Overview#The account is disabled typically by setting a value on the entry.
When we refer to Administratively Disabled, this typically implies explicit permanently disabled entries. An Administratively Disabled entry can typically only be enabled by changing the Administratively Disabled attribute value.
This is NOT Locked By Intruder or any other form of lock out that might be activated by activities performed by the entry.EDirectory uses loginDisabled to indicate Administratively Disabled
Oracle orclisenabled#How Oracle's OID uses orclisenabled to indicate Administratively Disabled ACCOUNTDISABLE bit of the User-Account-Control Attribute to indicate Administratively Disabled LDAP Server Implementations that use draft-behera-ldap-password-policy use the pwdAccountLockedTime to indicate Administratively Disabled
More Information#There might be more information for this subject on one of the following:
- Active Directory Account Lockout
- Active Directory Computer Related LDAP Query
- Active Directory User Related Searches
- Authentication Failures
- Common Active Directory Bind Errors
- Common Edirectory Bind Errors
- Description of Attribute Usage For 2.16.840.1.1137220.127.116.11.1.40
- Remote Authentication Dial-In User Service
- SCIM Password Management Extension