Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Password Manager 5.13.2 - Administration Guide

About Password Manager Getting started Password Manager architecture
Password Manager components and third-party applications Typical deployment scenarios Password Manager in a perimeter network Management Policy overview Password policy overview Secure Password Extension overview reCAPTCHA overview User enrollment process overview Questions and Answers policy overview Password change and reset process overview Data replication Phone-based authentication service overview
Management policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring access to the Administration Site Configuring access to the Legacy Self-Service Site or Password Manager Self-Service Site Configuring access to the Helpdesk Site Configuring Questions and Answers policy Workflow overview Custom workflows Custom activities Legacy Self-Service or Password Manager Self-Service Site workflows Helpdesk workflows Notification activities User enforcement rules
General Settings
General Settings overview Search and logon options Importing and exporting configuration settings Outgoing mail servers Diagnostic logging Scheduled tasks Web Interface customization Instance reinitialization Realm Instances Domain Connections Extensibility features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable 2FA for administrators and helpdesk users Reporting Password Manager integration Accounts used in Password Manager Open communication ports for Password Manager Customization options overview Feature imparities between the legacy and the new Self-Service Sites Third-party contributions Glossary

Sequence Rule

The sequence rule rejects passwords that contain more repeated characters than it is allowed.

Repeated characters can appear in succession or in different positions in a password. This policy also includes characters typed in direct or inverse numerical or alphabetical order. For example, if you set the maximum number of same characters that appear in succession to three, then the password “eagle” will be rejected.

To configure the sequence rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click Sequence Rule to expand the rule settings.

  3. Under Sequence Rule, select the Password must not contain more than check box, and then specify the following options:

Table 20:  Password sequence rule

Option

Description

Number of characters repeated in succession (AAAB)

Set the maximum number of same characters in a row that the policy will tolerate before rejecting a password.

Number of identical characters (ABCA)

Set the maximum number of same characters typed in different positions of password that the policy will tolerate before rejecting a password.

Number of characters in direct or inverse numerical or alphabetical order (ABC_321)

Set the maximum number of characters typed in direct or inverse numerical or alphabetical order that the policy will tolerate before rejecting a password.

Case sensitive

Select this check box to require case sensitivity for this rule.

User Properties Rule

The user properties rule rejects passwords that contain part of a user account property value.

This rule splits the user account property value by non-alphanumeric characters (for example, “_”), and then checks if any part of the value is available in the password. For example, if user’s name is “Peter_US”, Password Manager splits the property into: “Peter” and “US”, and checks if any part can be found in the password. For example, the password “US_US” will be rejected.

To configure the user properties rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click User Properties Rule to expand the rule settings.

  3. Under User Properties Rule, select the Prevent users from using account properties as part of passwords check box, and then specify the following options:

Table 21:  User properties rule

Rule

Description

Beginning characters of a user property value

Set the maximum number of beginning characters from a user property value that users are allowed to use as part of their passwords.

For example, if a user's full name is “Anna Fairweather”, and the option value is set to 3, then the user is allowed to type the strings “Ann” and “Fai” as part of her password. The password will be rejected if it contains “Anna” or “Fair”.

You can select from the following user account properties:

  • displayNamePrintable

  • mailNickname

  • userPrincipalName

  • displayName

  • title

  • sn

  • samAccountName

  • personalTitle

  • middleName

  • mail

  • givenName

  • employeeID

  • cn

NOTE: The administrator can add other user attributes to the existing list of attributes and select to use. Click Add other attribute to the list to add other user attributes.

The entire value of a user property

Select to reject passwords containing the entire value of a user property.

You can select any of the user account properties listed in the description of the Beginning characters of a user property value option above.

Case sensitive

Select this check box to require case sensitivity for this rule.

Enable bi-directional analysis

Select to reject passwords containing the entire value of a user property or its part (depending on which of the two previous options you have selected), if read backwards.

Dictionary Rule

The dictionary rule rejects passwords that match dictionary words or their parts.

The dictionary rule compares user passwords against a list of words stored in the QPMDictionary.txt text file (this file must use UTF-8 encoding). Depending on how you configure the rule settings, user passwords that partially or fully match dictionary words are rejected by Password Manager.

The QPMDictionary.txt (dictionary file) is located in the following folder: '\\<Domain Controller>\SYSVOL\<Domain>\31EB75A4-CD1A-4F67-94DA-9F8F5DF1F5C1', is deployed when user installs Password Policy Manager (PPM).

The dictionary file is never cached. During each password validity check, the dictionary file is read from the Password Manager server, or from the user's domain controller.

On the Policy Rules tab, click Dictionary Rule to expand the rule settings. Click Edit Dictionary File to edit or add new words to dictionary. After editing the file, click Save to save the changes. When user edits the dictionary file, the changes are saved in QPMDictionary.txt file, which is in SYSVOL folder in Domain Controller. Service accounts must have access to this file from machines, where Password Manager is installed.

When modifying the dictionary file, ensure that you begin every new word on a new line. It is recommended to maintain alphabetical order.

The dictionary rule is not case-sensitive which means that, on the one side, you can use either uppercase or lowercase when adding or modifying dictionary entries; and, on the other side, user input will undergo validity check irrespective of whether users use capitals or small letters in their passwords.

To configure the dictionary rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click Dictionary Rule to expand the rule settings.

  3. Under Dictionary Rule, select the Enable dictionary lookup to reject passwords that contain check box. This enables administrators to control a set of rules using the Dictionary Rule feature. These rules can be modified as follows:

Table 22: Dictionary rule

Option

Description

Beginning characters of a dictionary word

Specify number of characters in the password to match with the beginning of a word in dictionary before rejecting it. The characters in the password must be more than the specified number, for this option to work efficiently.

A complete word from the dictionary (QPMDictionary.txt)

Select this check box to reject passwords that represent an entire word stored in the dictionary.

Detect inclusion of non-alpha characters (pas7swo%rd)

Select this check box to remove non-alphabetic characters during analysis.

Enable bi-directional analysis

Select to reject passwords containing an entire dictionary word or its part (depending on which of the other three options you have selected), if read backwards.

NOTE: Password Policy Manager installation is not necessary, if Password Manager is installed on Domain Controller, and user wants to enable only dictionary rule.

Symmetry Rule

The symmetry rule ensures that password or its part does not read the same in both directions.

For example, if you enable the Reject passwords that read the same in both directions option, then the password “redivider” will be rejected.

To configure the symmetry rule

  1. Follow the steps outlined in Configuring Password Policy Rules.
  2. On the Policy Rules tab, click Symmetry Rule to expand the rule settings.

  3. Under Symmetry Rule, select the Password must comply with symmetry criteria check box, and then specify the following options:

Table 23: Symmetry criteria

Option

Description

Reject passwords that read the same in both directions (pass8ssap)

Select to reject passwords that are palindromes.

Maximum number of beginning characters that match ending characters of password if read backwards (pas47sap)

Specify the number of beginning characters matching the ending characters of password, if read backwards, which the policy will tolerate before rejecting a password.

Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word)

Specify the number of password characters in a row that read the same in both directions, which the policy will tolerate before rejecting a password.

Case sensitive

Select to define this rule as case sensitive.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation