8.12. Replicating Account Lockout Attributes
Account lockout policies will block a user ID from being able to access the Directory Server if the login attempt fails a set number of times. This prevents hackers or other malicious people from illegitimately accessing the Directory Server by guessing a password. Password policies are set locally, and generally account lockout attributes are local to each replica. This means that a person can attempt to log in to one replica until the account lockout count is reached, then try again immediately on another replica. The way to prevent that is to replicate the attributes related to the account lockout counts for an entry, so that the malicious user is locked out of every supplier and consumer replica in the configuration if a login attempt fails on a single master.
By default, three password policy attributes are not replicated, even if other password attributes are. These attributes are related to of login failures and lockout periods:
passwordRetryCount
retryCountResetTime
accountUnlockTime
To enable these attributes to be replicated, change the passwordIsGlobalPolicy
configuration attribute:
ldapmodify -h consumer1.example.com -p 389 -D "cn=directory manager" -w password dn: cn=config changetype: modify replace: passwordIsGlobalPolicy passwordIsGlobalPolicy: 1
Changing that value to 1
allows the passwordRetryCount
, retryCountResetTime
, and accountUnlockTime
to be replicated. No other configuration is necessary for the attributes to be included with the replicated attributes.