Note: this component is designated "advanced", which means that objects of this type are not expected to be created or altered in most environments. If you believe that such a change is necessary, you may want to contact support in order to understand the potential impact of that change.
The Weakly Encoded Password Data Security Auditor is used to identify entries that contain passwords encoded using any of the weak password storage schemes.
This data security auditor reports all entries that contain passwords encoded using any of the specified weak password storage schemes. Note that all events are reported at the error audit severity level.
The Weakly Encoded Password Data Security Auditor component inherits from the Data Security Auditor
The following components have a direct aggregation relation from Weakly Encoded Password Data Security Auditors:
The properties supported by this managed object are as follows:
Basic Properties: | Advanced Properties: |
---|---|
enabled | None |
report-file | |
include-attribute | |
audit-backend | |
audit-severity | |
weak-password-storage-scheme | |
weak-crypt-encoding |
Description | Indicates whether the Data Security Auditor is enabled for use. |
Default Value | true |
Allowed Values | true false |
Multi-Valued | No |
Required | Yes |
Admin Action Required | None. Modification requires no further action |
Description | Specifies the name of the detailed report file. |
Default Value | users-with-weakly-encoded-passwords.ldif |
Allowed Values | A string |
Multi-Valued | No |
Required | Yes |
Admin Action Required | None. Modification requires no further action |
Description | Specifies the attributes from the audited entries that should be included detailed reports. By default, no attributes are included. This property allows the administrator to specify which attributes from the audited entries will be included in detailed reports. Note that reported entries will use a different object class than original entry. If you wish to include the original object class, you may specify objectClass in this property. The report entry will include the original objectClass values in the ds-data-security-audit-objectclass attribute. |
Default Value | None |
Allowed Values | The name or OID of an attribute type defined in the server schema. |
Multi-Valued | Yes |
Required | No |
Admin Action Required | None. Modification requires no further action |
Description | Specifies which backends the data security auditor may be applied to. By default, the data security auditors will audit entries in all backend types that support data auditing (Local DB, LDIF, and Config File Handler). This property allows the administrator to specify which backends the data security auditor may be applied to. By default, the data security auditors will audit entries in all backend types that support data auditing (Local DB, LDIF, and Config File Handler). |
Default Value | None |
Allowed Values | The DN of any Backend. |
Multi-Valued | Yes |
Required | No |
Admin Action Required | None. Modification requires no further action |
Description | Specifies the severity of events to include in the report. This property allows the administrator to specify the severity of events to include in the report. Severity can be one of error, warning or verbose. See the description of the Data Security Auditor to see what events are reported at each severity level. |
Default Value | notice |
Allowed Values | error - Only the most important security risks are identified. warning - Includes all events from the error severity level as well as events that are less severe or may present issues in the near future. notice - Includes all events from the error and warning levels as well as events that do not necessarily indicate problems but are things that administrators may want to take note of. verbose - Includes all events from the error, warning, and notice levels as well as information considered less significant or with only marginal security risk. |
Multi-Valued | No |
Required | No |
Admin Action Required | None. Modification requires no further action |
Description | The password storage schemes that are considered weak. Users with any of the specified password storage schemes will be included in the report. |
Default Value | 3DES AES Base64 Blowfish Clear CRYPT MD5 RC4 SHA-1 Salted MD5 Salted SHA-1 |
Allowed Values | The DN of any Password Storage Scheme. |
Multi-Valued | Yes |
Required | Yes |
Admin Action Required | None. Modification requires no further action |
Description | Reporting on users with passwords encoded using the Crypt Password Storage scheme may be further limited by selecting one or more encoding mechanisms that are considered weak. |
Default Value | crypt md5 |
Allowed Values | crypt - The standard DES-based UNIX crypt algorithm. This is a weak algorithm and is provided only for the purpose of compatibility with applications that require this format. md5 - Passwords encoded with an algorithm using multiple rounds of the MD5 digest. sha-2-256 - Passwords encoded with an algorithm using multiple rounds of the 256-bit SHA-2 digest. sha-2-512 - Passwords encoded with an algorithm using multiple rounds of the 512-bit SHA-2 digest. |
Multi-Valued | Yes |
Required | No |
Admin Action Required | None. Modification requires no further action |
To list the configured Data Security Auditors:
dsconfig list-data-security-auditors [--property {propertyName}] ...
To view the configuration for an existing Data Security Auditor:
dsconfig get-data-security-auditor-prop --auditor-name {name} [--tab-delimited] [--script-friendly] [--property {propertyName}] ...
To update the configuration for an existing Data Security Auditor:
dsconfig set-data-security-auditor-prop --auditor-name {name} (--set|--add|--remove) {propertyName}:{propertyValue} [(--set|--add|--remove) {propertyName}:{propertyValue}] ...
To create a new Weakly Encoded Password Data Security Auditor:
dsconfig create-data-security-auditor --auditor-name {name} --type weakly-encoded-password [--set {propertyName}:{propertyValue}] ...
To delete an existing Data Security Auditor:
dsconfig delete-data-security-auditor --auditor-name {name}