Exempt UME user for password expiration

Is there a way to exempt a user from the password expiration setting? For example, passwords for all users are set to expire every 90 days, but a user id, say "monitor_user", is used in monitoring application to perform an automated logon check. Every 90 days when the password expires, the monitor fails. Is there a way to set this user's password not to expire?
Thanks

Glen and Giorgio,
Let me see if I can clear things up a little bit.
First, there is the security policy which is controlled by the UME properties. This defines password length, logon ID length, etc. These properties apply to the entire AS Java and cannot be trimmed down for individual users. How they apply to users in different data sources also varies. For example, these properties are ignored to some extent if you have an ABAP system as your user store. See the following link:
http://help.sap.com/saphelp_nw04s/helpdata/en/7f/c52442ad9f5133e10000000a155106/frameset.htm
Second, as of NW 04s SPS 7 a new user attribute was added, named "security policy". For individual users you can choose one of the following security policies:
default users (user can logon, password rules apply)
technical users (user can logon, password does not expire)
internal service users (user cannot logon, usually do not have passwords)
There is a fourth policy: unknown users, applies to certain users mapped from an AS ABAP.
In SPS 7 I believe and latest in SPS 8, you have limited abilities to change the security policy of the user with identity management. You can change the policy from unknown or default to technical but not back.
In SPS 9 and later you can change the policy from unknown or default to technical and from unknown or technical to default.
I wonder if support misunderstood your question and thought you were referring to the first type of security policy and not the second.
Message was edited by: Michael Shea

Similar Messages

  • Production site is not functioning due to an User Login Password expire.

    Hi All,
    SQL Server 2005
    We have an issue with user login password expire. Generally we create logins without password expire but the user is unable to login to the server and getting password expire error.
    a) What would be the reasons behind this scenario.
    b) How to resolve this issue.
    c) How can we avoid this issue in future.
    I'm really grateful to your valuable suggestions on this. Thank You.
    Regards,
    Kalyan.
    ----Learners Curiosity Never Ends----

    Hi,
    In addition, you can use
    ALTER LOGIN (Transact-SQL) to configure the enforcement of password policy options of a SQL Server login.
    When CHECK_POLICY is changed to OFF, CHECK_EXPIRATION will also be set to OFF. The following combinations of policy options are not supported:
    If MUST_CHANGE is specified, CHECK_EXPIRATION and CHECK_POLICY must be set to ON. Otherwise, the statement will fail.
    If CHECK_POLICY is set to OFF, CHECK_EXPIRATION cannot be set to ON. An ALTER LOGIN statement that has this combination of options will fail.
    More information, please see policy enforcement section in the following TechNet article:
    http://technet.microsoft.com/en-us/library/ms161959.aspx
    Thanks.
    Tracy Cai
    TechNet Community Support

  • Is there a way to alert user about password expiration

    Hi,
    Can we set up some trigger in OIM to kick off a task (or an email notification) x number of days before the user's password expires?
    Any help is appreciated.
    Thanks

    Sure.
    A scheduled task that reads the USR_PWD_EXPIRE_DATE from the USR table.
    You should also be able to read the value using the findUsers API from tcUserOperationsIntf.
    Good luck
    Martin

  • ADSI does not return proper code for Password Expired

    We are trying to modify a vendor supplied system to get it to authenticate using our LDAPs. The vendor app is a hybrid IIS ASP/ASP.NET application so it seems necessary to use ADSI for authentication. We have had the solution working for more than a year, but now we want to expire passwords in our LDAP.
    We have been testing with both Netscape Gateway LDAP engine 4.13 and/or Sun One Directory Server Version 5.2. At the moment, the problem I am facing is that I get the same error code from ADSI whether the attempted password is bad or the user DN and password are good but the account has expired. In other words, I cannot differentiate between an expired password and bad typing during the login attempt.
    In either case [bad password or password expired], I get, -2147023570 Automation error Logon failure: unknown user name or bad password. I can log in successfully with an unexpired UID/password using the code so it looks like I have no code error. I have tried several times to make sure I am typing everything OK. My results are consistent.
    I have found example code on the web that suggests I should be seeing the "error -2147016672 (1 from NDS) - password expired".
    Could there be some sort of Netscape or Sun One LDAP configuration parameter that prevents sending the password expired error code/message?
    Any other ideas what might be wrong?
    We've tested using VB, VBScript [directly] and VBScript in ASP. Always the same results.
    Here are the relevant sample lines {in VBScript}
              Set adsDSO = GetObject("LDAP:")
              on error resume next
              Set adsUser = adsDSO.OpenDSObject("LDAP://ourmachine.cusys.edu:portGoesHere/uid=" & UserName & ",o=whatever,c=US", "uid=" & UserName & ",o=whatever,c=US", Password, 0)
              if err.number  0 then
                   if err.number = -2147016672 then
                        ' Cannot seem to get here.
                        response.write "Error code: " & err.number & "<P>"
                        response.write "Error code for expired password<P>"
                   elseif err.number = -2147023570 then
                        response.write "Error code: " & err.number & "<P>"
                        response.write "Error code for bad credentials<P>"
                   else
                        response.write "Error code: " & err.number & "<BR>"
                        response.write err.description & "<P>"
                   ' do more stuff ...

    Did you check SAP notes? Maybe the OS creates the file in DIR_HOME directory when the path is invalid. Could you check in AL11? You may also add "MESSAGE msg" to the "OPEN DATASET", maybe you'll get more information.

  • DS5.2p4 plugin to notify users of password expiration

    My problem:
    I'm testing per account password policies and most of our ldap client apps are brain dead and won't display the "password is about to expire" message.
    My Solution:
    I was thinking of writing a "preop bind" plugin to send an email to the user. But, the way page 120 reads of the plugin developers guide, I can't "intercept" the "password expiring" control, LDAP_CONTROL_PWEXPIRING.
    My other solution is to just write a script that does an ldapsearch for "passwordExpWarned != 0" and send an email notification. Call the script from cron and it's done.
    I'd like to do this as a plugin, but the more I look, the less elegant the solution would be.
    Any suggestions would be welcome.
    Thanks,
    Roger S.

    Check the following thread ..
    How to create an alert in Oracle Applications
    How to create an alert in Oracle Applications

  • ICal Server Keeps Prompting Users for password

    Hello All!
    I am having issues with a MacMini Server iCal Server prompting users for their password. They are getting the following message:
    iCal can't log in to your account becuase your password may be incorrect. The user clicks cancel and they can contenue working however they a few min later they will get prompted again. The user can enter thier password, click ok and a few min later they get prompted again. This goes on all day!
    Any ideas on how to resolve?
    MacMini Lion Server 10.7.3
    Thanks,
    ebrind

    Thanks Jonathan! Here it is:
    Oct 24 2012 15:49:12 AUTH2: {0x4f9af0524882219c0000000800000008, XXXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:12 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:12 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:13 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:14 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:15 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:15 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:15 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:15 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:15 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:17 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:17 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:17 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:49:19 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 15:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:03:30 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:03:31 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:03:34 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:03:37 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:03:40 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:14 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:46 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:46 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:48 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:48 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:04:49 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:05:11 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:05:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:05:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:05:14 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:05:29 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:10:17 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:10:20    AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:10:22 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:13:49 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:13:51 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:13:54 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:14:39 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:14:40 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:14:40 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:14:58 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:19:12 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:19:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:19:15 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:19:17 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:19:18 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:23:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:23:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:24:18 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:24:20 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:24:22 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:26:17 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:26:17 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:27:48 KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} is in good standing.
    Oct 24 2012 16:27:48 KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} authentication succeeded.
    Oct 24 2012 16:27:48 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} DIGEST-MD5 authentication succeeded.
    Oct 24 2012 16:28:03 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:28:03 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:28:04 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:28:04 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:28:05 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:28:18 KERBEROS-LOGIN-CHECK: no principal ([email protected])
    Oct 24 2012 16:28:50 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} DIGEST-MD5 authentication succeeded.
    Oct 24 2012 16:29:03 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:29:03 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:12 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:34 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:34 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:36 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:36 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:37 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:37 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:37 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:37 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:43 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:34:43 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:41:00 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 16:41:38 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 16:41:38 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 16:42:32 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 16:43:11 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 16:43:11 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 16:43:41 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 16:43:48    AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:43:48 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:44:19 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 16:44:19 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 16:46:49    KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} is in good standing.
    Oct 24 2012 16:46:49 KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} authentication succeeded.
    Oct 24 2012 16:46:49 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} DIGEST-MD5 authentication succeeded.
    Oct 24 2012 16:50:18 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:50:18 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:50:18 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:50:19 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:50:58 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:50:58 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:00 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:00 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:00 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:00 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:01 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:01 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:05 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:05 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:06    AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:11 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:11 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:57 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:51:57 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 16:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:01:38 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:01:38 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:07:05 KERBEROS-LOGIN-CHECK: no principal ([email protected])
    Oct 24 2012 17:07:36 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} DIGEST-MD5 authentication succeeded.
    Oct 24 2012 17:11:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:11:25 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:21:18 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:21:18 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:23:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:23:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:24:06    AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:24:07 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:24:08 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:24:12 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:30:27 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:30:27 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:30:32 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:31:03 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:31:03 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:35:17 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 17:35:17 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 17:35:50 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:35:50 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:40:48 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:40:48 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:41:02 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 17:41:40 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 17:41:40 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 17:42:35 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 17:43:13 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 17:43:13 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 17:43:43 AUTH2: {0x4f9aef1b6b8b45670000000400000004, servername.local$} DHX authentication succeeded.
    Oct 24 2012 17:44:21 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} is in good standing.
    Oct 24 2012 17:44:21 KERBEROS-LOGIN-CHECK: user {0x4f9aef1b6b8b45670000000400000004, servername.local$} authentication succeeded.
    Oct 24 2012 17:46:48 KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} is in good standing.
    Oct 24 2012 17:46:48 KERBEROS-LOGIN-CHECK: user {0x4f9af0524882219c0000000800000008, XXX} authentication succeeded.
    Oct 24 2012 17:46:48 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} DIGEST-MD5 authentication succeeded.
    Oct 24 2012 17:50:59    AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:50:59 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:01 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:01 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:02 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:02 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:02 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:02 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:07 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:51:07 AUTH2: {0x4f9af032312303780000000700000007, QQQ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:56 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:52:59 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:00 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:00 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:00 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:01 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:01 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:01 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:01 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:01 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:02 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:02 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:02 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:03 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:04 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:05 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:05 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:07 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:08 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:10 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:10 AUTH2: {0x4f9af0786fe3211a0000000900000009, YYY} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:11 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:11 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:13 AUTH2: {0x4f9af0524882219c0000000800000008, XXX} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:53:25 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:55:33 AUTH2: {0x4f9aeff441377b7c0000000600000006, ZZZ} WEBDAV-DIGEST authentication succeeded.
    Oct 24 2012 17:55:33 AUTH2: {0x4f9bbf3c45a1f0200000000a0000000a, WWW} WEBDAV-DIGEST authentication succeeded.
    XXXX means user A
    YYYY means user B etc, etc

  • UME User account password never expires

    Is there a user type in the UME on java where the user account will not expire? Much like the service user type on ABAP.
    Thanks Mikie

    Mike,
    This is actually what you are looking for:
    http://help.sap.com/saphelp_nw04s/helpdata/en/4e/225b42eeb66255e10000000a155106/frameset.htm
    You want the technical user type.
    -Michael
    Ooops I answered to quickly. Someone else already answered.
    -Michael
    Edited by: Michael Shea on Mar 12, 2008 10:35 AM
    My mistake.
    Well actually no I am correct. Mike, you are looking for user types.
    Edited by: Michael Shea on Mar 12, 2008 10:43 AM

  • Notify users before password expires

    Hi,
    We have some Vibe external users that need to be notified when their passwords are about to expire, so they can ask us for a new password (their accounts are created in our tree)
    I can't seem to figure out any way to allow this so please help...

    mcando,
    It appears that in the past few days you have not received a response to your
    posting. That concerns us, and has triggered this automated reply.
    Has your problem been resolved? If not, you might try one of the following options:
    - Visit http://support.novell.com and search the knowledgebase and/or check all
    the other self support options and support programs available.
    - You could also try posting your message again. Make sure it is posted in the
    correct newsgroup. (http://forums.novell.com)
    Be sure to read the forum FAQ about what to expect in the way of responses:
    http://forums.novell.com/faq.php
    If this is a reply to a duplicate posting, please ignore and accept our apologies
    and rest assured we will issue a stern reprimand to our posting bot.
    Good luck!
    Your Novell Product Support Forums Team
    http://forums.novell.com/

  • Alert user Pending password expiration

    I am looking remind users to change their passwords ahead of time.
    I am manually checking the passwords every day. Group policy is not an option in this case.
    I need to alert the user by email that their Active Directory password will expire in x day's
    This would query a specific OU
    Im looking for this myself, I have no scripting knowledge but eager to learn.
    Has anyone done this already?
    Thanks for reading
    confuseis

    That looks good Thanks. 
    Only thing is that I would need to run this against a specific OU, infuse this with the script below?
    e.g. Ou=Users,Ou=London,DC=WestEurope,DC=Contoso,DC=com
    # Please Configure the following variables....
    $smtpServer="mail.server.com"
    $expireindays = 21
    $from = "Company Administrator <[email protected]>"
    #Get Users From AD who are enabled
    Import-Module ActiveDirectory
    $users = get-aduser -filter * -properties * |where {$_.Enabled -eq "True"} | where { $_.PasswordNeverExpires -eq $false } | where { $_.passwordexpired -eq $false }
    foreach ($user in $users)
      $Name = (Get-ADUser $user | foreach { $_.Name})
      $emailaddress = $user.emailaddress
      $passwordSetDate = (get-aduser $user -properties * | foreach { $_.PasswordLastSet })
      $PasswordPol = (Get-AduserResultantPasswordPolicy $user)
      # Check for Fine Grained Password
      if (($PasswordPol) -ne $null)
        $maxPasswordAge = ($PasswordPol).MaxPasswordAge
      else
        $maxPasswordAge = (Get-ADDefaultDomainPasswordPolicy).MaxPasswordAge
      $expireson = $passwordsetdate + $maxPasswordAge
      $today = (get-date)
      $daystoexpire = (New-TimeSpan -Start $today -End $Expireson).Days
      $subject="Your password will expire in $daystoExpire days"
      $body ="
      Dear $name,
      <p> Your Password will expire in $daystoexpire days.<br>
      To change your password on a PC press CTRL ALT Delete and chose Change Password <br>
      <p>Thanks, <br>
      </P>"
      if ($daystoexpire -lt $expireindays)
        Send-Mailmessage -smtpServer $smtpServer -from $from -to $emailaddress -subject $subject -body $body -bodyasHTML -priority High
    confuseis

  • User account password expired

    Everytime I try to install updates or downloads.I amtaken to the user account that says my password has expired, I have tried everywhere to try and reset. Best so far is to reinstall windows 8. Are there any other options?

