Forum Discussion
Alex_1935
Nimbostratus
Dec 06, 2012Manipulating Kerberos failure codes during APM policy
Hi,
It is my first posting on devcentral. I would like to thank everyone for contributing to this wonderful knowledge database.
Currently I am working on a SSO project using APM BIG-IP modu...
Kevin_Stewart
Employee
Dec 06, 2012You could probably get away with just reading the session.ad.last.errmsg value.
Both expired and locked accounts send the message "User account is locked"
Bad password sends the message "Invalid user credentials"
Setting the "Max Logon Attempts Allowed" in the AD auth agent to something lower will let it escape the agent sooner so that you can follow branch rules. For example:
expr { [mcget {session.ad.last.errmsg}] contains "User account is locked" }
expr { [mcget {session.ad.last.errmsg}] contains "Invalid user credentials" }
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
