Chat now with support
Chat mit Support

Password Manager 5.13.3 - Release Notes

Resolved issues

The following is a list of issues addressed in this release.

Table 2: Resolved issues – General Password Manager issues

Resolved issue

Issue ID

The Required unique characters rule now evaluates the password correctly.

432728

Users can now register with the Personal Email method.

432389

Printing is now disabled in the Secure Password Extension browser window. The Self-Service Site help icon is now also empty if the help URL is set empty.

425262

Removed all obsolete Internet Explorer dependencies and restrictions from the product.

278249

Table 3: Resolved issues – Password Manager Administration Site

Resolved issue

Issue ID

The Administration Site now navigates to the correct Secure Token Server configuration page when stating that there are some configuration issues with a link pointing to the configuration page.

432924

On the Administration Site, the STS configuration page now sets the properties for External Federation providers correctly.

NOTE: This fix will work correctly only if you save all External Federation authentication providers that you previously configured but did not work correctly.

432659

The Administration Site now displays the Not configured state of the Authentication Methods activity based on its settings.

426384

Previously, in the Password Policies > Policy Rules > User Properties Rule > Password must not contain > x beginning characters of a user property value setting, the default value of 0 was saved regardless of the entered value.

This issue is now fixed so the entered value is now saved correctly.

421155

Previously, the Reset password in connected systems through embedded connectors activity could not load its settings.

This issue is now fixed so administrators can now edit the settings of this activity.

420963

The Administration Site now supports ECDSA certificates.

404015

The Allow user search from external network setting now stores its state correctly if the Do not allow users to search for their accounts setting is also selected.

NOTE: This fix will work correctly only if you first reconfigure the Allow user search from external network option in the Administration Site.

395034

Fixed certain vulnerabilities revealed by previous penetration tests.

308651

Table 4: Resolved issues – Password Manager Helpdesk Site

Resolved issue

Issue ID

Helpdesk Site operators can now search for accounts across multiple domains based on the settings of the Helpdesk Site, even if domain selection is not available.

433314

The Helpdesk Site now displays the User cannot change password information correctly.

426861

Error pages now reflect the previously configured site customization settings.

409587

Previously, the password change and reset password methods of the Self-Service Site did not support special characters.

This issue is now fixed, and special characters are allowed in password inputs.

407735

Table 5: Resolved issues – Password Manager Self-Service Site

Resolved issue

Issue ID

The Self-Service Site can now load activities of the same type consecutively correctly.

434544

The Self-Service Site now authenticates the user correctly in the Authentication with external provider activity if the Popup login style is in use.

432719

The Password Manager Self-Service Site now uses the word server in the routes instead of api.

427249

The Self-Service Site now presents HTML-coded UI text labels in custom activities. The HTML code is sanitized by default, but you can disable this behavior via the config.json file in the following location:

<password-manager-folder>/Password Manager/Web/SelfService/Scripts/libs/assets/config/config.json.

417153

If configured to use the pop-up login style, the Authenticate with external provider activity now correctly detects successful authentication and will forward the workflow to the next activity.

416350

Previously, the Password Manager for AD LDS Self-Service Site could not log actions and errors. This is now fixed so that it can log according to the configuration set on the Administration Site.

413037

Previously, users could not enter the Self-Service Site site if they had / (forward slash) character in the cn attribute.

This issue is now fixed, so having a forward slash in the cn attribute no longer blocks entry to the Self-Service Site.

412456

Previously, Self-Service Site did not provide troubleshooting information if Troubleshooting was enabled on the Administration Site.

This issue is now fixed, so troubleshooting information is present and analyzing custom activities is easier.

307341

Table 6: Resolved issues – Password Manager Secure Password Extension

Resolved issue

Issue ID

Fixed a potential security vulnerability in Secure Password Extension (SPE).

The Chromium component of SPE has been also updated to 126.2.7.

438569, 460592

Known issues

The following is a list of issues, including those attributed to third-party products, known to exist at the time of release.

Table 7: Known issues

Known issue

Issue ID

When User Principal Name (UPN) is used as service account, installing a Password Manager hotfix can lock the service account.

Workaround

To solve the problem:

  1. Change the service account to the domainname\username format.

  2. Provide a password for the same service account user.

  3. Install the Password Manager hotfix.

255614

Following a Password Manager upgrade, the General > Settings > Scheduled Tasks > Active Directory Sites task is disabled.

Workaround

After upgrading Password Manager to a newer version, enable the Active Directory Sites task manually.

