Difference between revisions of "PINsafe Configuration Best Practices"

From Swivel Knowledgebase
Jump to: navigation, search
 
m (1 revision imported)
 
(No difference)

Latest revision as of 12:52, 11 May 2017


Overview

Each Swivel installation will have its own requirements that will require changes to standard configurations. However below are some best practices for configuring Swivel policies and settings.


Policy>General

  • Security String Type: Numbers, Upper Case Letters, Lower Case Letters, Mixed numbers and letters

Default: Numbers

Best Practice: Numbers or Upper Case Letters


  • Account lockout time (minutes):

Default: 0

Best Practice: 30 minutes


  • Maximum login tries: 0-99

Default: 5

Best Practice: Testing 0 (no lockout), Initial provisioning: 5, Long Term production: 3


  • Increment Login failure count if user has no security strings: Yes/No

Default: Yes

Best Practice: Yes


  • Inactive account expiry (days):

Default 0 (no expiry)

Best Practice: 90


  • Auto. set credentials on user creation: Yes/No

Default: Yes

Best Practice: Yes


Policy>PIN and OTC

  • PIN expiry (days): 0-99

Default: 0 (no expiry)

Best Practice: as PIN expiry (where change PIN is available)


  • PIN expiry after auto/admin reset (days): 0-99

Default: 0

Best Practice: Yes (where change PIN is available)


  • PIN expiry warning (days): 0-99

Default: 0 (no expiry)

Best Practice: 14


  • Auto-reset PIN on expiry: Yes/No

Default: No

Best Practice: Yes


  • PIN change grace period (days): 0-99

Default: 0

Best Practice: 7


  • Require PIN change after auto. setting:

Default: No

Best Practice: Yes (where change PIN is available)


  • Require PIN change after admin. reset:

Default: No

Best Practice: Yes (where change PIN is available)


  • Require password for PIN change: Yes/No

Default: Yes

Best Practice: Yes (where change PIN is available)


  • Only warn user, do not lock account: Yes/No

Default: No

Best Practice: No, (Yes if Auto-reset PIN on expiry is used)


  • Minimum PIN size: 4-10

Default: 4

Best Practice: 4


  • PINless OTC length: 4-10

Default: 6

Best Practice: 6


  • Maximum repeated PIN digits:

Default: 0 (digits may not be repeated)

Best Practice: 0


  • Allow numerical sequences for PIN:

Default: Yes

Best Practice: No


Policy>Password

  • Require password:

Default: No

Best Practice: No (Where another primary/secondary authentication server is used in access device)


Policy>Self-Reset

  • Allow user self-reset: Yes/No

Default: No

Best Practice: Yes


  • Send reset code as security string: Yes/No

Default: No

Best Practice: No


  • Maximum self-reset tries: 0-99

Default: 3

Best Practice: 3


  • Allow user self-provision of mobile client: Yes/No

Default: No

Best Practice: Yes


  • Send provision code as security string: Yes/No

Default: No

Best Practice: No


  • Log device information when provisioning: Yes/No

Default: No

Best Practice: Yes


  • Provision Code Validity period (seconds): 10-1000000

Default: 600

Best Practice: 86400


Policy>Helpdesk

  • Helpdesk Users can manage other repositories: Yes/No

Default: No

Best Practice: No


  • Helpdesk can reset PINs: Yes/No

Default: Yes

Best Practice: No


  • Helpdesk Users can administer editable repositories: Yes/No

Default: No

Best Practice: No


  • Helpdesk can view Status page: Yes/No

Default: Yes

Best Practice: Yes


  • Helpdesk can view Log Viewer page: Yes/No

Default: Yes

Best Practice: No


  • Helpdesk can view reports:

Default: No

Best Practice: No


Policy>Console Login

  • Show the password field: Yes/No

Default: Yes

Best Practice: No


  • Use single channel login: Yes/No

Default: Yes

Best Practice: Yes


  • Update TURing immediately after entering username: Yes/No

Default: No

Best Practice: Yes


Policy>Banned Credentials

Default: None

Best Practice: 19??, 200?, 201?


Policy>Mobile Client

  • Allow user to enter PIN: Yes/No

Default: No

Best Practice: No


  • Allow user to choose how to extract OTC: Yes/No

Default: No

Best Practice: No


  • Allow user to browse strings: Yes/No

Default: No

Best Practice: No


Logging>SMTP

  • Send errors:

Default: No

Best Practice: No (where Syslog is used)


  • Send account locks:

Default: No

Best Practice: Yes


  • Send User Account Create/Delete:

Default: No

Best Practice: No


Transport>User Alerts

  • PIN changed: Yes/No

Default: Yes

Best Practice: Yes


  • PIN change required: Yes/No

Default: Yes

Best Practice: Yes


  • PIN expiry warning: Yes/No

Default: Yes

Best Practice: Yes


  • Account locked: Yes/No

Default: Yes

Best Practice: Yes


  • Account unlocked: Yes/No

Default: Yes

Best Practice: Yes


  • Account inactive: Yes/No

Default: Yes

Best Practice: Yes


  • Device key allocated: Yes/No

Default: Yes

Best Practice: Yes


  • No transport is error: Yes/No

Default: No

Best Practice: No


Database>General

  • Case sensitive usernames: Yes/No

Default: No

Best Practice: No


Server Agents and RADIUS NAS

  • Check password with Repository:

Default: No

Best Practice: No (Where another primary/secondary authentication server is used in access device)