Use profile parameters to set password and logon rules.
These profile parameters define the minimum requirements for passwords. You cannot set upper limits for password rules, except for generated passwords. For example, users can use any number of special characters in their passwords, as long as they follow the other password rules.
The profile parameters replaced by security policies are shown in the last table. You can continue to use these parameter instead of the security policies. However, in this case, you cannot control the system behavior on a user-specific basis.
To make the parameters globally effective in an ABAP System (system profile parameters), set them in the default system profile DEFAULT.PFL. However, to make them instance-specific, set the parameters in the profiles of the system application servers.
To display the parameter documentation, in the profile parameter maintenance tool (transaction RZ11), enter the parameter name and choose Display. On the next screen, choose the Documentation button.
Parameter |
Value |
Description |
---|---|---|
login/password_charset |
Default: 1 Permissible values:
|
This parameter defines the characters of which a password can consist. Caution
With login/password_charset = 2, the system stores passwords in a format that systems with older kernels cannot interpret. Therefore, ensure that all systems involved support the new password coding before setting the profile parameter to the value 2. |
Parameter |
Value |
Description |
---|---|---|
login/password_downwards_compatibility |
Default: 1 Permissible values:
|
Specifies the degree of backward compatibility. Caution
With login/password_downwards_compatibility = 0, the system stores passwords in a format that systems with older kernels cannot interpret. Therefore, ensure that all systems involved support the new password coding before setting the profile parameter to the value 0. |
login/password_hash_algorithm |
Default: Depends on the kernel version Permissible values: see 991968 |
Specifies the hash procedure and the coding format for the calculation of new password hash values. You do not usually need to change the default value set by the kernel. Note
If the profile parameter login/password_downwards_compatibility has the value 5, only backward compatible passwords are permissible. This means that the parameter login/password_hash_algorithm would be meaningless. |
Parameter |
Value |
Description |
---|---|---|
login/disable_multi_gui_login |
Default: 0 Permissible values: 0, 1
|
Controls the deactivation of multiple dialog logons |
login/multi_login_users |
Default: <empty_list> |
List of excepted users, that is, the users that are permitted to log on to the system more than once. |
Parameter |
Value |
Description |
---|---|---|
login/fails_to_session_end |
Default: 3 Permissible values: 1 - 99 |
Defines the number of unsuccessful logon attempts before the system does not allow any more logon attempts. Set the parameter to a value lower than the value of parameter login/fails_to_user_lock. |
Parameter |
Value |
Description |
---|---|---|
login/accept_sso2_ticket |
Default: 0 Permissible values:
|
Allows or locks the logon using SSO ticket. |
login/create_sso2_ticket |
Default: 0 Permissible values:
|
Allows the creation of SSO tickets. Recommendation
We recommend you set this to 2. The SSO tickets are significantly smaller without the certificate and therefore have less overhead. |
login/ticket_expiration_time |
Default value: 8 (in hours) |
Defines the validity period of an SSO ticket. |
login/ticket_only_by_https |
Default: 0 Permissible values:
|
Specifies how the system sets the logon ticket, generated at logon using HTTP(S), in the browser. |
login/ticket_only_to_host |
Default: 0 Permissible values:
|
Specifies how the system sets the logon ticket, generated at logon using HTTP(S), in the browser. |
Parameter |
Value |
Description |
---|---|---|
login/disable_cpic |
Default: 0 Permissible values: 0, 1 (Boolean) 1: Refuses inbound connections of type CPIC. Inbound connections of type RFC remain unaffected. |
Refuse inbound connections of type CPIC |
login/no_automatic_user_sapstar |
Default: 1, that is, you need to explicitly activate the emergency user Permissible values: 0, 1 |
Control the emergency user SAP*. |
login/server_logon_restriction |
Default: 0 Permissible values:
|
Use this profile parameter to prevent other users from logging on to the system. This can be useful during system maintenance. This feature requires specific kernel releases. For more information, see
1891583 |
login/system_client |
Default: 000 Permissible values: 000 - 999 |
Specifies the default client that the system automatically enters on the logon screen. Users can, however, overwrite the default value with a different client. |
login/update_logon_timestamp |
Default: m Permissible values:
|
Specifies the exactness of the logon timestamp. |
Parameter |
Value |
Description |
---|---|---|
rdisp/gui_auto_logout |
Default: 0 (unrestricted) Permissible values: Any numeric value |
Defines the maximum idle time for a user in seconds (applies only for SAP GUI connections). |
Parameter |
Security Policy Attribute |
Value |
Description |
---|---|---|---|
login/min_password_lng |
MIN_PASSWORD_LENGTH |
Default: 6 Permissible values: 3 - 40 |
Defines the minimum length of the password. |
login/min_password_digits |
MIN_PASSWORD_DIGITS |
Default Value: 0 Permissible values: 0 - 40 |
Defines the minimum number of digits (0-9) in passwords. |
login/min_password_letters |
MIN_PASSWORD_LETTERS |
Default Value: 0 Permissible Values: 0 - 40 |
Defines the minimum number of letters (A-Z) in passwords. |
login/min_password_lowercase |
MIN_PASSWORD_LOWERCASE |
Default Value: 0 Permissible Values: 0 - 40 |
Specifies how many characters in lower-case letters a password must contain. |
login/min_password_uppercase |
MIN_PASSWORD_UPPERCASE |
Default Value: 0 Permissible Values: 0 - 40 |
Specifies how many characters in upper-case letters a password must contain. |
login/min_password_specials |
MIN_PASSWORD_SPECIALS |
Default Value: 0 Permissible Values: 0 - 40 |
Defines the minimum number of special characters in the password. All characters that are not letters or digits are regarded as special characters. |
login/password_compliance_to_current_policy |
PASSWORD_COMPLIANCE_TO_CURRENT_POLICY |
Default: 0 Permissible values:
|
Used to check password to current security policy. |
login/disable_password_logon |
DISABLE_PASSWORD_LOGON |
Default: 0 Permissible values:
|
Controls the deactivation of password-based logon This means that the user can no longer log on using a password, but only with single sign-on variants (X.509 certificate, logon ticket). See Logon Data Tab Page |
login/password_logon_usergroup |
DISABLE_PASSWORD_LOGON |
Default: <empty_character_string> |
Controls the deactivation of password-based logon for user groups |
login/password_max_idle_productive |
MAX_PASSWORD_IDLE_PRODUCTIVE |
Default: 0: the check is deactivated Permissible Values: 0 - 24,000 (in days) |
Specifies the maximum period for which an unused productive password (a password set by the user) remains valid. After this period has expired, the user can no longer use the password for authentication. The user administrator can reactivate password-based logon by assigning a new initial password. |
login/password_max_idle_initial |
MAX_PASSWORD_IDLE_INITIAL |
Default: 0: the check is deactivated Permissible Values: 0 - 24,000 (in days) |
Specifies the maximum period for which an unused initial password (a password set by the user administrator) remains valid. After this period has expired, the user can no longer use the password for authentication. The user administrator can reactivate password-based logon by assigning a new initial password. This parameter replaces the profile parameters login/password_max_new_valid and login/password_max_reset_valid. |
login/min_password_diff |
MIN_PASSWORD_DIFFERENCE |
Default: 1 Permissible values: 1 - 40 |
Defines the minimum number of characters that must be different in the new password compared to the old password. |
login/password_expiration_time |
PASSWORD_CHANGE_INTERVAL |
Default: 0 Permissible Values: 0 - 1000 (in days) |
Defines the validity period of passwords in days. |
login/password_change_for_SSO |
PASSWORD_CHANGE_FOR_SSO |
Default: 1 Permissible values:
|
If the user logs on with single sign-on, checks whether the user must change his or her password. |
login/password_change_waittime |
MIN_PASSWORD_CHANGE_WAITTIME |
Default: 5 Permissible values: 1 - 100 (number of entries) |
Specifies the number of passwords (chosen by the user, not the administrator) that the system stores and that the user is not permitted to use again. |
login/password_change_waittime |
MIN_PASSWORD_CHANGE_WAITTIME |
Default: 1 Permissible values: 1 - 1000 (in days) |
Specifies the number of days that a user must wait before changing the password again. |
login/fails_to_user_lock |
MAX_FAILED_PASSOWRD_LOGON_ATTEMPTS |
Default: 5 Permissible values: 1 - 99 |
Defines the number of unsuccessful logon attempts before the system locks the user. |
login/failed_user_auto_unlock |
PASSWORD_LOCK_EXPIRATION |
Default: 0: Locks due to incorrect logon attempts remain valid for an unlimited period Permissible values: 0, 1 |
Defines whether user locks due to unsuccessful logon attempts are automatically removed at midnight. |