Password management procedures, Changing your password, Changing passwords when a security officer leaves – HP Secure Key Manager User Manual
Page 77
3.
Click LDAP Test.
Password management procedures
Changing your password
To change your administrator account password:
1.
Log in to the Management Console using your administrator account.
2.
Navigate to the Change Your Password section of the Administrator Configuration page (Device
Configuration > Administrators > Password Management).
3.
Enter your current password in the Current Password field.
4.
Enter a new password in the New Password and Confirm New Password fields.
5.
Click Change Password.
Configuring password settings for local administrators
To configure password settings for local administrators:
1.
Log in to the Management Console as an administrator with High Access Administrators access
control.
2.
Navigate to the Password Settings for Local Administrators section of the Administrator
Configuration page (Device Configuration > Administrators > Password Management).
3.
Click Edit.
4.
To enable password expiration, enter the Maximum Password Age in the Password Expiration
field. When an administrator's password reaches this age, the administrator will be forced to
create a new password.
5.
To enable password history, enter the Num Passwords to Remember in the Password History
field. When creating a new password, an administrator cannot use a value that exists in their
password history.
NOTE:
The password history is only consulted when administrators attempt to change their own
passwords. It is not checked when one administrator changes another's password.
6.
Enter the Minimum Password Length.
7.
Specify if the password must contain at least one lower case letter, upper case letter, number,
or special character, or some combination of these values.
8.
Click Save.
Changing passwords when a security officer leaves
In the event of a security officer personnel change, immediately change the passwords for administrator
accounts, user accounts, and backups in order to protect integrity of the SKM system and the data
protected by the encryption keys. This procedure should be handled quickly but deliberately, so that
Secure Key Manager
77