One Identity Manager allows the use of the global.cfg file to simplify distribution of configuration settings to endpoints such as fat clients, Job servers, and so on.
The global.cfg file only provides weak encryption of configuration settings such as connection strings.
In production environments, it is strongly recommended not to use the global.cfg file.
In production environments the global.cfg file should be removed from all endpoints. When configuring the Job server, provide the Jobservice.cfg file directly. The first time the service is started, the weakly encrypted connection information will be converted to a higher encryption level using the Data Protection API.
How to remove the global.cfg file:
For all One Identity Manager client tools that do not require a direct database connection, switch to using the One Identity Manager Application Server by specifying the URL only. This is the most secure option.
It is also recommended to integrate clients using a Privileged Management Solution such as One Identity Safeguard.
See our Tech Brief at https://www.oneidentity.com/techbrief/running-one-identity-manager-administration-tools-via-safeguard/
For all other tools that require a direct database connection (for example the Database Compiler), it is recommended not to provide the connection string in the global.cfg file. Instead, enter the database connection string directly in the tools at log in. This does not reduce security levels as the tool used will decrypt this data anyway and open a database connection for that user.
Make sure you do not use the built-in auto-update feature to distribute the global.cfg file to all clients and users.
To remove the global.cfg file from One Identity Manager software list
The next time the automatic update runs, the global.cfg file will be removed from all clients and servers.
© 2025 One Identity LLC. ALL RIGHTS RESERVED. Nutzungsbedingungen Datenschutz Cookie Preference Center