|
Thanks, to all that responded. I think I'll just write my own routine (using APIs) to do the check without the counter problem. midrange-l-bounces@xxxxxxxxxxxx wrote: > We have a product from Hawkeye (I'm sure there are other p=oducts) > that has an implementation of this. Hawkeye's implementation will > =ot check the password if it is one invalid attempt away from > disabling. Th= upside on this is that you don't get disabled > passwords. The downside is that you cannot verify that the ones > not checked aren't using a default pas=word. > > However, if the user is using their profi=e as their password we > would certainly hope that they can get that right o= the first > time! But I've seen worse... > > Chris W=isonant > Comporium > Senior Mid-Range Systems Administra=or > iSeries Certified Systems Expert > 803.326.7270 =(W) > 803.326.6142 (F) > chris.whisonant@xxxxxxxxxxxxx
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.