Symptom
You have questions about passwords in SAP systems.
This note answers the following questions:
- 1. Which rules apply to changing the password?
- 2. What can be configured in the system?
- 3. How is the password stored?
- 4. How is the password transferred using the network?
- 5. Can a user without an authorization profile execute functions in the SAP system?
Other terms
Passwords, security, authentication
Reason and Prerequisites
You require information.
Solution
- 1. Which rules apply to changing passwords?
- When an administrator creates a user account (of the type DIALOG or COMMUNICATION, see Note 622464), they assign an initial password that must be changed immediately when it is first used.
- Passwords that are reset by the administrator must also be changed by the user during the next (interactive) logon.
- By default, the password must have at least three characters. You can change this value using the profile parameter login/min_password_lng.
- The password can have a maximum of eight characters (ABAP systems up to Release 7.0). As of NetWeaver 7.0, ABAP systems support longer passwords (up to 40 characters) and also differentiate between lowercase letters and uppercase letters (see Note 862989).
- ? or ! cannot be the first character of a password.
- The first three characters of the password cannot occur in the same order in the user ID.
- The first three characters cannot be identical.
- The first three characters cannot be blank characters.
- The password cannot be "PASS" or "SAP*".
- The administrator can define patterns of "illegal passwords" (table USR40).
- You can use all characters from the syntactical character set, that is, all letters, digits, and some special characters.
login/min_password_digits
login/min_password_letters
login/min_password_specials
- The system does not differentiate between uppercase and lowercase (ABAP systems up to Release 7.0). As of NetWeaver 7.0, ABAP systems support longer passwords (up to 40 characters) and also differentiate between lowercase letters and uppercase letters (see Note 862989).
- The password can be changed by the user only after the correct old password was entered.
- The new password must differ from the old password by at least one character (that is, they cannot be identical).
- The last five passwords that were chosen by the user are stored in a user-specific password history and cannot be reused.
- The password can be changed by the user once a day at the most. This rule prevents users from bypassing the password history rule. As of NetWeaver 7.0, you can configure this lock period (see Note 862989: login/password_change_waittime).
- Changed password rules do not affect old passwords. Password rules are evaluated only during the password change itself.
As of NetWeaver 7.0, you can specifically prompt certain users to change their passwords early. These are users whose passwords do not comply with the current password rules (see Note 862989: login/password_compliance_to_current_policy).
As of Release 6.10, you can use the function module PASSWORD_FORMAL_CHECK to determine whether a given string corresponds to the current password rules.
- 2. What can be configured in the system?
- login/min_password_lng
This parameter defines the minimum length of the password.
Default value: 3
Allowed values: 3 - 8 (as of Release 7.0: 1 - 40)
- login/min_password_digits (as of Release 6.10)
This parameter defines the minimum number of digits (0-9) in passwords.
Default value: 0
Allowed values: 0 - 8 (as of Release 7.0: 1 - 40)
- login/min_password_letters (as of Release 6.10)
This parameter defines the minimum number of letters (A-Z) in passwords.
Default value: 0
Allowed values: 0 - 8 (as of Release 7.0: 1 - 40)
- login/min_password_specials (as of Release 6.10)
This parameter defines the minimum number of special characters in passwords.
Special characters are: !"@ $%&/()=?'`*+~#-_.,;:{[]}\<>
Default value: 0
Allowed values: 0 - 8 (as of Release 7.0: 1 - 40)
- login/min_password_diff (as of Release 6.10)
This parameter defines the minimum number of characters that must be different in the new password in comparison to the old password. (The system tries to find the best match by rotating both passwords. More detailed information about this is available in the online documentation (RZ11)).
Default value: 1
Allowed values: 1 - 8 (as of Release 7.0: 1 - 40)
- login/password_expiration_time
This parameter defines the number of days after which the password must be changed.
Default value: 0 (no limit)
Allowed values: Any numeric value
- login/fails_to_session_end
This parameter defines the number of unsuccessful logon attempts before the system closes the session. We recommend that you set this parameter to a lower value than the value of the parameter login/fails_to_user_lock.
Default value: 3
Allowed values: 1 - 99
- login/fails_to_user_lock
This parameter defines the number of unsuccessful logon attempts before the system locks the user.
By default, users that were locked due to unsuccessful logon attempts are unlocked at midnight.
Default value: 12 (as of Release 7.0: 5)
Allowed values: 1 - 99
- login/failed_user_auto_unlock
This parameter defines whether password locks (that were set due to multiple failed password logon attempts) are automatically to be considered as expired at midnight.
Default value: 1 (as of Release 7.0: 0)
Allowed values: 0, 1
- login/no_automatic_user_sapstar
For information, see Notes 2383 and 68048.
Remark: The default value was changed as of NetWeaver 7.0.
- rdisp/gui_auto_logout
This parameter defines the maximum idle time in seconds for a user (valid only for SAP GUI connections).
Default value: 0 (no limit)
Allowed values: Any numeric values
In addition, in the table USR40, you can define character combinations or terms that cannot be used as passwords. In this table, you can use the characters "*" and "?" as wildcards. The character "?" represents a single character, and the character "*" represents a character string.
Remark: The table USR40 was not designed to contain thousands of single values for "illegal passwords" (negative dictionary). Instead, the system expects pattern values. Possible new passwords are compared with all the entries in the table USR40. Since this restriction was not entirely clear, and because many customers filled their table USR40 with thousands of single values, we have optimized the search within the table. For more information, see Note 618630.
Examples:
- 123* prohibits all passwords that begin with "123", such as "123456" or "123123".
- P?SS prohibits passwords like "PASS", "PBSS", and so on.
- *? ?* prohibits passwords that contain blank characters (between words).
- 3. How is the password stored?
- 4. How is the password transferred using the network?
There is no option for us to encrypt the data stream between the application server and the database server. Contact your database provider for information about which options are available.
- 5. Can a user without an authorization profile execute functions in the SAP system?
If you discover deficiencies in this area, report them to the SAP Development department.
(In the case of an emergency, you can use a modification to implement checks. In transaction SE93, maintain an authorization object and its values to check the affected transaction).
No comments:
Post a Comment