Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

How the BadPwdCount attribute works in Windows 2000 and in Windows Server 2003


View products that this article applies to.

Introduction

This articles discusses how the bad password count attribute (BadPwdCount) works in Microsoft Windows 2000 and in Microsoft Windows Server 2003. When you submit incorrect credentials to the Active Directory directory service, the value of the BadPwdCount attribute of that user object increases. This attribute is used to determine whether a user account will be locked out based on the password lockout policy.

In Windows 2000 and in Windows Server 2003, the value of the BadPwdCount attribute should increase one time when the following conditions are true:
  • You use either the user principal name (UPN) or the Security Accounts Manager (SAM) account name (sAMAccountName) to log on to a computer.
  • You use the "Domain\UserId" format and Active Directory Service Interfaces (ADSI) functions to bind your incorrect credentials to Active Directory. For example, you use the IADsOpenDsObject::OpenDsObject method or the ADsOpenObject function.
In Windows 2000, the BadPwdCount attribute increases two times when the following conditions are true:
  • You use either the UPN or the sAMAccountName to log on to a computer.
  • You use the UPN and ADSI functions to bind your incorrect credentials to Active Directory. For example, you use the IADsOpenDsObject::OpenDsObject method or the ADsOpenObject function.


However, in Windows Server 2003, the BadPwdCount attribute increases only one time when you use the UPN to bind your incorrect credentials to Active Directory.

↑ Back to the top


More information

The BadPwdCount attribute should increase one time when you submit incorrect credentials to Active Directory.

However, in Windows 2000, when you use the IADsOpenDsObject::OpenDsObject method and the UPN to submit credentials, the credentials are submitted one time by NTLM authentication and one time by Kerberos authentication. Therefore, the BadPwdCount attribute increases two times.

In Windows Server 2003, the double increment does not occur.

For more information about the BadPwdCount attribute, visit the following Microsoft Web site: For more information, click the following article number to view the article in the Microsoft Knowledge Base:
817701� Service packs and hotfixes that are available to resolve account lockout issues

↑ Back to the top


Keywords: KB900215, kbinfo, kbhowto

↑ Back to the top

Article Info
Article ID : 900215
Revision : 4
Created on : 1/30/2007
Published on : 1/30/2007
Exists online : False
Views : 335