Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Password Manager 5.14.2 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Adding or cloning a new Management Policy Configuring Access to the Administration Site Configuring Access to the Password Manager Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Password Manager Self-Service Site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Customizing help link URL Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Third-party contributions Glossary

Application Pool Identity

Application pool identity is an account under which the application pool's worker process runs. The account you specify as the application pool identity during Password Manager setup will be used to run Password Manager websites.

Application pool identity account must meet the following requirements:

  • This account must be a member of the IIS_IUSRS local group on the Web server in IIS 7.0.

  • This account must have permissions to create files in the <Password Manager installation folder>\App_Data folder.

  • Application pool identity account must the full control permission set for the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\One Identity\Password Manager for AD LDS.

Access Account for Application Directory Partition Connection

When you connect to an AD LDS instance, you can create a new connection or use existing connections, if any. When creating the connection, you must specify an access account - an account under which Password Manager will access the AD LDS instance and a specified application directory partition. You can use the Password Manager Service account, an Active Directory account or an AD LDS account. These accounts must have the following minimum set of permissions:

  • Membership in the Domain Users group (for the Password Manager Service account and the Active Directory account)

  • Membership in the Readers group in the application directory partition (for the AD LDS account)

  • Membership in the Administrators group in the configuration directory partition

  • The Read permission for all attributes of user objects

  • The Write permission for the following attributes of user objects: pwdLastSet, comment, unicodePwd, lockoutTime, msDS-UserAccountDisabled

  • The right to reset user passwords

  • The permission to create user accounts and containers in the Users container

  • The Read permission for attributes of the organizationalUnit object and container objects

  • The Write permission for the gpLink attribute of the organizationalUnit objects and container objects

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers

  • The permission to create container objects in the System container

  • The permission to create the serviceConnectionPoint objects in the System container

  • The permission to delete the serviceConnectionPoint objects in the System container

  • The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container

If you want to use the same connection in password policies as well, make sure the account has the following permissions:

  • The Read permission for attributes of the groupPolicyContainer objects.

  • The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.

  • The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.

  • The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.

Corporate Authentication

In the Register workflow, if the Admin selects Corporate authentication, the user can only review the corporate account details during the registration process. If the Admin selects Allow user to edit corporate details, the user can update the respective corporate details, for example, Corporate email and Corporate phone number, if the details are not previously populated by the administrator in the AD.

If Corporate authentication registration mode is selected in the Register activity, make sure that Domain management account has the following set of permissions.

  1. The read permission for Corporate email attribute and Corporate phone attribute where, Mobile is the default attribute for the Corporate phone.

  2. If Allow user to edit corporate details checkbox is selected under Corporate authentication check box, both Read and Write permission must be available for Corporate email attribute and Corporate phone attribute, where Mobile is the default attribute for the Corporate phone.

NOTE: If the Corporate phone attribute under Reinitialization page is a custom value (for example, pager) then the Read/Write Permissions need to be provided for that attribute instead of the mobile attribute.

Account for Using One Identity Quick Connect

You can configure cross-platform password synchronization using One Identity Quick Connect. If used in conjunction with Quick Connect Sync Engine, Password Manager allows you to enable users and helpdesk operators to manage their passwords across a wide variety of connected systems.

To enable Password Manager to set passwords in connected systems, the account used to access Quick Connect must be a member of the local administrators group on the Quick Connect server.

For more information on using Quick Connect with Password Manager, see Reset Password in AD LDS and Connected Systems.

Appendix B: Open Communication Ports for Password Manager for AD LDS

This section provides a list of communication ports that need to be open in the firewall for Password Manager to function properly.

Administration Site

Port 80 (Default HTTP) TCP Inbound

Port 443 (Default HTTPS) TCP Inbound/Outbound

Port 8081 TCP Inbound/Outbound

Port 25 (Default SMTP port) TCP Outbound

Port 135 TCP Inbound/Outbound

Helpdesk Site

Port 80 (Default HTTP) TCP Inbound

Port 443 (Default HTTPS) TCP Inbound/Outbound

Port 8081 TCP Inbound/Outbound

Password Manager Service

Port 53 (Outgoing DNS lookups) UDP Outbound

Port 88 (Kerberos Authentication) TCP/UDP Outbound

Port 389 (LDAP Access) TCP/UDP Outbound

Port 636 (LDAP Access) TCP Outbound

Port 137 (NetBIOS Name Service) TCP Outbound

Port 139 (NetBIOS Session Service) TCP Outbound

SQL Server

Port 1433 (SQL Server) TCP/UDP Outbound

Port 1434 (SQL Server Browser Service) TCP/UDP Outbound

Report Server

Port 80 (SQL Server Report Services) TCP Outbound

Email Notification

Port 25 (Default SMTP port) TCP Outbound

One Identity Quick Connect Sync Engine

Port 808 TCP Outbound

Telesign

Port 443 TCP Outbound

Defender

Port specified in the activity settings (Authenticate with Defender) is used.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation