Skip to Main Content

Security Software

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Allow passwords to enter in pre-encoded form

2844987Jul 6 2016 — edited Jul 7 2016

Hi,

Sometimes we use LDAP Client to update end users password manually to perform admin activities. But when we enter plain password, we are getting below error.

I changed allow-expired-password-changes to true and restarted the server. Even then it didn't worked. Please help!

Error while executing LDIF

- [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

  java.lang.Exception: [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.checkResponse(DirectoryApiConnectionWrapper.java:1280)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.access$600(DirectoryApiConnectionWrapper.java:109)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper$4.run(DirectoryApiConnectionWrapper.java:726)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.runAndMonitor(DirectoryApiConnectionWrapper.java:1175)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.checkConnectionAndRunAndMonitor(DirectoryApiConnectionWrapper.java:1109)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.modifyEntry(DirectoryApiConnectionWrapper.java:748)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ImportLdifRunnable.importLdifRecord(ImportLdifRunnable.java:514)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ImportLdifRunnable.importLdif(ImportLdifRunnable.java:272)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ExecuteLdifRunnable.executeLdif(ExecuteLdifRunnable.java:157)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ExecuteLdifRunnable.run(ExecuteLdifRunnable.java:123)

  at org.apache.directory.studio.ldapbrowser.core.jobs.UpdateEntryRunnable.run(UpdateEntryRunnable.java:59)

  at org.apache.directory.studio.connection.ui.RunnableContextRunner$1.run(RunnableContextRunner.java:112)

  at org.eclipse.jface.operation.ModalContext$ModalContextThread.run(ModalContext.java:121)

  [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

This is my default password policy.

        Property                                   Value(s)

         --------------------------------------------------------------------

    1)   account-status-notification-handler        -

    2)   allow-expired-password-changes             true

    3)   allow-user-password-changes                true

    4)   default-password-storage-scheme            Salted SHA-1

    5)   deprecated-password-storage-scheme         -

    6)   expire-passwords-without-warning           false

    7)   force-change-on-add                        false

    8)   force-change-on-reset                      false

    9)   grace-login-count                          0

    10)  idle-lockout-interval                      0 s

    11)  last-login-time-attribute                  -

    12)  last-login-time-format                     -

    13)  lockout-duration                           0 s

    14)  lockout-failure-count                      3

    15)  lockout-failure-expiration-interval        10 m

    16)  lockout-soft-duration                      0 s

    17)  lockout-soft-failure-count                 0

    18)  max-password-age                           0 s

    19)  max-password-reset-age                     0 s

    20)  min-password-age                           0 s

    21)  password-attribute                         userpassword

    22)  password-change-requires-current-password  false

    23)  password-expiration-warning-interval       5 d

    24)  password-generator                         Random Password Generator

    25)  password-history-count                     0

    26)  password-history-duration                  0 s

    27)  password-validator                         -

    28)  previous-last-login-time-attribute         -

    29)  previous-last-login-time-format            -

    30)  require-change-by-time                     -

    31)  require-secure-authentication              false

    32)  require-secure-password-changes            false

    ?)   help

    f)   finish - apply any changes to the Password Policy

    q)   quit

Enter choice [f]: f

This post has been answered by handat on Jul 7 2016
Jump to Answer
Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Aug 4 2016
Added on Jul 6 2016
6 comments
3,577 views