As the rest have said, scheduling passwords serves no purpose and compromises your systems. I would however want to ensure that the business process that documents how often your systems require password changes & the user requirements (powerful passwords) are retained by your operations folks.
Rock on!Sharon
Sharon Burnett
[log in to unmask] Washington USA "If it ain't broke, take it apart and see why. If it is broke, take it apartand see why."
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]