In this section:
Use this object to configure and manage account and password-related configurations. For password rules configuration, refer to Password Rules - CLI.
The Account Management syntax is provided below:
% set system admin <SYSTEM NAME> accountManagement OSAccountAging OSAccountAgingPeriod <7-712> state <disabled | enabled> accountAging <30-180> accountRemoval <60-360> allowMultipleLogins <disabled | enabled> bruteForceAttack allowAutoUnlock <disabled | enabled> consecutiveFailedAttemptAllowed <1-10> state <disabled | enabled> unlockTime <30-3600 seconds> bruteForceAttackOS OSstate <disabled | enabled> allowOSAutoUnlock <disabled | enabled> consecutiveFailedOSAttemptAllowed <1-10> unlockOSTime <30-5400 seconds> maxSessions <1-5> passwordAging OSstate <disabled | enabled> passwordAgingPeriod <1-365 days> passwordExpiryWarningPeriod <3-14 days> passwordMinimumAge <1-365 days> state <disabled | enabled> sessionIdleTimeout idleTimeout <1-120> state <disabled | enabled>
Parameter | Length/Range | Description |
---|---|---|
| N/A | To minimize the possibility of an unauthorized user compromising inactive OS user account, configure this parameter to specify the number of days of OS account inactivity ( Note
The following users are exempt from OS account aging: root, linuxadmin, cnxipmadmin and postgres. Use this parameter to configure and enable the account aging period for OS management users.
|
accountAging | N/A | Use this parameter to specify the number of days to elapse, after which the account is locked if left unused for accounts other than OS management users.
|
accountRemoval | N/A | Use this parameter to configure the account removal period.
NOTE: Refer to Local Authentication - CLI to enable/disable this feature for a specific user. |
allowMultipleLogins | N/A | Configure your system to allow multiple concurrent logins (
For additional information, refer to "Managing the Number of Sessions" in Managing SBC Core Users and Accounts. Modified: for 12.1.1 |
bruteForceAttack | N/A | Configuration for defense against brute force OAM password guessing attempts.
|
bruteForceAttackOS | N/A | Use this feature to defend against brute force attacks to the Linux OS.
|
maxSessions | 1-5 | Enter the maximum number of simultaneous sessions allowed for users. |
passwordAging | N/A | Use this feature to configure system-wide password aging.
|
| N/A | Use this parameter to specify the number of minutes to pass before an idle session times out.
|
The following example uses the Account Management feature to:
% set system admin MYSBC accountManagement bruteForceAttack state enabled allowAutoUnlock enabled consecutiveFailedAttemptAllowed 3 unlockTime 300 % show system admin MYSBC accountManagement bruteForceAttack state enabled; consecutiveFailedAttemptAllowed 3; allowAutoUnlock enabled; unlockTime 300;
The sftpadmin
account was removed in release 7.1 for user account security purposes.
If only keys (no password) are injected for the admin CLI user, then passwordLoginSupport
is disabled by default. If standalone EMA access is required, then enable passwordLoginSupport
and use the generated password to invoke the EMA. You are not required to enable passwordLoginSupport
if the EMA is accessed via RAMP.
With the removal of sftpadmin
, the RAMP uses an alternate CLI account in its Administrator group (e.g., admin
) for SBC registration. This does not impact SBC cloud networks because RAMP uses emssftp
by default. Refer to the Security Best Practices sections in the current RAMP documentation.