    Hi,
    Firstly, as this forum is for Remote desktop services related question, please let us know if you are just running a standalone Windows 8 PC. If so, it is recommended to post the question
    in Windows 8 forums for help.
    Windows 8 Community
    http://answers.microsoft.com/en-us/windows/forum/windows_8?auth=1
    Windows 8.1 IT Pro forums
    http://social.technet.microsoft.com/Forums/windows/en-US/home?category=w8itpro
    Meanwhile, you can go to Local Users and Groups (lusrmgr.msc), right click the user account and choose Properties, check Password never expires.
    Hope this helps.
    Jeremy Wu
    TechNet Community Support

  • Want a solution for a scenario-To Set Password expiration in OID from OIM

    Hi,
    I have one scenario. Please guide me in some details to achieve this.
    I have one password policy in OIM. When user's password expires in OIM, then his password should also expire in OID. We have OID as user's repository.
    For this I have one solution but dont know how to implement this in OIM.
    "OID has the LDAP attribute called “pwdMaxAge” map this attribute to the OIM resource object and reset this value to number of days (as per password policy) whenever you change the password in OIM. This will set the password expiration time in the OID without having the password policy in place. "
    Plesae suggest.
    Thanks in advance.

    Well here is what you can do:
    - For OIM the user's password will be governed with the Xellerate User password policy, which says that password must be changed every 28 days. So you are good in handling this in OIM.
    Now for OID side, you have two options - *1. User changes OID password directly* and *2. User changes OID password through update in OIM profile password*. Most probably tou would want the second case. If true then here is what you can do.
    - As user changes the OIM password. Create automatic trigger Change User Password which updates the password in the process form of OID.
    - This invokes the Password Updated task.
    - On SUCCESS of this task, call another task which goes to OID target and updates the attribute pwdMaxAge to Current date + 28
    Thanks
    Sunny

  • Capturing the Message on the Login Page (Invalid user/password expired etc.

    Hi, I have a requirment for capturing the error message on the Login page if the User's Account is expired or Account is Disabled or Invalid credentials, Password Lockout etc.
    I am using the attached login page. Can any one please help me out on this.
    <html><head><title>AARPLogin Page</title>
    <script type="text/javascript" language="JavaScript" xml:space="preserve">
    // This function automatically gets called for broswer detection
    var isNav4 = false;
    var isIE4 = false;
    var isNS6 = false;
    function obDetectBrowser()
    if ( navigator.appVersion.charAt( 0 ) == "4" )
    if ( navigator.appName == "Netscape" )
    isNav4 = true;
    } else {
    isIE4 = true;
    else
    if ( navigator.appVersion.charAt( 0 ) >= 5 )
    if ( navigator.appName == "Netscape" )
    isNS6 = true;
    obDetectBrowser ();
    var HOSTNAME =
    var COOKIE_OBREQUESTEDURL = "OBREQUESTEDURL";
    var COOKIE_OBFORMLOGINCOOKIE = "ObFormLoginCookie";
    var NCID_LANDING_PAGE_URL = "/landing/";
    var QS_REDIR = "ReDir";
    var keyChooser;
    function checkPasswordEnterKey( event )
    var form = document.forms[0];
    if (isNav4 || isNS6) {
    keyChooser = event.which ;
    } else if (isIE4) {
    keyChooser = window.event.keyCode;
    if (keyChooser == 13) {
    if (
    form.userid.value
    && form.userid.value != ""
    && form.password
    && form.password.value != ""
    form.submit();
    return true;
    else
    alert('Please enter a UserId and Password');
    return false;
    function showHidePanel( panelID, displayValue )
    var panelElement = document.getElementById( panelID );
    if ( displayValue == 'show' )
    panelElement.style.display = 'block';
    else
    panelElement.style.display = 'none';
    function getQueryVariable( variable )
    var query = window.location.search.substring( 1 );
    var vars = query.split( "&" );
    for ( var i=0; i < vars.length; i++)
    var pair = vars[ i ].split( "=" );
    if ( pair[ 0 ] == variable )
    return unescape( pair[ 1 ] );
    return "";
    function Get_Cookie( name )
    var nameEQ = name + "=";
    var ca = document.cookie.split( ';' );
    for( var i=0; i < ca.length; i++ )
    var c = ca[ i ];
    while ( c.charAt( 0 )==' ' )
    c = c.substring( 1, c.length );
    if ( c.indexOf( nameEQ ) == 0 )
    return c.substring( nameEQ.length, c.length );
    return null;
    function Set_Cookie( name, value, expires, path, domain, secure)
    document.cookie = name + "=" + escape( value ) +
    ( ( expires ) ? ";expires=" + expires.toGMTString() : "" ) +
    ( ( path ) ? ";path=" + path : "" ) +
    ( ( domain ) ? ";domain=" + domain : "" ) +
    ( ( secure ) ? ";secure" : "" );
    function Delete_Cookie( name, path, domain )
    if ( Get_Cookie( name ) )
    document.cookie = name + "=" +
    ( (path) ? ";path=" + path : "" ) +
    ( (domain) ? ";domain=" + domain : "" ) +
    ";expires=Thu, 01-Jan-1970 00:00:01 GMT";
    function lostPassword()
    var CurrentLogin = document.forms[0].userid.value;
    if ( CurrentLogin == "" ) {
    alert ( "Please enter your eMail Address." );
    document.forms[0].userid.focus();
    else {
    Set_Cookie( COOKIE_OBFORMLOGINCOOKIE, "done", 0, "/" );
    var LOST_PWD_PAGE = "/identity/oblix/apps/lost_pwd_mgmt/bin/lost_pwd_mgmt.cgi?program=passwordChallengeResponse&login="+CurrentLogin+"&backUrl=http://oradev2.na.aarp.int/login/login.html&target=top";
    window.location = LOST_PWD_PAGE;
    function emailPassword()
    document.passform.submit();
    function onLoad()
    if (getQueryVariable( "MSG" ) == 'LOGIN_FAILED' )
    alert ("Login Failed, Please try again");
    else if (getQueryVariable( "MSG" ) == 'PWD_EXP' )
    alert ("Your Password Is About to Expire. Please Change it at your earliest convenience.");
    var pwdExpUID = getQueryVariable( "login" );
    var hostTarget = getQueryVariable( "hostTarget" );
    var resURL = getQueryVariable( "resURL" );
    var PWD_EXP_PAGE = "/identity/oblix/apps/lost_pwd_mgmt/bin/lost_pwd_mgmt.cgi?program=redirectforchangepwd&login="+pwdExpUID+"&backURL="+hostTarget+resURL+"&target=top";
    window.location = PWD_EXP_PAGE;
    else if (getQueryVariable( "MSG" ) == 'CHGPWD' )
    alert ("You are required to change your password.");
    var chgPwdUID = getQueryVariable( "login" );
    var hostTarget = getQueryVariable( "hostTarget" );
    var resURL = getQueryVariable( "resURL" );
    var CHG_PWD_PAGE = "http://"+HOSTNAME+"/identity/oblix/apps/lost_pwd_mgmt/bin/lost_pwd_mgmt.cgi?program=redirectforchangepwd&login="+chgPwdUID+"&backURL="+hostTarget+resURL+"&target=top";
    window.location = CHG_PWD_PAGE;
    </script></head><body onload="onLoad();document.login.userid.focus();" alink="blue" bgcolor="#ffffff" link="blue" vlink="blue">
    <p align="center">
    <img alt="AARP Header Logo" src="login_files/aarpLogo.gif" border="0" height="91" width="219">
    <br>
    </p><form name="login" method="post" action="/access/oblix/apps/webgate/bin/webgate.so">
    <div class="boldText" align="center">
    <h2>Login</h2>
    <div class="boldText" align="left">
    <div id="LoginFailed" style="display: none;">
    <table align="center" bgcolor="#ff0000" border="0" cellpadding="2" cellspacing="0" width="500">
    <tbody><tr>
    <td>
    <table bgcolor="#e5e5e5" border="0" cellpadding="5" cellspacing="0" width="100%">
    <tbody><tr bgcolor="#ffffff">
    <td rowspan="3" height="40" nowrap="nowrap" valign="top">
    <img src="login_files/error.gif" name="error" height="20" width="20">
    </td>
    <td rowspan="3" align="center">
    <p>
    <font color="#ff0000" size="-1">
    <b>
    <div id="TryAgain" style="display: none;">Login Failed! Invalid UserID and/or Password, Please try again.<br></div>
    <div id="AccountLocked" style="display: none;">Your Account has been Locked!</div>
    </b>
    </font>
    </p>
    <p>
    <font color="#ff0000">
    <b>For
    assistance call E-Services Help Line at (XXX) XXX-XXXX Monday through
    Friday between the hours of 8:00 am and 5:00 pm eastern standard time.</b>
    </font>
    </p>
    </td>
    </tr>
    <tr bgcolor="#ffffff">
    </tr><tr bgcolor="#e5e5e5">
    </tr></tbody></table>
    </td>
    </tr>
    </tbody></table>
    </div>
    <br>
    </div>
    <table border="0" cellpadding="0" cellspacing="0" width="500">
    <tbody><tr>
    <td background="login_files/border_upper_left.gif" height="20" nowrap="nowrap" width="20"> </td>
    <td background="login_files/border_top.gif" height="20" nowrap="nowrap"> </td>
    <td background="login_files/border_upper_right.gif" height="20" nowrap="nowrap" width="20"> </td>
    </tr>
    <tr>
    <td background="login_files/border_left.gif" nowrap="nowrap" width="20"> </td>
    <td>
    <table bgcolor="#ebebce" border="0" cellpadding="2" cellspacing="0" height="100%" width="100%">
    <tbody><tr>
    <td colspan="3" align="center">
    <font color="darkred" face="Arial" size="3">
    <b>
    </b></font>
    <b> </b></td>
    </tr>
    <tr valign="bottom">
    <td colspan="3" width="100%">
    <table bgcolor="#ebebce" border="0" cellpadding="5" cellspacing="0" width="100%">
    <tbody><tr bgcolor="#e5e5e5">
    <td rowspan="2" bgcolor="#ebebce" height="20" nowrap="nowrap" valign="top" width="4%">
    <font color="#000000">
    <span class="text">
    <img src="login_files/arrow.gif" align="top" height="20" width="20">
    </span>
    </font>
    <font color="#000000"> </font>
    </td>
    <td rowspan="2" bgcolor="#ebebce" width="96%">
    <font color="#000000" size="-1">
    <span class="text">Please enter your Email and Password. If you are a new user to AARP, please select First Time AARP User.
    </span>
    </font>
    </td>
    </tr>
    <tr bgcolor="#e5e5e5">
    </tr></tbody></table>
    </td>
    </tr>
    <tr valign="bottom">
    <td colspan="3">
    <table align="center" border="0" width="349">
    <tbody><tr>
    <td nowrap="nowrap" width="74">
    <font color="#000000" size="-1">
    <div align="left">eMail:</div>
    </font>
    </td>
    <td width="265">
    <input name="userid" value="" size="32" maxlength="32" tabindex="2" type="text">
    </td>
    </tr>
    <tr>
    <td>
    <font color="#000000" size="-1">
    <div align="left">Password:</div>
    </font>
    </td>
    <td>
    <p>
    <font color="#000000" size="-1">
    <input name="password" size="32" maxlength="32" length="30" tabindex="3" type="password">
    </font>
    </p>
    </td>
    </tr>
    </tbody></table>
    </td>
    </tr>
    <tr>
    <td>
    <font color="#000000" size="-1">
    <p align="center"><b>Forgot Your Password?</b></p>
    </font>
    </td></tr>
    <tr>
    <td align="center"> <font color="#000000" size="-1"><!--
    Reset Password      
    -->
    Email New Password
    </font>
    </td></tr>
    <tr>
    <td colspan="4">
    <div class="boldText" align="center">
    <br>
    <input src="login_files/button_login.gif" name="Submit" value="" alt="login" type="image">
    <!--
    <b class="boldText"><img src="../images/button_login.gif" width="68" height="25" name="img_login" border="0" alt="login"/></b>
    --> <b class="boldText"><img src="login_files/button_clear.gif" name="img_clear" alt="clear" border="0" height="25" width="68"></b>
    <b class="boldText"><img src="login_files/button_help.gif" name="img_help" alt="help" border="0" height="25" width="68"></b>
    <b class="boldText"><img src="login_files/button_cancel.gif" name="img_cancel" alt="cancel" border="0" height="25" width="68"></b>
    </div>
    </td>
    </tr>
    </tbody></table>
    </td>
    <td background="login_files/border_right.gif" nowrap="nowrap" width="20"> </td>
    </tr>
    <tr>
    <td background="login_files/border_lower_left.gif" height="20" nowrap="nowrap" width="20"> </td>
    <td background="login_files/border_bottom.gif" height="20" nowrap="nowrap"> </td>
    <td background="login_files/border_lower_right.gif" height="20" nowrap="nowrap" width="20"> </td>
    </tr>
    </tbody></table>
    <p></p>
    <span class="text"><br><br><b>NOTICE:
    This system is the property of AARP and is for authorized use only.
    Unauthorized access is a violation of federal and state law. All
    software, data transactions, and electronic communications are subject
    to monitoring.</b></span>
    <div id="hr" style="position: absolute; width: 100%; height: 10px; z-index: 90; top: 657px; left: 10px;">
    <hr>
    </div>
    <div id="footer" style="position: absolute; width: 700px; height: 55px; z-index: 115; top: 678px; left: 50px;">
    <span class="subhead">
    Privacy Policy
    Disclaimer
    Contact Us
    </span>
    <span class="bodytext">
    </span></div>
    <form name="passform" action="http://oradev2.na.aarp.int/wampassword/passwordReset.html" method="post">
    <input name="login" value="" type="hidden">
    <input name="backUrl" value="http://oradev2.na.aarp.int/login/login.html" type="hidden">
    </form>
    <script type="text/javascript" language="JavaScript" xml:space="preserve">
    var undefined;
    if (
    document.login
    && document.login.password
    function clearForm()
    document.login.reset();
    function navigate( linkName )
    if ( 'login' == linkName )
    if ( document.accountLogin.userID.value != '' && document.login.password.value != '' )
    alert('Please click the Account Registration Setup link for now');
    //document.location = 'userDataPersonal.htm';
    else
    alert('Please enter a UserId and Password');
    function openHelp()
    helpDoc = window.open( "http://www.aarp.org", "", "scrollbars=yes,resizable=yes,width=500,height=300" );
    function cancel()
    // open dialog
    var initX = parseInt( window.screenX ) + parseInt( window.outerWidth ) / 2 - 100;
    var initY = parseInt( window.screenY ) + parseInt( window.outerHeight ) / 2 - 50;
    cancelDialog = window.open( "./cancelDialog.html", " cancelDialog", "resizable=yes,toolbar=no,menubar=no,width=200,height=150,screenX=" + initX +",screenY=" + initY );
    </script>
    </div></form></body>
    <script type="text/javascript">
    <!--
    function __RP_Callback_Helper(str, strCallbackEvent, splitSize, func){var event = null;if (strCallbackEvent){event = document.createEvent('Events');event.initEvent(strCallbackEvent, true, true);}if (str && str.length > 0){var splitList = str.split('|');var strCompare = str;if (splitList.length == splitSize)strCompare = splitList[splitSize-1];var pluginList = document.plugins;for (var count = 0; count < pluginList.length; count++){var sSrc = '';if (pluginList[count] && pluginList[count].src)sSrc = pluginList[count].src;if (strCompare.length >= sSrc.length){if (strCompare.indexOf(sSrc) != -1){func(str, count, pluginList, splitList);break;}}}}if (strCallbackEvent)document.body.dispatchEvent(event);}function __RP_Coord_Callback(str){var func = function(str, index, pluginList, splitList){pluginList[index].__RP_Coord_Callback = str;pluginList[index].__RP_Coord_Callback_Left = splitList[0];pluginList[index].__RP_Coord_Callback_Top = splitList[1];pluginList[index].__RP_Coord_Callback_Right = splitList[2];pluginList[index].__RP_Coord_Callback_Bottom = splitList[3];};__RP_Callback_Helper(str, 'rp-js-coord-callback', 5, func);}function __RP_Url_Callback(str){var func = function(str, index, pluginList, splitList){pluginList[index].__RP_Url_Callback = str;pluginList[index].__RP_Url_Callback_Vid = splitList[0];pluginList[index].__RP_Url_Callback_Parent = splitList[1];};__RP_Callback_Helper(str, 'rp-js-url-callback', 3, func);}function __RP_TotalBytes_Callback(str){var func = function(str, index, pluginList, splitList){pluginList[index].__RP_TotalBytes_Callback = str;pluginList[index].__RP_TotalBytes_Callback_Bytes = splitList[0];};__RP_Callback_Helper(str, null, 2, func);}function __RP_Connection_Callback(str){var func = function(str, index, pluginList, splitList){pluginList[index].__RP_Connection_Callback = str;pluginList[index].__RP_Connection_Callback_Url = splitList[0];};__RP_Callback_Helper(str, null, 2, func);}
    //--></script></html>

    Is it not possible that someone fired the password expiration cmd ?
    SQL> select limit
      2  from   dba_profiles
      3  where  profile='DEFAULT'
      4  and resource_name='PASSWORD_LIFE_TIME';
    LIMIT
    UNLIMITED
    SQL> select profile from dba_users where username='MYUSER';
    PROFILE
    DEFAULT
    SQL> conn myuser/myuser
    Connected.
    SQL> conn / as sysdba
    Connected.
    SQL> alter user myuser password expire;
    User altered.
    SQL> conn myuser/myuser
    ERROR:
    ORA-28001: the password has expired
    Changing password for myuser
    New password:
    Password unchanged
    Warning: You are no longer connected to ORACLE.
    SQL> conn / as sysdba
    Connected.
    SQL> select name, astatus, TO_CHAR(ctime,'DD-MM-YYYY HH:MI') CTIME, TO_CHAR(ptime,'DD-MM-YYYY HH:MI') PTIME, TO_CHAR(EXPTIME,'DD-MM-YYYY HH:MI') EXPIRE
      2  from sys.user$ where name ='MYUSER';
    NAME
       ASTATUS CTIME
    PTIME
    EXPIRE
    MYUSER
             1 23-11-2011 11:15
    23-11-2011 11:15
    23-11-2011 11:17
    SQL>Nicolas.

  • Cannot get user password expiration status with Jco 2.1

    I am using Jco 2.1. Is it possible to get the status of the user's password (expired or not) using Jco, or is there any BAPI which can do this task. I get an exception in Jco when the user is locked or does not have any access to the respective function groups, but no exceptions in this case. It allows the user to conenct to SAP even when the password has expried.
    In the code, I am using JCo Client connect and disconnect. It connects sucessfully, even when the password has expired in SAP.
    Many thanks in advance. Any pointers to this issue is appreciated.
    Regards,
    Siva

    Please refer to the link,
    Checking user password status with SAP JCO

  • Outlook 2010 prompting for password

    Hi everybody. I ran into an issue yesterday morning where at one of our sites Outlook 2010 has started prompting for a username and password. If the user types in their username as "MYDOMAIN\myuser" and their password, it lets them in but the Exchange
    status shows as "Disconnected". If the user sets their username to just "myuser" without the domain on the front it lets them in and works as expected until they close Outlook, at which point they have to enter their credentials again. 
    The strangest thing about this is that it's only affecting one of our sites and only Outlook 2010. Users running 2007 and 2003 do not have the problem and only users at this physical location have the problem. Does anybody know where I can look? I have tried
    clearing stored credentials, created new Outlook profiles and reset passwords. None of these things seem to have had any effect. 

    After changing a ton of outlook settings, deleting the user's account profile on outlook, deleting their domain profile from the effected computer, trying to fix the registry, deleting stored credentials, etc.... almost everything else I found something
    that FINALLY worked for me after over a year and about 12 different users being effected. 
    in the past I would just give up after much frustration and upgrade them to Office 2013 but that gets very expensive especially when I have 57 other users that could potentially run into the same issue. 
    Here is what I did. 
    - back up the user's data. log out and log into local admin
    - delete the user from the local registry
    - repair Office 2010 through control panel/programs, restart
    - have user log back in with their credentials to make new local profile. recover their backed up documents. log out and log back in as local admin. 
    - install hotfix KB2597011
    - restart computer
    - install hotfix KB2583935
    -restart computer
    - log in, open outlook and setup user's account. 
    Some of these steps may be skipped as I didn't find the hot-fixes until after I repaired office, however I am just providing what I did in the process to end up with a working outlook again. 
    Some things unique to my situation that may or may not help. 
    - I noticed some of the computers have Office2010 32bit installed on 64 bit machines. 
    - Some of the users were swapped over using a profile mover program when we moved to a domain environment. 
    - For me this always happens when the user's passwords expire and they have to log in to the portal to change it. Then outlook starts with the repeated prompt for passwords. It is always computer specific and nothing but what I provided above has worked
    other than re installing windows 7 and then office or upgrading to office 2013. 

  • DS 6.3 password expiration oddities

    I have been exploring an upgrade from DS5.2 to DS 6.3 to take advantage of the enhanced password policies and password expiration that have never worked quite right in DS5.2.
    The previous 5.2 and migrated 6.3 environments both use netgroups to restrict logins to specific systems.
    This generally works very well, although I'm seeing weirdness for local system accounts.
    I've explored the forums, tweaked pam.conf and nsswitch.conf in pretty much every way that's been suggested.
    DS 6.3 is setup on Solaris 10, and my client systems are Solaris 8, with all of the latest necessary patches applied.
    nsswitch has:
    passwd: compat
    group: compat
    passwd_compat: ldap
    group_compat: ldap
    netgroup: ldap
    All local and LDAP accounts can login fine if pam.conf has:
    other account requisite pam_roles.so.1
    other account binding pam_unix_account.so.1 server_policy
    other account required pam_ldap.so.1
    But no warning messages are received from the directory server for password expiration or administrative password resets.
    If I change pam.conf to have:
    other account requisite pam_roles.so.1
    other account optional pam_ldap.so.1
    other account binding pam_unix_account.so.1 server_policy
    All users can login, password expiration warnings are received, and users are notified if the admin user resets their password, but (as expected) users aren't forced to reset their password on first login or resets.
    Using "required" or "requisite" for pam_ldap in the above stack order, disables local account logins, as they are
    prompted for LDAP passwords that they don't have.
    Any combination of settings that I've tried that successfully force resets, etc. appear to disable the ability of local accounts to login - they are prompted for LDAP password, which of course fails.
    If anyone can demonstrate a combination of nsswitch.conf and pam.conf settings that will actually allow local user login, but still enforce password policies and expiration warnings, for Solaris 8 clients, it would be greatly appreciated.

    I'm still struggling to get password expiration and inactivation to work with DS 6.3.1 and Solaris 10 5/08. When accounts are expired or inactivated (nsAccountLock) users can still login via ssh. But when accounts are temporarily locked (pwdAccountLockedTime) ssh does the right thing and won't let them log in.
    Things work properly when I have
    passwd: files ldap
    in nsswitch.conf, but when I go to compatibility mode:
    passwd: compat
    passwd_compat: ldap
    ssh 'ignores' expiration and inactivation status of accounts.
    Following the advice of your last comment here (4.5 years ago!) I took away all access to the 'userPassword' attribute for the proxy account, but nothing changed (I did an 'ldapsearch' as the proxy account to ensure that the aci was working as expected and denying all access to the attribute).
    Would you, akillenb, or anyone, be so kind as to give any information that will let a Solaris 10 client work properly with the enhanced account management facilities of the Sun DSEE 6.3.1 LDAP server? Copies of pam.conf and nsswitch.conf and details on LDAP aci's would be most gratefully received!!!

Maybe you are looking for

  • Want Time Capsule far away from my modem. How to add to existing Airport?

    Hi, I have a dome-shaped Airport Extreme Base Station (AEBS) connected to a Comcast modem. I want to leave it as it is, but I would like my Time Capsule (TC), to be located far away from the modem, to "join" or "extend" that AEBS network. I had it se

  • Add grant  & fund to specific cost assignment in IT15

    Dear All, I'm usign R/3 4.7 with PS and UN (NPO) payroll module. Grants adn Funds are activated. IT1 and IT27 contains grants, funds, and funds center information. In order to post specific wage type to specific cost center, we try to use the option

  • Not able to debug EXIT_SAPLMCS5_002

    Hello I want to debug code written in EXIT_SAPLMCS5_002 (INCLUDE ZXMCVU04). I have already added breakpoint in the include ZXMCVU04. But when I run 2LIS_12_VCSCL extractor in RSA3  in delta mode, it  does not take me to this breakpoint. I am first ti

  • Gray pages running Adobe Reader on a MAC

    All I get are gray pages when I open a PDF. Nothing shows on the pages. I can scull up and down but I can't see anything. I have deleted the program, rebooted and reinstalled Adobe Reader but I still get the same result. Any ideas?

  • Help! Verizon won't port old phone number over to my FIOS house landline.

      Hi, need help on resolving this issue with Verizon.  Had Verizon FIOS triple play installed at my house about 12 days ago.  HD Prime, 15/5 internet and Digital Voice landline.  I switched from TimeWarner cable.    I signed up online for Verizon FIO