Chat now with support
Chat mit Support

Password Manager 5.13.2 - Administration Guide

About Password Manager Getting started Password Manager architecture
Password Manager components and third-party applications Typical deployment scenarios Password Manager in a perimeter network Management Policy overview Password policy overview Secure Password Extension overview reCAPTCHA overview User enrollment process overview Questions and Answers policy overview Password change and reset process overview Data replication Phone-based authentication service overview
Management policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring access to the Administration Site Configuring access to the Legacy Self-Service Site or Password Manager Self-Service Site Configuring access to the Helpdesk Site Configuring Questions and Answers policy Workflow overview Custom workflows Custom activities Legacy Self-Service or Password Manager Self-Service Site workflows Helpdesk workflows Notification activities User enforcement rules
General Settings
General Settings overview Search and logon options Importing and exporting configuration settings Outgoing mail servers Diagnostic logging Scheduled tasks Web Interface customization Instance reinitialization Realm Instances Domain Connections Extensibility features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable 2FA for administrators and helpdesk users Reporting Password Manager integration Accounts used in Password Manager Open communication ports for Password Manager Customization options overview Feature imparities between the legacy and the new Self-Service Sites Third-party contributions Glossary

Custom Rule

You can use this rule to create your own password policy message to be displayed on the Self-Service Site when users change or reset their passwords. For example, if you want to hide all other policy messages and display your custom message to users, enable this policy rule, enter the message text, and select the Hide messages from other policy rules and display only this message check box. If you do not select this check box, messages from all enabled policy rules will be displayed.

Note, that this rule does not check the password compliance with the configured password policy. Configure this rule to display your custom message instead of or together with other policy messages when users change or reset passwords on the Self-Service Site.

To configure the custom rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click Custom Rule to expand the rule settings.

  3. Under Custom Rule, select the Enable check box to enable this rule.

  4. Select the Hide messages from other policy rules and display only this message check box if you want users to see only the custom password rule message and hide all other password policy messages.

  5. In the text box, enter the rule message in the default language (English). To enter the message in other languages, click the Add new language link, select the language, specify the message and click OK.

    NOTE: Only languages of the user interface of the Self-Service Site are available in the list.

Managing Password Policy scope

This section provides information on how to apply a password policy to groups and Organizational Units in a managed domain.

Applying Password Policies

In Password Manager (Password Manager) application, scopes can be defined at multiple levels. Scopes act as a boundary in which you can define the groups and Organizational Unit (OU), and can also associate policies into it.

The Default Management Policy allows you to configure both the user scope and the helpdesk scope. In the Management Policy scope, administrators can also associate the workflows, activities, and Q&A policy to the configured user groups and OU.

While configuring the user scope/help desk scope, administrators must define either a Group or an OU to indicate which group or OU can access the Self-Service Site and/or Helpdesk Site. This means the users who are part of the configured group/OU comes under included group category. You could also define a different group/OU under an excluded group category. This means users who are part of this excluded group or OU cannot access the Self-Service Site andor Helpdesk Site.

In case of Password Policy scope, admin needs to ensure the following:

  • Password policies must be applied only to the user groups and/or OUs that are part of the user scope.

  • The group that will be associated with the password policy scope must be part of the OU as well. This means that users who are part of the group must also be the part of the OU, as those users will have the same set of activities available to perform in the Self-Service Site.

  • Administrators can create one or more password policies and can map each policy to either a single or multiple user groups or OUs.

  • By default, the newly created password policy is linked to the Domain name created in the management policy scope and is applied to the Authenticated users group. This means that all users who are part of the user groups and OUs configured in the user scope will be affected by the password policy.

IMPORTANT:

  • While configuring the Policy Scope in the Password Policy Properties window, you must add both the group and the Organizational Unit that the user is a member of. This ensures that the policy rules will be applied to the user when accessing the Self-Service Site.

  • It is not possible to configure the same domain multiple times in a user scope, whereas multiple domains can be configured to the user scope.

The table below provides more information on different scenarios.

Let us consider the following groups/OU.

S.No User scope

 

 

Password Policy Scope

 

Password Policy Logged in Self-Service Site

Is Password Policy applicable?

 

Included Group Included OU

Excluded Group

Excluded OU

OU Group
1. Group1 OU1

 

 

OU1 Group1 Password Policy1 User1

Yes

2. Group1 OU2

Group2

 

OU1 Group2

 

Password Policy2

 

User2

No

3.

Group3

OU1

Group1

 

OU2

Group3

User2

No

4.

Group3

OU3

 

OU1

OU3

Group3

 

Password Policy3

 

User3

Yes

5.

Group2

OU2

 

 

OU1

Group2

User2

No

6.

Group1

OU1

 

OU4

OU4

Group1

 

Password Policy4

 

User1

No

7.

Group2

OU2

 

OU5

OU5

Group2

User2

No

8.

Group3

OU3

Group1

 

 

Group3

 

Password Policy 5

 

User3

No

9.

Group3

OU3

Group2

 

OU3

 

User3

No

To link a password policy to Organizational Units and groups

  1. Display properties of a password policy by using the procedure outlined in About Password Policies.

  2. Click the Policy Scope tab.

  3. Click the Add button under This policy is applied to the following Organizational Units, then browse for an Organizational Unit.

  4. Click the Add button under This policy is applied to the following groups, then browse for a group.

  5. Click Save.

Changing policy priority

When multiple password policies affect an Organizational Unit or a group, only the policy with the highest priority is applied to such group or Organizational Unit. A newly created password policy is disabled by default.

NOTE: Only priority of policies with the same scope can be changed.

To change policy priority

  1. On the home page of the Administration Site, click the Password Policies tab.

  2. Click the One Identity Password Policies link under the domain for which you want to change the policy link order and click Policy priority.

  3. In the Change Policy Priority dialog, move policies up or down in the list by selecting them and clicking the Move Up or Move Down buttons.

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen