The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Centralized Server Side Password policy enforcement using an LDAP server
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
Password Validation Service using LDAP
In many environment directory servers are used to store user entries and passwords. There are typically multiple applications that access the data, and many times multiple applications that attempt to validate and enforce the password policy before making an update to the directory server. This means within a given environment there are multiple password policy validation mechanisms. This complexity of password policy stored in the applications also reduces the ability to easily modify password policies.
The solution is to use the LDAP directory server as the centralized server-side password policy enforcer. A simple control passed along with a modify request signals the server to validate the password change is allowed without actually making the change. This would simplify the upstream applications by removing their need to know the password policy, while still providing them the ability to validate a password change.