Chatta subito con l'assistenza
Chat con il supporto

Password Manager 5.12 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable S2FA for Administrators & Enable S2FA for HelpDesk Users Reporting Password Manager Integration Appendixes Glossary

Reset Password in Active Directory and Connected Systems

Reset Password in Active Directory and Connected Systems

Using this activity, you can configure Password Manager to use One Identity Quick Connect to reset passwords in connected systems. If used in conjunction with Quick Connect, Password Manager allows you to enable users and Helpdesk operators to manage passwords across a wide variety of connected systems. To be able to integrate Password Manager with Quick Connect, you must have a working knowledge of Quick Connect Sync Engine.

To enable Password Manager to set passwords in connected systems through a Quick Connect server, the account used to access Quick Connect must be a member of the local administrators group on the Quick Connect server.

Before you can configure Password Manager to use a Quick Connect server for cross-platform password synchronization, you must do the following in Quick Connect:

  • Create a connection to the Active Directory domains managed by Password Manager.
  • Create connections to the systems you want Password Manager to synchronize passwords with.
  • Map users from the managed domains to users in the connected systems.

For more information on how to configure Quick Connect to set passwords in connected systems, see One Identity Quick Connect documentation.

To enable Password Manager for cross-platform password synchronization

  1. Include the Reset password in Active Directory and connected systems activity in a workflow and click the activity to edit its settings.
  2. In the Quick Connect server name text box, specify the IP address or the fully qualified domain name of the Quick Connect server.
  3. Select the account to be used to access the Quick Connect server. You can use either Password Manager Service account or specify another account. You can use either pre-Windows 2000 login name (such as DomainName\UserName) or User Principal Name (such as UserName@DomainName.com) to specify the user name.
  4. Specify how you want Password Manager to act when the Quick Connect server is unavailable. To do it, select one of the following and click Next:
    • Act as if no Quick Connect server was specified: Users can manage their passwords only in the Active Directory domain. No warnings are displayed to users if Quick Connect server is not available.
    • Alert users and allow them to reset passwords only in Active Directory: Users are notified that other connected data sources are temporarily unavailable, and are allowed to continue managing their passwords only in the Active Directory domain.
    • Do not allow users to reset passwords: Users cannot perform any password management tasks in the Active Directory domain and in connected data sources, if the Quick Connect server is not available.
  5. From the list of connected systems, select the systems in which you want to manage user passwords. For each selected system, specify the following options and click Next:
    • System alias
    • Reset password in this system independently from Active Directory: Select this option to allow users to reset their passwords in a connected system independently from Active Directory.
    • Do not allow resetting password in this system independently from Active Directory: Select this option to prevent users from resetting their passwords in a connected system independently from Active Directory. Note that if you select this option, a user’s password will be reset in the connected system only after the password has been successfully reset in Active Directory. If the user's password is not reset in Active Directory, it will be not reset in the connected system. Users can specify a different password for the connected system, if you select the Allow users to specify different password for this systemoption.
  6. To enforce password history in the Active Directory domains managed by Password Manager, select the Enforce password history check box. Password history determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. Password history is defined for a domain through Group Policy settings.

IMPORTANT: Before selecting this option, you should consider the following by-design behavior of Password Manager when that the Enforce password history option is enabled:
  • Password Manager uses two slots from the password history every time a password is reset. For example, if the password history value defines that users cannot reuse any of the last 10 passwords, then Password Manager checks only the last five passwords. Therefore, it is advised that you double the password history value for all managed domains.
  • Having entered a new password that is not policy compliant, users may end up with a randomly generated password they don't know.
  1. Select the Enable QESSO integration to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
  2. Click OK to close the wizard.

Change Password in Active Directory and Connected Systems

Change Password in Active Directory and Connected Systems

Using this activity, you can configure Password Manager to use One Identity Quick Connect to reset passwords in connected systems. If used in conjunction with Quick Connect, Password Manager allows you to enable users and Helpdesk operators to manage passwords across a wide variety of connected systems. To be able to integrate Password Manager with Quick Connect, you must have a working knowledge of Quick Connect Sync Engine.

