Skip to Main Content

Security Software

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Interested in getting your voice heard by members of the Developer Marketing team at Oracle? Check out this post for AppDev or this post for AI focus group information.

Allow passwords to enter in pre-encoded form

2844987Jul 6 2016 — edited Jul 7 2016

Hi,

Sometimes we use LDAP Client to update end users password manually to perform admin activities. But when we enter plain password, we are getting below error.

I changed allow-expired-password-changes to true and restarted the server. Even then it didn't worked. Please help!

Error while executing LDIF

- [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

  java.lang.Exception: [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.checkResponse(DirectoryApiConnectionWrapper.java:1280)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.access$600(DirectoryApiConnectionWrapper.java:109)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper$4.run(DirectoryApiConnectionWrapper.java:726)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.runAndMonitor(DirectoryApiConnectionWrapper.java:1175)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.checkConnectionAndRunAndMonitor(DirectoryApiConnectionWrapper.java:1109)

  at org.apache.directory.studio.connection.core.io.api.DirectoryApiConnectionWrapper.modifyEntry(DirectoryApiConnectionWrapper.java:748)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ImportLdifRunnable.importLdifRecord(ImportLdifRunnable.java:514)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ImportLdifRunnable.importLdif(ImportLdifRunnable.java:272)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ExecuteLdifRunnable.executeLdif(ExecuteLdifRunnable.java:157)

  at org.apache.directory.studio.ldapbrowser.core.jobs.ExecuteLdifRunnable.run(ExecuteLdifRunnable.java:123)

  at org.apache.directory.studio.ldapbrowser.core.jobs.UpdateEntryRunnable.run(UpdateEntryRunnable.java:59)

  at org.apache.directory.studio.connection.ui.RunnableContextRunner$1.run(RunnableContextRunner.java:112)

  at org.eclipse.jface.operation.ModalContext$ModalContextThread.run(ModalContext.java:121)

  [LDAP: error code 53 - User passwords may not be provided in pre-encoded form]

This is my default password policy.

        Property                                   Value(s)

         --------------------------------------------------------------------

    1)   account-status-notification-handler        -

    2)   allow-expired-password-changes             true

    3)   allow-user-password-changes                true

    4)   default-password-storage-scheme            Salted SHA-1

    5)   deprecated-password-storage-scheme         -

    6)   expire-passwords-without-warning           false

    7)   force-change-on-add                        false

    8)   force-change-on-reset                      false

    9)   grace-login-count                          0

    10)  idle-lockout-interval                      0 s

    11)  last-login-time-attribute                  -

    12)  last-login-time-format                     -

    13)  lockout-duration                           0 s

    14)  lockout-failure-count                      3

    15)  lockout-failure-expiration-interval        10 m

    16)  lockout-soft-duration                      0 s

    17)  lockout-soft-failure-count                 0

    18)  max-password-age                           0 s

    19)  max-password-reset-age                     0 s

    20)  min-password-age                           0 s

    21)  password-attribute                         userpassword

    22)  password-change-requires-current-password  false

    23)  password-expiration-warning-interval       5 d

    24)  password-generator                         Random Password Generator

    25)  password-history-count                     0

    26)  password-history-duration                  0 s

    27)  password-validator                         -

    28)  previous-last-login-time-attribute         -

    29)  previous-last-login-time-format            -

    30)  require-change-by-time                     -

    31)  require-secure-authentication              false

    32)  require-secure-password-changes            false

    ?)   help

    f)   finish - apply any changes to the Password Policy

    q)   quit

Enter choice [f]: f

This post has been answered by handat on Jul 7 2016
Jump to Answer
Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Aug 4 2016
Added on Jul 6 2016
6 comments
3,421 views