Configuring User Account Lock Settings¶
This guide explains how to configure user account lock settings for Privacera Self-Managed and Data Plane environments. These settings define:
- The number of failed login attempts allowed before a user account is locked
- The duration for which the account remains locked before it is automatically unlocked
Configure the Account Lock Threshold¶
Use this setting to define the maximum number of consecutive failed login attempts allowed before an account is locked.
Default Value: 5
Configuration File: vars.portal.yml (via Privacera Manager)
Example Configuration:
| YAML | |
|---|---|
Configure the Account Lock Duration¶
Use this setting to specify how long a locked account remains inaccessible before it is automatically unlocked.
Default Value: 900000 (15 minutes, in milliseconds)
Configuration File: vars.portal.yml (via Privacera Manager)
Example Configuration:
| YAML | |
|---|---|
Apply Configuration Changes¶
After updating the configuration:
-
SSH into the instance where Privacera Manager is installed.
-
Navigate to the config directory with the following command:
Bash -
Copy the sample-vars if they are not already present in the custom-vars directory by running the following command:
Bash -
Open the
vars.portal.ymlfile in a text editor:Bash -
Add or update the configuration properties as shown above.
-
Save and close the file.
-
Update the Privacera Manager platform instance:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - (Optional) Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on. This step is not required if you are updating only connector properties. -
Restart the portal service if needed.