SonicOS 7.1 Users
- SonicOS 7.1
- About SonicOS
- About User Management
- Using Local Users and Groups for Authentication
- Using RADIUS for Authentication
- Using LDAP/Active Directory/eDirectory Authentication
- Using RADIUS
- Using TACACS+
- Using Single Sign-On
- What is Single Sign-On?
- Benefits of SonicWall SSO
- Platforms and Supported Standards
- How Does Single Sign-On Work?
- How Does SSO Agent Work?
- How Does Terminal Services Agent Work?
- How Does Browser NTLM Authentication Work?
- How Does RADIUS Accounting for Single-Sign-On Work?
- Installing the Single Sign-On Agent and/or Terminal Services Agent
- Single Sign-On Advanced Features
- Configuring Access Rules
- Managing SonicOS with HTTP Login from a Terminal Server
- Viewing and Managing SSO User Sessions
- Multiple Administrator Support
- Configuring Users Status
- Configuring User Settings
- User Login Settings
- Setting the Authentication Method for Login
- Configuring RADIUS Authentication
- Configuring LDAP
- Configuring TACACS+
- Requiring User Names be Treated as Case-Sensitive
- Preventing Users From Logging in from More than One Location
- Forcing Users to Log In Immediately After Changing Their Passwords
- Displaying User Login Information Since the Last Login
- Setting the Single-Sign-On Methods
- One-Time Password Settings
- Configuring the User Web Login Settings
- Adding URLs to Authentication Bypass
- User Session Settings
- Accounting
- [[[Missing Linked File System.LinkedTitle]]]
- User Login Settings
- Configuring and Managing Partitions
- Configuring Local Users and Groups
- Configuring Guest Services
- Configuring Guest Accounts
- Managing Guest Status
- SonicWall Support
Configuring Settings
In Device > Users > Local Users & Groups, you can configure user settings.
- Select Apply password constraints for all local users to apply the password constraints that are specified on the Users > Local Users page to all local users.
- Select Prune Expired User Accounts to delete a user account that is configured with a limited lifetime after the lifetime expires.
- In Preferred display format for domain user/group names select any one of the following formats to specify an alternative login name of the user:
name@domain.com
DOMAIN\name (Windows)
name.domain (Novell)
Automatic (From LDAP Schema)
-
In Inactivity Timeout (days) enter the time in days to terminate if a user session is idle for certain amount of time.
-
Select Prune inactive user accounts after timeout to delete an inactive user account that is configured with a limited lifetime after the lifetime expires.
-
Click Accept.
Was This Article Helpful?
Help us to improve our support portal