Modify a Password Policy by DN
patch
/rest/v1/admin/{dn}
Modify a Password Policy by DN
Request
Supported Media Types
- application/json
Path Parameters
-
dn(required): string
LDAP DN of the entry to be modified
Password Policy that needs to be modified
Root Schema : PatchRequest
Type:
Show Source
object
-
controls:
array controls
LDAP controls to be sent to server for LDAP modify operation.
-
msgType(required):
string
Default Value:
urn:ietf:params:rest:schemas:oracle:oud:1.0:ModifyRequest
The REST message type -
operations(required):
array operations
Modifications (Patch operations) to be performed on the entry.
Nested Schema : controls
Type:
array
LDAP controls to be sent to server for LDAP modify operation.
Show Source
Nested Schema : operations
Type:
array
Modifications (Patch operations) to be performed on the entry.
Show Source
Nested Schema : PatchOperation
Type:
Show Source
object
-
attribute(required):
string
The entry attribute to be modified.
-
opType(required):
string
Allowed Values:
[ "add", "delete", "replace", "increment" ]
The type of the Patch Operation. -
values:
array values
The attribute values to be updated.
Response
Supported Media Types
- application/json
200 Response
OK
Root Schema : Password Policy PatchSuccessResponse
Type:
Show Source
object
-
msgType(required):
string
Default Value:
urn:ietf:params:rest:schemas:oracle:oud:1.0:ModifyResponse
The REST message type -
searchResultEntries(required):
array searchResultEntries
Number of search result entries returned after the LDAP operation.
-
totalResults(required):
integer(int32)
Specifies the number of entries created, and returned.
Nested Schema : searchResultEntries
Type:
array
Number of search result entries returned after the LDAP operation.
Show Source
Nested Schema : Password Policy SearchResultEntry
Type:
Show Source
object
-
attributes(required):
object Password Policy Properties
-
dn(required):
string
LDAP DN of the entry to be created
Nested Schema : Password Policy Properties
Type:
Show Source
object
-
cn:
string
CN (common name) of the entry
-
ds-cfg-account-status-notification-handler:
array ds-cfg-account-status-notification-handler
Specifies the names of the account status notification handlers that are used with the associated password storage scheme.
-
ds-cfg-allow-expired-password-changes:
boolean
Default Value:
false
Indicates whether a user whose password is expired is still allowed to change that password using the password modify extended operation. -
ds-cfg-allow-multiple-password-values:
boolean
Default Value:
false
Indicates whether user entries can have multiple distinct values for the password attribute. -
ds-cfg-allow-pre-encoded-passwords:
boolean
Default Value:
false
Indicates whether users can change their passwords by providing a pre-encoded value. -
ds-cfg-allow-user-password-changes:
boolean
Default Value:
true
Indicates whether users can change their own passwords. -
ds-cfg-default-password-storage-scheme(required):
array ds-cfg-default-password-storage-scheme
Specifies the names of the password storage schemes that are used to encode clear-text passwords for this password policy.
-
ds-cfg-deprecated-password-storage-scheme:
array ds-cfg-deprecated-password-storage-scheme
Specifies the names of the password storage schemes that are considered deprecated for this password policy.
-
ds-cfg-expire-passwords-without-warning:
boolean
Default Value:
false
Indicates whether the Directory Server allows a user's password to expire even if that user has never seen an expiration warning notification. -
ds-cfg-force-change-on-add:
boolean
Default Value:
false
Indicates whether users are forced to change their passwords upon first authenticating to the Directory Server after their account has been created. -
ds-cfg-force-change-on-reset:
boolean
Default Value:
false
Indicates whether users are forced to change their passwords if they are reset by an administrator. -
ds-cfg-grace-login-count:
integer(int32)
Default Value:
0
Specifies the number of grace logins that a user is allowed after the account has expired to allow that user to choose a new password. -
ds-cfg-idle-lockout-interval:
string
Default Value:
0 seconds
Specifies the maximum length of time that an account may remain idle (that is, the associated user does not authenticate to the server) before that user is locked out. -
ds-cfg-last-login-time-attribute:
string
Specifies the name or OID of the attribute type that is used to hold the last login time for users with the associated password policy.
-
ds-cfg-last-login-time-format:
string
Specifies the format string that is used to generate the last login time value for users with the associated password policy.