246147

When scheduled from the secondary instance of the Password Manager server, the General Settings > Unregister Users task does not run.

Workaround

Schedule the Unregister Users task on the primary instance of Password Manager.

233679

If the application pool identity is a domain user with minimal permissions, then Web interface customization changes are not applied to the Self-Service and Helpdesk Sites.

233658

In the General Settings > Instance Reinitalization page, the Corporate phone attribute is not imported from the primary instance to the secondary instance.

Workaround

Update the Corporate phone attribute manually on the secondary instance to have the same value as on the primary Password Manager instance.

229200

If the Password Manager Self-Service Site contains an IPv6 address, the location-sensitive authentication (LSA) feature does not work.

Workaround

LSA currently supports IPv4 addresses only. Therefore, do not access the Password Manager Self-Service Site from an external network where the request contains an IPV6 address.

221571

When configuring a dictionary rule in the Password Manager Administration Site, the Policy Rules > Dictionary Rule > Enable dictionary lookup to reject passwords that contain > Beginning characters of a dictionary word setting does not work correctly if you specify only 2 beginning characters.

Workaround

One Identity recommends using the A complete word from the dictionary (QPMDictionary.txt) setting when configuring a dictionary rule.

221468

If no appropriate authentication methods are configured for it, the Forgot My Password screen may appear blank in the Password Manager Self-Service Site or Helpdesk Site.

Workaround

In the Password Manager Administration Site, One Identity recommends configuring the Register workflow with Security Questions as one of its registration modes.

221389

When a symmetry rule is configured with the Policy Rules > Symmetry Rule setting of the Password Manager Administration Site, it may fail to validate passwords containing non-consecutive characters.

Workaround

Do not use the Policy Rules > Symmetry Rule > Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word) setting.

220177

In a Password Manager for AD LDS environment, if the User Scope is configured with an AD LDS account, the Forgot My Password and Manage My Passwords workflows will fail.

Workaround

When configuring a User Scope, do not use The following AD LDS account setting of the Access account > Edit AD LDS Instance Connection dialog.

220171

When a Questions and Answers Policy is updated with any language other than English, users may receive both the default and the custom email notifications on the Password Manager Self-Service Site.

Workaround

For the Email user if workflow succeeds workflow, change the value of the Select email template to use setting to Customize.

219401

Upgrading Password Manager from version 5.6.3 to 5.9.x keeps the previous My Questions and Answers profile workflow.

Workaround

To solve the problem:

  1. In the Password Manager Administration Site, navigate to the My Questions and Answers profile workflow.

  2. Open Workflow Settings > Availability.

  3. Set Enable the workflow to Never.

  4. Select Show the workflow on the Self-Service Site.

  5. To apply your changes, click OK.

215892

The User Status Statistics scheduled task may fail intermittently.

171590

After upgrading to Password Manager 5.9.x, the My Notifications custom workflow cannot be edited in the Password Manager Self-Service Site.

Workaround

One Identity recommends to use the legacy Self-Service Site to edit the My Notifications workflow.

171589

When using Password Manager for AD LDS, the Password Policies page of the Administration Site is not updated when a password policy is created.

Workaround

After a new Password Policy is created, click Save, and immediately cancel the Add New Policy wizard. The page will refresh and list the new policy.

170587

After upgrading to Password Manager for AD LDS 5.9.x, the General Settings > Search and Logon Options menu may display an error when its settings are modified.

Workaround

To solve this problem:

  1. In the Password Manager for AD LDS Helpdesk Site, navigate to General Settings > Search and Logon Options.

  2. In the Users must enter the following user account attribute for identification setting, change the value from sAMAccountName to cn.

170560

In Password Manager for AD LDS, certain column data required for custom activities are not available in generated reports.

170355

After upgrading Password Manager from an earlier version to 5.9.x, the upgrade process may create duplicate URL references for the Password Manager User Site.

Workaround

Manually delete URL shortcuts that are not required.

169921

When a Password Manager for AD LDS instance and the Password Manager for AD LDS server instance are not configured on the same machine, Password Policy Rules are not displayed in the new and legacy Password Manager for AD LDS Self-Service Sites.

Workaround

Configure the Password Manager for AD LDS instance and the Password Manager for AD LDS server instance on the same machine.

169763

The user search settings of the Password Manager for AD LDS Helpdesk Site may work incorrectly.

