Why Complex Passwords Should Be Fact and Not Fiction
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2016 ,
SHARE in San Antonio 2016
All three Enterprise Security Managers provide a number of options to control the complexity of password rules. It is essential that users crafting passwords; and Administrators creating password rules; be able to visualize all those symbols available for use. This presentation shows an effective way to visualize; comprehensively; all available symbols used to define the format of and to implement complex passwords that don’t require sticky notes to remember. In this sessions we will supply examples for IBM RACF; but also provide an appendix for CA ACF2 and CA Top Secret as well.-Richard Faulhaber-NewEra Software; Inc.
Back to Proceedings File Library