Back to Tech Corner
SAS Admin

Article Administration How to Change Internal Account Server Level Policies for SAS Management Console

SAS internal accounts have universal default Account policies and knowing them is important. These account policies may be customized and in organizations with multiple SAS administrators it may be important to set them per security policies and to avoid lockouts; if warranted.

SAS refers to internal account those with the /<id/>@saspw format. An example would be sasadm@saspw (Unrestricted ID)

Default Internal Account Policies

Internal Account AttributesDetails
AccountsDon't expire
Default Password LengthSix (6) Don't expire and no special requirements for alpha numeric or mixed case or symbol
Password Reuse PolicyLast 5 passwords are unusable
Account Lock Policy3 failed attempt locks account for 60 minutes, however an administrator may unlock.
Forced Password Change PolicyPassword do not expire, however, where policy is changed, a Forced Password Change is enforced when:
  1. First use
  2. Password reset

Review Current Settings

To examine current settings log in to SAS Management Console. Use an ID that has administrator privilege or SAS Management Console: Advance privilege.

Steps

SAS Management Console navigationServer Manager interfaceInternal Account Policies dialogPolicy settings screen

Change Internal Account Policies

On your server, navigate to the omaconfig.xml file which is typically in your ../Config/Lev1/SASMeta/MetadataServer/

omaconfig.xml file location

Figure 4 Use any Text editor or XML editor to open file

omaconfig.xml file content

Syntax & element Rules (to Change a Policy or Implement)

Rules

  1. Options are case sensitive
  2. Usable Values are T (alias 1 or Y) or F (alias 0 or N) where T is True and F is False

Available Elements Table

ElementDetail
ChangeDelayInMinutes="number"specifies the number of minutes that must elapse between password changes. This applies only when you are resetting your own password.
MinLength="number-of-characters"specifies the minimum length for passwords
MixedCase="T | F"specifies whether passwords must include at least one uppercase letter and at least one lowercase letter. To enforce this requirement, specify T.
NumPriorPasswords="number"specifies the number of passwords that are maintained in each account's password history. A user cannot reuse a password that is in the user's account history
InactiveDaysToSuspension="number"specifies the number of days after which an unused account is suspended. A value of 0 prevents suspensions due to inactivity.
LockoutDurationInMinutes="number"specifies the number of minutes for which an account is locked following excessive logon failures
NumFailuresForLockout="number"specifies the number of consecutive unsuccessful logon attempts that cause an account to be locked. We recommend that you do not specify 0, because doing so can make your system vulnerable to password guessing attacks.
DigitRequired="T | F"specifies whether passwords must include at least one digit. To enforce this requirement, specify T
ExpirationDays="number"specifies the number of days after a password is set that the password expires. A value of 0 prevents passwords from expiring
ExpirePasswordOnReset="T | F"specifies whether a forced password change occurs on first use and after an administrative password reset. To disable this requirement, specify F.
HashPasswords="SHA256-10000 | SHA256 | MD5"specifies how the internal account password is stored in the metadata
  • SHA256-10000: SHA256-10000 hash function is used. SHA (Secure Hash Algorithm) is FIPS (Federal Information Processing Standard) compliant with 10,000 iterations. This hashing is provided by SAS/SECURE and is the default.
  • SHA256: The SHA256 hash function is used. SHA is FIPS compliant. SHA256 hashing is provided by SAS/SECURE
  • MD5: MD5 hashing is used. MD5 (Message-Digest algorithm 5) is appropriate for preventing accidental exposure of information.

Sample Element Addition in OMACONFIG.XML

Sample element addition in omaconfig.xml

How to Implement Override Server Level Policies on Per User w Internal Account Basis

  1. Log on to SAS Management Console as Administrator
  2. In Plug-Ins select User Manager, Uncheck Show Groups and Show Roles
  3. Select the user who needs updated policies → Right Click → Properties
    User Manager interfaceUser Properties menuProperties dialogAccount Policies tab