Security Policy

Admin users can configure security settings related to passwords to ensure that STEP users adhere to the required password security level. To access the password settings, on the System Setup tab, select the Users & Groups node. Scroll down to find the Security Policy flipper, which includes the following settings, shown below:

Important: Changes made to these parameters will be applied to all user groups located under the Users & Groups node. These settings cannot be customized for single users or user groups.

To change the Security Policy parameters, click the Edit button below the parameters to display the Security Policy edit dialog.

  • Password Strength Validation – When checked, new passwords must conform to at least three of the four requirements intended to ensure a strong password.

  • Must contain a minimum of one lower case character

  • Must contain a minimum of one upper case character

  • Must contain a minimum of one digit

  • Must contain a minimum of one special character

Additionally, the password must meet the minimum password character requirement, which ranges from the default of eight (8) characters to the maximum of 20.

The following error displays in workbench and in Web UI if not all password requirements are met.

  • Password Expiration – When checked, all new passwords will expire after the set number of days have passed. Once a password has expired, upon the next log in attempt, login will fail and an 'Invalid username or password' message will display. Verify that you have entered the correct username and password for authentication. If you have, then the message likely indicates that your password has expired and needs reset. If you continue to have issues, contact your system administrator.

Note: Passwords can be set to not expire for a user group via the Group tab for a specific user group. Refer to Working with User Groups documentation here for more information.

  • Prohibit Password Reuse – When box checked, the system prohibits a user from reusing old passwords. Old passwords are unavailable for reuse based on the set number of days.

  • Lock out User after 3 consecutive invalid login attempts – When checked, three (3) failed attempts to log in by entering a wrong or mistyped password will prohibit any new log in attempts for the set number of seconds.

Note: Administrators who reset passwords for users locked out of the system also reset the time-out period for those users.

  • Inactivity timeout period – When checked, the system can be configured to automatically sign out any logged in user from workbench and Web UI once the set number of inactive minutes is reached. This setting is most appropriate for STEP systems with a large number of active users.

Once the inactivity timeout period is reached, the following dialog is displayed for the logged out user, and the password must be entered to resume work in workbench.

Web UI users will get a popup dialog when there are two (2) minutes left before the inactivity timeout period is reached. You can choose to extend your session to avoid automatic logout.

As an additional, but unrelated security measure, workbench token renewal time is required every four hours by default. While increasing that time also increases token-related security risks proportionally, modifications can be made via the sharedconfig.properties file. Include the case-sensitive property text 'Step.Token.ExpiryTimeInHours=[hours]' to set a time between five and 72 hours. For example, Step.Token.ExpiryTimeInHours=5.

When the expiry time is reached for workbench users, the Terminate Workbench dialog shown below is displayed and the user is logged out.

When the expiry time is reached for Web UI users, they are logged out and returned to the Web UI login screen.