Account unlocking using CURL
- Install CURL on your local computer using this link (https://curl.haxx.se/)
- This step is applicable when operating in a clustered environment; otherwise,
skip this step.
You must ascertain which node the user is blocked; follow the steps listed below:
- Obtain
amlbcookie
from blocked-user (amlbcookie
determines which AM node is being used by the user), to do this, inspect the Request headers send by the client browser. Note thatamlbcookie
is sent in the cookie header. - As an AM administrator, follow the instructions in the list below to
determine which node is using
amlbcookie
:- Login to AM as an AM administrator (username: amadmin and
password entered in
deploy.properties/security.admin.password
during installation of security bundle). From the menu bar select deployment/servers, here you will find a server listing. - You now need to establish which server the user has been
locked-out. To do this, on each server, check its
amlbcookie
(after clicking on the server choose Advanced and check value of the propertycom.iplanet.am.lbcookie.value
). The propertycom.iplanet.am.lbcookie.value
should be the same asamlbcookie
. - By following the instructions in the points above, you can determine which AM server address and port to be used in step 4 below.
NOTE: The process listed in this step may be time-consuming, and in certain scenarios, it may be advisable to wait for the lockout time period determined in the
deploy.properties
file instead of carrying out this step. - Login to AM as an AM administrator (username: amadmin and
password entered in
- Obtain
- Obtain session token for AM administrator, as follows:
curl -X POST -H "X-OpenAM-Username: amadmin" -H "X-OpenAM-Password: <AM ADMIN PASSWORD>" -H "Content-Type: application/json" -H "Accept-API-Version: resource=2.1" <ADDRESS>:<AM PORT>/OpenAM/json/authenticate
- Use the session token obtained from the previous step to clear login attempts
data, as
follows:
curl -X PUT -H "iPlanetDirectoryPro: <SESSION TOKEN>" -H "Content-type: application/json" -H "Accept-API-Version: resource=3.0,protocol=1.0" -d "{ \"sunAMAuthInvalidAttemptsData\":[] }" <ADDRESS>:<AM PORT>/OpenAM/json/EngageOne/users/<LOCKED ACCOUNT NAME>
Important:
<AM ADMIN PASSWORD>
is the password specified in
deploy.properties
/ security.admin.password