Chat now with support
Chat mit Support

Password Manager 5.12 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Password Policies Enable S2FA for Administrators and Enable S2FA for HelpDesk Users Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Appendix D: Feature imparities between the legacy and the new Self-Service Sites Glossary

Password Compliance

Password Compliance

When you use Forgot My Password or Manage My Passwords workflow to set or reset the password, you can view the compliance of the password with the configured password policy. You can expand a policy and view the rules set for the policy. When you enter a new password, you can instantly get the feedback about the compliance of the password with the defined rules. A green tick mark against the rules in a policy indicates that the password is in compliance with the rule, and help you to set a compliant password.

You can also view the strength of the password using the Password strength meter, which get displayed as a progress bar when you enter a new password in the New password text box. The Password strength meter assess the strength of the password by verifying the password with the configured password policy rules and the basic requirements (one upper case letter, one lower case letter, one numeric value, one special character and minimum of seven characters) for a password. This will help to improve the security of the password. You can enable or disable this feature and configure the Password strength status. For more details see Customization of Password Strength Meter.

The following is a general procedure for configuring the password policy rules.

To configure rules for a password policy

  1. On the home page of the Administration site, click the Password Policies tab.
  2. Click the <N> One Identity Password Policies link under the AD LDS instance that you want to manage.
  3. On the One Identity Password Policies for <application directory partition> page, click the policy whose properties you want to modify, and then click the Policy Rules tab.
  4. On the Policy Rules tab, click the rule that you want to configure, and, under the rule's name, modify the appropriate rule settings.
  5. Repeat step 4 for each of the rules that you want to configure for this password policy, and then click Save.

NOTE: Starting from version 5.9.5, if a Password Manager policy is applied, then the Next button remains disabled in the Forgot my password/ Manage My Passwords screen and gets enabled only when all the password manager's policies are met and shows GREEN.

For information about how to configure each of the policy rules, see the sections below.

Password Age Rule

The password age rule ensures that users cannot use expired passwords or change their passwords too frequently.

Specify Minimum password age so that passwords cannot be changed until they are more than a certain number of days old. If a minimum password age is defined, users must wait the specified number of days to change their passwords.

Specify Maximum password age so that passwords expire as often as necessary for your environment.

To configure the password age rule

  1. Follow the steps outlined in Configuring Password Policy Rules.
  2. On the Policy Rules tab, click Password Age Rule to expand the rule settings.
  3. Under Password Age Rule, select the Specify password age check box, and then specify the following options as required:
Table 18: Password age limit

Option

Description

Minimum password age

Specifies for how many days users must keep new passwords before they can change them.

Maximum password age

Specifies how many days a password can be used before the user is required to change it.

Length Rule

The length rule ensures that passwords contain the required number of characters.

Define a minimum length so that passwords must consist of at least a specified number of characters. Long passwords - seven or more characters - are usually stronger than short ones. With this setting, users cannot use blank passwords, and they have to create passwords that are a certain number of characters long.

To configure the length rule

  1. Follow the steps outlined in Configuring Password Policy Rules.
  2. On the Policy Rules tab, click Length Rule to expand the rule settings.
  3. Under Length Rule, select the Password must contain check box, and then specify the following options as required:
Table 19: Password length limit

Option

Description

Minimum characters

Set the minimum number of characters that a password must contain.

Maximum characters

Set the maximum number of characters allowed in a password.

Complexity Rule

The complexity rule ensures that passwords meet the following minimum complexity requirements:

  • Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
  • Be at least six characters in length
  • Contain characters from three of the following four categories:
    • English uppercase characters (A through Z)
    • English lowercase characters (a through z)
    • Base 10 digits (0 through 9)
    • Non-alphabetic characters (Supported characters are ~`!#$%\^&*+=-[];,/{}._|":<>?()@

The complexity rule imposes the same requirements as the standard Windows policy “Password must meet complexity requirements.”

To configure the complexity rule

  1. Follow the steps outlined in Configuring Password Policy Rules.
  2. On the Policy Rules tab, click Complexity Rule to expand the rule settings.
  3. Under Complexity Rule, select the Password must meet complexity requirements check box.
Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen