Restrict consecutive digits in passwords

This system value limits the use of numeric characters next to each other (adjacent) in a password.

This value provides additional security by preventing users from using birthdays, telephone numbers, or a sequence of numbers as passwords.

See the following table for an overview of the restrict consecutive digits in passwords system value.

Table 1. Possible values for the restrict consecutive digits in passwords system value
iSeries™ Navigator Character-based interface Description
Deselected 0 (Yes) Numeric characters are allowed next to each other in passwords.
Selected 1 (No) Numeric characters are not allowed next to each other in passwords.

Relationship to security policy

Within your security policy you should describe the password rules that are defined by the system values related passwords. For this system value, inform users on whether or not password can contain adjacent numeric characters. This value provides additional security by preventing users from specifying passwords that are easy to guess, such as the same character repeated several times. This system value works with other system values that specify the composition of individual passwords.

Table 2. Quick Reference. Provides details for the restrict consecutive digits in passwords in passwords system value.
iSeries Navigator name Restrict consecutive digits
Character-based interface name QPWDLMTAJC
Authority

All object access (*ALLOBJ)
Security administrator (*SECADM)

Note: The Security Officer (QSECOFR) user profile is shipped with these authorities.
How to access
iSeries Navigator
  1. Expand Security > Policies.
  2. Right click Password Policy and select Properties.
  3. On the Validation page, you will find the option to restrict consecutive digits.
Character-based interface
  1. In the character-based interface, type WRKSYSVAL QPWDLMTAJC.
Changes take effect Immediately
Default value Deselected
Recommended value Selected
Lockable Yes
Special considerations NA

For more in-depth information about this security value, see Chapter 3, "Security System Values" in Security Reference.