-
ds-cfg-lockout-duration:
string
Default Value:
0 seconds
Specifies the length of time that an account is locked after too many authentication failures. -
ds-cfg-lockout-failure-count:
integer(int32)
Default Value:
0
Specifies the maximum number of authentication failures that a user is allowed before the account is locked out. -
ds-cfg-lockout-failure-expiration-interval:
string
Default Value:
0 seconds
Specifies the length of time before an authentication failure is no longer counted against a user for the purposes of account lockout. -
ds-cfg-lockout-soft-duration:
string
Default Value:
0 seconds
Specifies the length of time that an account is temporarily locked after too many authentication failures. -
ds-cfg-lockout-soft-failure-count:
integer(int32)
Default Value:
0
Specifies the maximum number of authentication failures that a user is allowed before the account is locked temporarily. -
ds-cfg-max-password-age:
string
Default Value:
0 seconds
Specifies the maximum length of time that a user can continue using the same password before it must be changed (that is, the password expiration interval). -
ds-cfg-max-password-reset-age:
string
Default Value:
0 seconds
Specifies the maximum length of time that users have to change passwords after they have been reset by an administrator before they become locked. -
ds-cfg-min-password-age:
string
Default Value:
0 seconds
Specifies the minimum length of time after a password change before the user is allowed to change the password again. -
ds-cfg-password-attribute(required):
string
Specifies the attribute type used to hold user passwords.
-
ds-cfg-password-change-requires-current-password:
boolean
Default Value:
false
Indicates whether user password changes must use the password modify extended operation and must include the user's current password before the change is allowed. -
ds-cfg-password-expiration-warning-interval:
string
Default Value:
5 days
Specifies the maximum length of time before a user's password actually expires that the server begins to include warning notifications in bind responses for that user. -
ds-cfg-password-generator:
string
Specifies the name of the password generator that is used with the associated password policy.
-
ds-cfg-password-history-count:
integer(int32)
Default Value:
0
Specifies the maximum number of former passwords to maintain in the password history. -
ds-cfg-password-history-duration:
string
Default Value:
0 seconds
Specifies the maximum length of time that passwords remain in the password history. -
ds-cfg-password-validator:
array ds-cfg-password-validator
Specifies the names of the password validators that are used with the associated password storage scheme.
-
ds-cfg-previous-last-login-time-attribute:
string
Specifies the name or OID of the attribute type that is used to hold the one but last login time for users with the associated password policy.
-
ds-cfg-previous-last-login-time-format:
array ds-cfg-previous-last-login-time-format
Specifies the format string(s) that might have been used with the last login time at any point in the past for users associated with the password policy.
-
ds-cfg-require-change-by-time:
string
Specifies the time by which all users with the associated password policy must change their passwords.
-
ds-cfg-require-secure-authentication:
boolean
Default Value:
false
Indicates whether users with the associated password policy are required to authenticate in a secure manner. -
ds-cfg-require-secure-password-changes:
boolean
Default Value:
false
Indicates whether users with the associated password policy are required to change their password in a secure manner that does not expose the credentials. -
ds-cfg-skip-force-change-reset-on-deprecate:
boolean
Default Value:
false
Indicates whether to skip force change on reset, when the user passwords are depricated and re-hashed with default storage scheme. Note: to set this flag to true, the force-change-on-reset must be true -
ds-cfg-skip-validation-for-administrators:
boolean
Default Value:
false
Indicates whether passwords set by administrators are allowed to bypass the password validation process that is required for user password changes. -
ds-cfg-state-update-failure-policy:
string
Default Value:
reactive
Allowed Values:[ "ignore", "proactive", "reactive" ]
Specifies how the server deals with the inability to update password policy state information during an authentication attempt. -
objectclass(required):
array objectclass
Objectclass(es) which this entry belongs to.
Nested Schema : ds-cfg-account-status-notification-handler
Type:
array
Specifies the names of the account status notification handlers that are used with the associated password storage scheme.
Show Source
Nested Schema : ds-cfg-default-password-storage-scheme
Type:
array
Specifies the names of the password storage schemes that are used to encode clear-text passwords for this password policy.
Show Source
Nested Schema : ds-cfg-deprecated-password-storage-scheme
Type:
array
Specifies the names of the password storage schemes that are considered deprecated for this password policy.
Show Source
Nested Schema : ds-cfg-password-validator
Type:
array
Specifies the names of the password validators that are used with the associated password storage scheme.
Show Source
Nested Schema : ds-cfg-previous-last-login-time-format
Type:
array
Specifies the format string(s) that might have been used with the last login time at any point in the past for users associated with the password policy.
Show Source
400 Response
ERROR
406 Response
Not Acceptable
Root Schema : ErrorResponse
Type:
Show Source
object
-
ldapErrorCode:
integer(int32)
Specifies the LDAP error code returned for the operation.
-
message(required):
string
Error message returned returned for the operation.
-
msgType(required):
string
Default Value:
urn:ietf:params:rest:schemas:oracle:oud:1.0:ErrorResponse
The REST message type