Workaround

To solve the problem:

  1. In the Password Manager for AD LDS Helpdesk Site, navigate to General Settings > Search and Logon Options.

  2. Use the cn attribute instead of mail to search for users.

169384

The Password Manager Self-Service Site may not launch on Secure Password Extension (SPE) through a 32-bit operating system.

Workaround

If you have a 32-bit operating system, One Identity recommends to use the legacy Self-Service Site.

167871

When a password is changed from the target Active Directory (AD) system to that of the source AD, One Identity Quick Connect may be unable to synchronize passwords.

Workaround

Restart the Quick Connect Capture Agent Service on all the source and target systems.

167573

In Password Manager versions 5.8.2 and 5.9.x, you can only reconnect to a domain on the second attempt.

Workaround

To solve the problem:

  1. In the Password Manager Administration Site, select the User Scope, Helpdesk Scope or Password Policy you want to configure.

  2. Click Add domain connection twice to add a new domain connection.

166950

In email notifications, the #OPERATOR_ACCOUNT_NAME#, #OPERATOR_IP#, #WORKFLOW_RESULT#, and #WORKFLOW_SUMMARY# parameters are not populated.

141728

On Windows Server 2019, the Password Manager Service and One Identity rSMS Service may stop.

Workaround

To solve the problem, make sure that the domain controller machine and the clients are at two separate entities.

127587

When editing a dictionary file between the size of 10–20 MB from a Password Policy, the web browser session may crash, and an error may appear in the Windows Event Viewer.

Workaround

If you must modify a dictionary file larger than 10 MB, edit it from the domain machine where Password Policy Manager (PPM) is installed.

115957

When performing a password reset with the Password Manager Helpdesk Site, the site also accepts the previous/old password.

Workaround

Manually enter a different password during the short duration of the password reset.

114822

System requirements

Before installing Password Manager 5.13.3, ensure that your system meets the following minimum hardware and software requirements.

NOTE: When setting up a virtual environment, carefully consider the configuration aspects such as CPU, memory availability, I/O subsystem, and network infrastructure to ensure the virtual layer has the necessary resources available. For more information about environment virtualization, see One Identity's Product Support Policies.

Password Manager Service and Administration Site requirements

Password Manager Service and Administration Site requirements

Before installing Password Manager, ensure your system meets the following minimum hardware and software requirements. These requirements are applicable both to Full Installation and Distributed Installation (when the Self-Service Site and the Helpdesk Site are installed on separate systems).

Table 8: Password Manager Service and Administration Site requirements

Requirement

Details

Platform

1.6 GHz or higher.

Memory

At least 4 GB RAM.

Hard disk space

2.7 GB of free disk space.

NOTE: If .NET Framework is already installed, then installation may require less disk space.

Operating system

Password Manager can be run on any of the following operating systems:

  • Microsoft Windows Server 2016

  • Microsoft Windows Server 2019

  • Microsoft Windows Server 2022

NOTE: Consider the following operating system and machine restrictions:

  • Password Manager is not supported on Windows Server Core mode setup.

  • One Identity does not recommend installing Password Manager on the machine where the Domain Controller (DC) server is installed.

  • Password Manager supports Windows Server 2016 and later versions in domain and forest functional levels, including domains operating in a mixed mode.

  • Password Manager does not support Windows Server 2012 R2 and earlier versions.

Internet Information Services

Password Manager requires any of the following Microsoft Internet Information Services (IIS) versions on the web server of your environment:

  • IIS 8.0
  • IIS 10.0

NOTE: PMSelfService site requires IIS 10.

TIP: To ensure best practice security, configure Password Manager to use HTTPS. For more information, see Password Manager 5.13.3 Administrator Guide or Password Manager 5.13.3 Administrator Guide (AD LDS Edition).

Web browser

Password Manager supports the following web browsers:

  • Microsoft Edge

  • Mozilla Firefox 10 or later

  • Apple Safari 5 or later

  • Google Chrome 15 or later

Microsoft .NET Framework

Microsoft .NET Framework 4.7.2

NOTE: Install .NET Framework before you install Password Manager.

Visual C++ Runtime Libraries

Password Manager supports the following Visual C++ Runtime Libraries:

  • Visual C++ Runtime Libraries 2017

  • Visual C++ Runtime Libraries 2010

Visual C++ Runtime Libraries x86 and x64 are included in the Password Manager distribution package.

NOTE: Install Visual C++ Runtime Libraries 2010 and Visual C++ Runtime Libraries 2017 before you install Password Manager.

Minimum screen resolution

1280x1024 pixels

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen