Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
AshishJoshi
Trusted Contributor
Trusted Contributor

How to increase LDAP Password Locked changes from 5 to more

Jump to solution

While Radius Authentication in Cloud Secure ID,

How to increase LDAP Password Lockout changes from 5 to more.

 

After trying password wrong for 5 times in a row it showed following message (as shown in picture below). How can we increase this number.

 

 

pastedImage_1.png

Labels (1)
0 Likes
1 Solution

Accepted Solutions
MartinSawczyn
Employee
Employee

Hi, 

 

in the Cloud Administration Console, go to Company Settings > Sessions and Authentication 

 

Configure password lockout settings.

  1. Select Enable Password Lockout to lock the password authentication method in the Cloud Authentication Service after the specified number of unsuccessful attempts for a user.

    These settings affect password authentication attempts for the SAML IdP and RADIUS for the Cloud Authentication Service and the RSA SecurID Authenticate app. These settings do not affect password attempts for the RSA SecurID Access standard or custom application portals.

    For more information on password lockout, see Password Lockout Examples.

  2. In the Failures Allowed Before Lockout field, specify the number of unsuccessful password attempts that a user is allowed before the Cloud Authentication Service locks the password method. The default is 4.

    Consider setting this value to be at least one attempt less than the lockout value of the LDAP directory.

    The number of attempts is cumulative across SAML IdP and RADIUS for the Cloud Authentication Service and the RSA SecurID Authenticate app. For example, if this value is 4 and a user enters an incorrect password two times in a service provider, one time in a VPN client, and one time during Authenticate device registration, then the Cloud Authentication Service locks the password method.

  3. In the Lockout Duration (minutes) field, specify the length of the lockout in minutes. The default is 30.

    Consider setting this value to the same value as the LDAP directory observation window, if applicable.

    The lockout starts when the password authentication method is locked and expires after 30 minutes. After the specified duration, the Cloud Authentication Service starts processing password attempts from the user again.

Configure Session and Authentication Method Settings 

 

Hope this helps

View solution in original post

1 Reply
MartinSawczyn
Employee
Employee

Hi, 

 

in the Cloud Administration Console, go to Company Settings > Sessions and Authentication 

 

Configure password lockout settings.

  1. Select Enable Password Lockout to lock the password authentication method in the Cloud Authentication Service after the specified number of unsuccessful attempts for a user.

    These settings affect password authentication attempts for the SAML IdP and RADIUS for the Cloud Authentication Service and the RSA SecurID Authenticate app. These settings do not affect password attempts for the RSA SecurID Access standard or custom application portals.

    For more information on password lockout, see Password Lockout Examples.

  2. In the Failures Allowed Before Lockout field, specify the number of unsuccessful password attempts that a user is allowed before the Cloud Authentication Service locks the password method. The default is 4.

    Consider setting this value to be at least one attempt less than the lockout value of the LDAP directory.

    The number of attempts is cumulative across SAML IdP and RADIUS for the Cloud Authentication Service and the RSA SecurID Authenticate app. For example, if this value is 4 and a user enters an incorrect password two times in a service provider, one time in a VPN client, and one time during Authenticate device registration, then the Cloud Authentication Service locks the password method.

  3. In the Lockout Duration (minutes) field, specify the length of the lockout in minutes. The default is 30.

    Consider setting this value to the same value as the LDAP directory observation window, if applicable.

    The lockout starts when the password authentication method is locked and expires after 30 minutes. After the specified duration, the Cloud Authentication Service starts processing password attempts from the user again.

Configure Session and Authentication Method Settings 

 

Hope this helps