Raritan Computer EMX2-111 User Manual
Chapter 6: Security
113
Enabling Password Aging
Password Aging determines whether users are required to change
passwords at regular intervals. The default interval is 60 days.
passwords at regular intervals. The default interval is 60 days.
To force users to change passwords regularly:
1. Choose Device Settings > Security > Password Policy. The
Password Policy dialog appears.
2. Select the Password Aging checkbox to enable the password aging
feature.
3. To determine how often users are requested to change their
passwords, select a number of days in the Password Aging Interval
field. Users are required to change their password every time that
number of days has passed.
field. Users are required to change their password every time that
number of days has passed.
Tip: If the desired time option is not listed, you can manually type the
desired time in this field. For example, you can type "9 d" to set the
password aging time to 9 days.
desired time in this field. For example, you can type "9 d" to set the
password aging time to 9 days.
4. Click OK to save the changes.
Setting Up Role-Based Access Control Rules
Role-based access control rules are similar to firewall rules, except they
are applied to members sharing a specific role. This enables you to grant
system permissions to a specific role, based on their IP addresses.
are applied to members sharing a specific role. This enables you to grant
system permissions to a specific role, based on their IP addresses.
To set up role-based access control rules:
1. Enable the feature. See
Enabling the Feature
(on page 113).
2. Set the default policy. See
Changing the Default Policy
(on page
3. Create rules specifying which addresses to accept and which ones to
discard when the addresses are associated with a specific role. See
Creating Role-Based Access Control Rules
(on page 115).
Changes made do not affect users currently logged in until the next login.
Enabling the Feature
You must enable this access control feature before any relevant rule can
take effect.
take effect.
To enable role-based access control rules:
1. Choose Device Settings > Security > Role Based Access Control.
The Configure Role Based Access Control Settings dialog appears.