Chatee ahora con Soporte
Chat con el soporte

Password Manager 5.11.1 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Password Policies Enable S2FA for Administrators and Enable S2FA for HelpDesk Users Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Appendix D: Feature imparities between the legacy and the new Self-Service Sites Glossary

Configuring CAPTCHA security images

You can configure the Password Manager for AD LDS Self-Service Site to display CAPTCHA images on the Find User page as an anti-bot security measure.

To configure CAPTCHA images for the Self-Service Site

  1. In the Password Manager Administration Site, navigate to General Settings > Search and Logon Options.

  2. Scroll down to Security Settings.

  3. To enable the CAPTCHA or reCAPTCHA settings, enable Show a security image to prevent bot attacks.

  4. To configure the CAPTCHA settings, select Display CAPTCHA and click Settings.

  5. In the CAPTCHA Settings dialog, configure the following options:
    • Number of characters: Specify the number of characters (1–15) to display on the generated CAPTCHA image. The default value is 5.
    • Noise level: Specify the number and size of noise artifacts on the generated CAPTCHA image. Higher levels mean more difficult readability.

    When ready, click OK.

  6. Under Security Settings, select Show a security image every time the search is performed to perform the configured anti-bot protection check each time a search is performed on the Find User page of the Self-Service Site.

    TIP: Enable this setting for an increased protection against bot attacks.

  7. To apply your settings, click Save.

Configuring reCAPTCHA security settings

You can configure the Find User page of the Password Manager for AD LDS Self-Service Site to include reCAPTCHA anti-bot protection. Password Manager supports the reCAPTCHA v2 and v3 engines.

NOTE: Password Manager for AD LDS supports only the "I'm not a robot" Checkbox challenge of reCAPTCHA v2. It does not support the Invisible reCAPTCHA badge and reCAPTCHA Android app validations.

Prerequisites

Before you configure reCAPTCHA v2 or v3 protection for the Password Manager for AD LDS Self-Service Site, make sure that the following conditions are met:

  • The server running Password Manager for AD LDS has an active Internet connection and can communicate with the Google reCAPTCHA endpoint.

  • You must sign up and generate a reCAPTCHA site key and secret key from Google. For more information, see the Google reCAPTCHA portal.

    NOTE: When generating the keys on the Google reCAPTCHA Admin site, provide the domain name(s) where the Password Manager for AD LDS Self-Service Site(s) are deployed. If multiple Self-Service Sites are deployed in several different domains, provide all the domains to generate the required number of site keys and secret keys.

To configure reCAPTCHA protection for the Self-Service Site

  1. In the Password Manager Administration Site, navigate to General Settings > Search and Logon Options.

  2. Scroll down to Security Settings.

  3. To enable the CAPTCHA or reCAPTCHA settings, enable Show a security image to prevent bot attacks.

  4. To configure the reCAPTCHA settings, select Display reCAPTCHA and click Settings.

  5. In the reCAPTCHA Settings dialog, configure the following options:
    • Version: Select the reCAPTCHA version to use (v2 or v3).

    • Site key: Enter the site key generated on the Google reCAPTCHA Admin site.

    • Secret key: Enter the secret key generated on the Google reCAPTCHA Admin site.

    • Theme: Select the visual theme (Light or Dark) to use with the reCAPTCHA widget.

      NOTE: This setting is available only for reCAPTCHA v2.

    • Enter reCAPTCHA v3 Score: Specify the reCAPTCHA v3 score threshold (0.0–1.0) under which the interaction is considered to be a bot attempt. The default value is 0.5, and One Identity recommends using it until further adjustments are made based on actual site traffic.

      NOTE: This setting is available only for reCAPTCHA v3.

    When ready, click OK.

  6. Under Security Settings, select Show a security image every time the search is performed to perform the configured anti-bot protection check each time a search is performed on the Find User page of the Self-Service Site.

    TIP: Enable this setting for an increased protection against bot attacks.

  7. To apply your settings, click Save.

Once you configured reCAPTCHA, the Find User page of the Self-Service Site will be updated to include the configured anti-bot protection method:

  • If reCAPTCHA v2 is configured, the I'm not a robot check box widget appears.

  • If reCAPTCHA v3 is configured, the reCAPTCHA widget appears at the bottom right corner of the screen.

Import/Export Configuration Settings

You can export configuration settings from the current Password Manager instance to a configuration file to back up the instance or create replicas of the existing instance.

Exporting Configuration Settings

By exporting configuration settings to a configuration file, you can back up the current instance or use the configuration file to create a Password Manager realm.

A realm is a group of Password Manager instances using common realm settings (encryption and hashing algorithms, realm affinity ID, etc.) and configuration settings, including but not limited to Management Policies, general settings, password policies, etc.

If you want to create a realm, you need to export the configuration settings from a Password Manager instance and create a replica of this instance by importing the configuration settings. To learn more about creating Password Manager realms, see Installing Multiple Instances of Password Manager.

To export configuration settings

  1. Connect to the Administration site by typing the Administration site URL in the address bar of your Web browser. By default, the URL is http://<ComputerName>/PMAdminADLDS/.

    NOTE: When prompted to log in, provide your domain user name in a domainname\username format.

  2. On the menu bar, click General > Settings, then click the Import/Export tab and select the Export configuration settings option.
  3. Enter the password to protect the configuration file and click Export.

IMPORTANT: Remember and store the password that is generated while exporting the configuration file. You must enter this password when importing the configuration file for a new instance when, you want to join to a realm or restoring the configuration. Losing this password requires re-installation of the application.

Export the configuration settings and save in a secure location. Use these settings to create secondary instances of Password Manager, and to recover data in the event of server disaster, or serious data loss.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación