Cluster Cluster Node Id Node Update Authentication Policy Properties
Update the currently configured authentication policy and password complexity on the node. If any of api_max_auth_failures, api_failed_auth_reset_period, or api_failed_auth_lockout_period are modified, the http service is automatically restarted. Whereas change in any password complexity will not be applicable on already configured user passwords. Administrators need to enforce password change for existing user accounts in order to match newly configured complexity requirements enforced in system. All values from AuthenticationPolicyProperties are in sync among the management cluster nodes.
cluster-node-id
{
"_links": [
{
"action": "string",
"href": "string",
"rel": "string"
}
],
"_schema": "string",
"_self": {},
"_retry_prompt": 0,
"digits": 0,
"hash_algorithm": "string",
"lower_chars": 0,
"max_repeats": 0,
"max_sequence": 0,
"maximum_password_length": 0,
"minimum_password_length": 0,
"minimum_unique_chars": 0,
"password_remembrance": 0,
"special_chars": 0,
"upper_chars": 0,
"api_failed_auth_lockout_period": 0,
"api_failed_auth_reset_period": 0,
"api_max_auth_failures": 0,
"cli_failed_auth_lockout_period": 0,
"cli_max_auth_failures": 0
}
OK
"AuthenticationPolicyProperties Object"
Accepted
"AuthenticationPolicyProperties Object"
Conflict
curl -X PUT -H 'Authorization: <value>' -H 'Content-Type: application/json' -d '{}' https://{api_host}/api/v1/cluster/{cluster-node-id}/node/aaa/auth-policy