To add or edit a domain for local database authentication
Navigate to the Portals > Domains window and click Add Domain or the Configure icon for the domain to edit. The Add Domain or Edit Domain window is displayed.
All newly created domains in the local database user type should be set with a default password expiration value, as well as the “show expiration warning days” option set to 15. You can manually change it upon creation. Optionally, force all users in the Local User Database to change their password at set intervals or the next time they login. To force users to change their password at set intervals, type the expiration interval in the Passwords expire in x days field. To force users to change their password the next time they log in, check Require password change on next logon.
If the domain is set with concrete password expiration days, you should also set the user expiration to 0. That means using the domain expiration setting. The domain setting detection is automatic after submitting the “adding user” request. Also, you can manually change it on creation.
The default password expiration value is two years (730 days).
On upgrade, the existing values for password expiration should remains same.
If you set a password expiration interval, type the number of days before expiration that users should receive notifications in the Show warning x days before password expiration field.
When configured and a password is expiring, a notification is displayed on the user’s Virtual Office page or the Administrator’s management console identifying the number of days before their password expires. Notifications also include a link to a screen where the password can be changed.
Optionally select Enforce password complexity. When this option is enforced, at least three of the four following parameters must be met when setting a password:
> English uppercase characters (A through Z)
> English lowercase characters (a through z)
> Base 10 digits (0 through 9)
> Non-alphabetic characters (for example, !, $, #, %)
Optionally select Enable client certificate enforcement to require the use of client certificates for login. By checking this box, you require the client to present a client certificate for strong mutual authentication. Two additional fields appear:
> Verify partial DN in subject – Use the following variables to configure a partial DN that matches the client certificate:
Optionally select One-time passwords to enable the one-time password feature. A drop-down menu appears, in which you can select User discretion, Use E-mail, and Use Mobile App.
These are defined as:
Optionally select Enable Always on VPN to enable the Always on VPN feature. A drop-down menu appears, in which you can select from the following:
> Allow user to disconnect and enter a domain in the E-mail domain: window.
> Allow accessing network if VPN fail to connect.
> Don’t connect VPN in Trusted Network.
Select one of the following options from the Require Device Register drop-down menu:
> Select Use Global Setting to apply the global setting to this domain.
> Select Enable this feature, no matter what is selected for the global setting.
> Select Disable this feature, no matter what is selected for the global setting.