struct user_modals_info_0 {
unsigned short usrmod0_min_passwd_len;
unsigned long usrmod0_max_passwd_age;
unsigned long usrmod0_min_passwd_age;
unsigned long usrmod0_force_logoff;
unsigned short usrmod0_password_hist_len;
unsigned short usrmod0_maxbadpw;
};
where:
- usrmod0_min_passwd_len is the minimum password
length. The range of values is 0 to MAX_PASSWD_LEN.
- usrmod0_max_passwd_age is the maximum time
(in seconds) since the password was last changed and for which the current
password is valid. A value of 0xFFFFFFFF (TIMEQ_FOREVER) allows the password
to be valid forever. The minimum value is 1 day.
- usrmod0_min_passwd_age is the minimum time
(in seconds) since the password was last changed and before which the current
password is allowed to be changed. A value of 0 means no delay is required
between password updates.
- usrmod0_force_logoff is the length of time
(in seconds) after the valid logon hours that the user should be forced
off the network. If the value is TIMEQ_FOREVER (0xFFFFFFFF), the user is
never forced off. If the value is 0, the user is forced off immediately.
Any value between these also can be used.
- usrmod0_password_hist_len is the length of
the password history (that is, the number of passwords in the history buffer
that are scanned as opposed to the new password in a NetUserPasswordSet
attempt). The new password must not match any of the entries scanned. The
history is of encrypted passwords. It can be set from 0 to DEF_MAX_PWHIST
(currently 8).
- usrmod0_maxbadpw restricts the number of bad
password attempts. A value of 0 sets no limits. This parameter is not
supported in DSS.
[Back]
[Next]