To enable Password Manager to set passwords in connected systems through a Quick Connect server, the account used to access Quick Connect must be a member of the local administrators group on the Quick Connect server.

Before you can configure Password Manager to use a Quick Connect server for cross-platform password synchronization, you must do the following in Quick Connect:

  • Create a connection to the Active Directory domains managed by Password Manager.
  • Create connections to the systems you want Password Manager to synchronize passwords with.
  • Map users from the managed domains to users in the connected systems.

For more information on how to configure Quick Connect to set passwords in connected systems, see One Identity Quick Connect documentation.

To enable Password Manager for cross-platform password synchronization:

  1. Include the Change password in connected systems and Active Directory activity in a workflow and click the activity to edit its settings.
  2. In the Quick Connect server name text box specify the IP address or the fully qualified domain name of the Quick Connect server.
  3. Select the account to be used to access the Quick Connect server. You can use either Password Manager Service account or specify another account.

    You can use either pre-Windows 2000 logon name (such as DomainName\UserName) or User Principal Name (such as UserName@DomainName.com) to specify the user name.

  4. Specify how you want Password Manager to act when the Quick Connect server is unavailable. To do it, select one of the following and click Next:
    1. Act as if no Quick Connect server were specified: Users can manage their passwords only in the Active Directory domain. No warnings are displayed to users if the Quick Connect server is not available.
    2. Alert users and allow them to change passwords only in Active Directory: Users are notified that other connected data sources are temporarily unavailable, and are allowed to continue managing their passwords only in the Active Directory domain.
    3. Do not allow users to change passwords: Users cannot perform any password management tasks in the Active Directory domain and in connected data sources, if the Quick Connect server is not available.
  1. From the list of connected systems, select the systems in which you want to manage user passwords. For each selected system, specify the following options and click Next:
    • System alias
    • Change password in this system independently from Active Directory. Select this option to allow users to change their passwords in a connected system independently from Active Directory.
    • Do not allow changing password in this system independently from Active Directory. Select this option to prevent users from changing their passwords in a connected system independently from Active Directory. Note that if you select this option, a user’s password will be changed in the connected system only after the password has been successfully changed in Active Directory. If the user’s password is not changed in Active Directory, it will be not changed in the connected system. Users can specify different password for the connected system, if you select the Allow users to specify different password for this system option.
  2. Select the Enable QESSO integration to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
  3. Click OK to close the wizard.

Reset password in connected systems through embedded connectors

You can use this activity to reset the password in connected systems through embedded connectors. This activity has to be added after the reset or change password in Active Directory activity in the workflow.

The default configuration of this workflow is the following:

  1. Reset password in Active Directory.

  2. Change password in Active Directory.

To configure settings to reset passwords on connected systems through embedded connectors

  1. On the home page of the Administration site, click Default Management Policy.
  2. Click Forgot My Password or Manage My Profile.
  3. In the workflows, click Change/Reset password in connected systems through embedded connectors (preview).
  4. Select the required platform from the Select platform drop-down menu.
  5. Provide configuration information for the selected platform.

    IMPORTANT:Configuration settings may vary depending on the platform you select.
    1. You also have the option to enter the AD attribute regular expression phrase to find in the Find text field.
    2. You also have the option to enter the AD attribute regular expression phrase to replace in the Replace text field.
  6. Click Test Connection to check the connectivity and click OK.

You can verify the regular expression results in target systems by entering the sample AD attribute find and replace fields views the results to understand how target user attributes are mapped. For example, from the email <user>@<website>.com in the AD and the email <user>@<website>.co.in in the target systems, you can find and replace the domain from .co.in to .com.

Unlock Account

Unlock account

This activity is a core activity of the Unlock My Account workflow. It allows users to unlock their accounts using the Self-Service site.

You do not need to configure any settings for this activity.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione