Security Policy Context Properties

Password security settings set in context properties are applied across all Trapeze products.

Table 1. Security Policy Context Properties
Context Property Description
Core > Security > Policy > Minimum Password Length Minimum number of characters in a valid password. Use 0 to allow empty passwords.
Core > Security > Policy > Maximum Password Length Maximum number of characters in a valid password. Use 0 to set no maximum password length.
Core > Security > Policy > Alphanumeric Passwords Only If selected, only alphanumeric passwords are allowed. If cleared, symbol characters (for example, %, ^, _) are allowed.
Core > Security > Policy > Case Sensitive Passwords If selected, the capitalization of entered passwords must match the capitalization of defined passwords.
Core > Security > Policy > Passwords Combine Numbers and Letters If selected, the password must contain at least one number and one letter.
Core > Security > Policy > Passwords Must Not Contain Name If selected, the password cannot contain the login name as a substring in any combination of uppercase and lowercase letters.
Core > Security > Policy > Maximum Password Age Maximum number of days before a password must be changed on log in.
Core > Security > Policy > Maximum Password Age Warning Maximum number of days before the system warns users the password will expire.
Core > Security > Policy > Enforce Password Policy on Next Login If selected, password policies are checked and enforced every time the user logs in. If the user's password does not meet the current password policy, the user is required to enter a new password.
Core > Security > Policy > Maximum Failed Logins Maximum number of log in attempts. The account will be locked out when the user reaches the defined number.
Core > Security > Policy > Password History Number of previous passwords to remember. New passwords must not be in this list. Use 0 to enforce no password history.
Core > Security > Policy > Password Recycle Age Minimum number of days before a password can be reused. Use 0 to allow immediate password reuse.
Core > Security > Policy > Quick Check Timeout Minimum number of seconds before a full security check is performed (including LDAP calls or built-in policy checks). Use 0 to perform a full check on each request.
Core > Security > Policy > User Must Change Password if Administrator Resets It If selected and a password is reset by an administrator, the password must be changed the next time the user logs in.
Core > Security > Policy > Maximum Password Change Count Maximum number of times a password can be changed within a certain time window.
Core > Security > Policy > Maximum password Change Window Specified time window (HH:MM:SS) for users to change their password up to the maximum amount.