Neoview ODBC Drivers Manual (R2.5)

Password Expiration
NDCS is configured to allow the driver to display password expiration warnings. If you receive
a warning, you can continue your session, but you should change your password with NCI or
HPDM as soon as possible.
If you are using HPDM or NCI to connect and you get a password expiration warning, you are
prompted to change your password and then log on to the session.
Password Encryption
Neoview clients require the user to present a password in order to log on. These passwords are
encrypted by the Neoview ODBC and JDBC drivers, using industry standard asymmetric key
cryptography. For detailed information about passwords, password encryption, certificates, and
other security issues, see the Neoview User Management and Security Administration Guide.
Passwords for Platform-level Users
Passwords for the predefined “platform-level” users are set during system installation.
To log on to any Neoview client, a platform-level user must provide both the password of his
or her platform username and the password of the underlying user ID, as in:
mypassword/acctpassword
where mypassword is the password associated with the platform username, and acctpassword
is the password associated with the underlying user ID. For example, if you have a personal
account as ROLE.SECMGR, not as a database user but as a platform user (who has access to the
platform even when the LDAP server is unavailable), you must enter your own password, a
forward slash, and then the password associated with ROLE.SECMGR.
Passwords for platform-level users are encrypted in transit in the same way as LDAP user
passwords and are stored on the Neoview platform in an encrypted form. This protection ensures
that passwords on the Neoview platform cannot be compromised even if the file is viewed.
Passwords for platform-level users have these characteristics:
Minimum length of 8 bytes
Maximum length of 64 bytes
NOTE: If you use 1024-bit keys, the combined length of the passwords for a platform user
ID and cannot exceed 70 characters.
Must contain at least one of each of the following: uppercase character, lowercase character,
digit, non- alphanumeric character
May not contain double-quotes (“), semi-colons (;), forward slashes (/), or commas (,).
May not contain the user's name
May not contain more than two consecutive instances of the same character
May contain blanks but may not begin or end with a blank
May contain non-printable ASCII characters
May not contain non-ASCII characters
Do not expire unless you modify the security policy to specify expiration
After three failed attempts at logging on, a platform user has to wait for 30 seconds before retrying.
Passwords for Database (LDAP) Users
Passwords for LDAP users must match those defined in the external directory. LDAP password
administration is performed in the LDAP server environment, except that:
Passwords and Server Certificates 35