set a password policy for how many consecutive failed login attempts a user account is allowed before locking. This locking mechanism helps prevent dictionary-style brute-force attempts to guess users&#39; passwords.&lt;/p&gt;
&lt;h2 id=&#34;set-account-locking&#34;&gt;Set account locking&lt;/h2&gt;
&lt;p&gt;Set this value using the &lt;code&gt;FAILED_LOGIN_ATTEMPTS&lt;/code&gt; parameter using the &lt;a href=&#34;../../../../../en/sql-reference/statements/create-statements/create-profile/#&#34;&gt;CREATE PROFILE&lt;/a&gt; or &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-profile/#&#34;&gt;ALTER PROFILE&lt;/a&gt; statement.&lt;/p&gt;
&lt;p&gt;OpenText™ Analytics Database locks any user account that has more consecutive failed login attempts than the value to which you set &lt;code&gt;FAILED_LOGIN_ATTEMPTS&lt;/code&gt;. The user cannot log in to a locked account, even by supplying the correct password.&lt;/p&gt;
&lt;h2 id=&#34;unlock-a-locked-account&#34;&gt;Unlock a locked account&lt;/h2&gt;
&lt;p&gt;You can unlock accounts in one of two ways, depending on your privileges.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Manually&lt;/strong&gt;: If you are a &lt;a class=&#34;glosslink&#34; href=&#34;../../../../../en/glossary/db-superuser/&#34; title=&#34;&#34;&gt;superuser &lt;/a&gt;, you can manually unlock the account using the &lt;a href=&#34;../../../../../en/sql-reference/statements/alter-statements/alter-user/#&#34;&gt;ALTER USER&lt;/a&gt; command.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

A superuser account cannot be locked, because it is the only user that can unlock accounts. For this reason, choose a very secure password for a superuser account. See &lt;a href=&#34;../../../../../en/security-and-authentication/client-authentication/hash-authentication/passwords/password-guidelines/#&#34;&gt;Password guidelines&lt;/a&gt; for suggestions.

&lt;/div&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Password Lock Time Setting&lt;/strong&gt;: &lt;code&gt;PASSWORD_LOCK_TIME&lt;/code&gt; specifies the number of days (units configurable with &lt;a href=&#34;../../../../../en/sql-reference/config-parameters/security-parameters/&#34;&gt;PasswordLockTimeUnit&lt;/a&gt;) an account is locked after a specified number of failed login attempts (configurable with &lt;code&gt;FAILED_LOGIN_ATTEMPTS&lt;/code&gt;). The database automatically unlocks the account after the specified number of days has passed.&lt;br /&gt;&lt;br /&gt;If you set this parameter to &lt;code&gt;UNLIMITED&lt;/code&gt;, the user&#39;s account is never automatically unlocked and a superuser must manually unlock it.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
  </channel>
</rss>
