Chatta subito con l'assistenza
Chat con il supporto

Password Manager 5.13.2 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Legacy Self-Service Site and Password Manager Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Legacy Self-Service or Password Manager Self-Service Site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Third-party contributions Glossary

Applying Password Policies

In Password Manager (Password Manager) application, scopes can be defined at multiple levels. Scopes act as a boundary in which you can define the groups and Organizational Unit (OU), and can also associate policies into it.

The Default Management Policy allows you to configure both the user scope and the help desk scope. In the Management Policy scope, an admin can also associate the workflows, activities, and Q&A policy to the configured user groups and OU.

While configuring the user scope/help desk scope, an admin must define either a Group or an OU to indicate which group or OU can access the Self-Service Site/Helpdesk Site. This means the users who are part of the configured group/OU comes under included group category. You could also define a different group/OU under an excluded group category. This means users who are part of these excluded group or OU cannot access Self-Service Site/Helpdesk Site.

In case of Password Policy scope, admin needs to ensure the following

  • Password policies should only be applied to the user groups/ OUs that are part of the user scope.

  • Group that will be associated into the password policy scope must be part of the OU as well. This means users who are part of the group must also be the part of the OU as those users will have the same set of activities to be performed in the Self-Service Site.

  • An Administrator can create one or more password policies and can map each policy to single/ multiple user groups or OUs.

  • By default, the newly created password policy is linked to the Domain name created in the management policy scope and gets applied to the “Authenticated users group. It means that all the users that are part of the usergroups and OUs configured in the user scope, will have the password policy applied.

  • Group that will be associated into the password policy scope must be part of the OU as well. This means users who are part of the group must also be the part of the OU as those users will have the same set of activities to be performed in the Self-Service Site.

NOTE:

  • While configuring the Policy Scope in Password Policy Properties window, it is mandatory to add both the group and the Organizational Unit that the user is part of, for the policy rules to get applied for the users accessed in the Self-Service Site.

  • It is not possible to configure the same domain multiple times in a user scope, whereas multiple domains can be configured to the user scope.

The table below provides more information on different scenarios.

Let us consider the following groups/OU

NOTE: Do not define both OU and the group in the Management policy scope for the set password policy rule to get applied in the Self-Service Site.

S.No User scope

 

 

Password Policy Scope

 

Password Policy Logged in Self-Service Site

Is Password Policy applicable?

 

Included Group Included OU

Excluded Group

Excluded OU

OU Group
1. Group1 OU1

 

 

OU1 Group1 Password Policy1 User1

Yes

2. Group1 OU2

Group2

 

OU1 Group2

 

Password Policy2

 

User2

No

3.

Group3

OU1

Group1

 

OU2

Group3

User2

No

4.

Group3

OU3

 

OU1

OU3

Group3

 

Password Policy3

 

User3

Yes

5.

Group2

OU2

 

 

OU1

Group2

User2

No

6.

Group1

OU1

 

OU4

OU4

Group1

 

Password Policy4

 

User1

No

7.

Group2

OU2

 

OU5

OU5

Group2

User2

No

8.

Group3

OU3

Group1

 

 

Group3

 

Password Policy 5

 

User3

No

9.

Group3

OU3

Group2

 

OU3

 

User3

No

To link a password policy to Organizational Units and groups

  1. On the home page of the Administration Site, click the Password Policies tab.

  2. Click the One Identity Password Policies link under the application directory partition that you want to manage.

  3. On the One Identity Password Policies for <application directory partition> page, click Edit under the policy whose properties you want to view or modify.

  4. Click the Policy Scope tab.

  5. Click the Add button under This policy is applied to the following Organizational Units, and then browse for an Organizational Unit.

  6. Click the Add button under This policy is applied to the following groups, and then browse for a group.

  7. Click Save.

Changing Policy Priority

When multiple password policies affect an Organizational Unit or a group, only the policy with the highest priority is applied to such group or Organizational Unit. A newly created password policy is disabled by default.

NOTE: Only priority of policies with the same scope can be changed.

To change policy priority

  1. On the home page of the Administration Site, click the Password Policies tab.

  2. Click the One Identity Password Policies link under the AD LDS instance for which you want to change the policy link order and click Policy priority.

  3. In the Change Policy Priority dialog, move policies up or down in the list by selecting them and clicking the Move Up or Move Down buttons.

Configuring Password Policy Rules

Password Manager uses a set of powerful and flexible rules to define requirements for passwords. Each password policy has rules that are configured independently of the rules in other policies.

NOTE: Password Manager for ADLDS does not support Dictionary rule in OI Password policies.

For each password policy, you can set up the following rules:

  • Password age rule: Ensures that users cannot use expired passwords or change their passwords too frequently.

  • Length rule: Ensures that passwords contain the required number of characters.

  • Complexity rule: Ensures that passwords meet minimum complexity requirements.

  • Required characters rule: Ensures that passwords contain certain character categories.

  • Disallowed characters rule: Rejects passwords that contain certain character categories.

  • Sequence rule: Rejects passwords that contain more repeated characters than it is allowed.

  • User properties rule: Rejects passwords that contain part of a user account property value.

  • Symmetry rule: Ensures that password or its part does not read the same in both directions.

  • Custom rule: Use this rule to enter the settings of the local or domain password policy applied to the server on which AD LDS is running, if you want to display these settings to users on the Self-Service Site when users reset or change passwords. You can also use this rule to display your custom messages and to hide the configured policy rules.

Password Compliance

When you use Forgot My Password or Manage My Passwords workflow to set or reset the password, you can view the compliance of the password with the configured password policy. You can expand a policy and view the rules set for the policy. When you enter a new password, you can instantly get the feedback about the compliance of the password with the defined rules. A green tick mark against the rules in a policy indicates that the password is in compliance with the rule, and help you to set a compliant password.

You can also view the strength of the password using the Password strength meter, which get displayed as a progress bar when you enter a new password in the New password text box. The Password strength meter assess the strength of the password by verifying the password with the configured password policy rules and the basic requirements (one upper case letter, one lower case letter, one numeric value, one special character and minimum of seven characters) for a password. This will help to improve the security of the password. You can enable or disable this feature and configure the Password strength status. For more details see Customization of Password Strength Meter.

The following is a general procedure for configuring the password policy rules.

To configure rules for a password policy

  1. On the home page of the Administration Site, click the Password Policies tab.

  2. Click the <N> One Identity Password Policies link under the AD LDS instance that you want to manage.

  3. On the One Identity Password Policies for <application directory partition> page, click the policy whose properties you want to modify, and then click the Policy Rules tab.

  4. On the Policy Rules tab, click the rule that you want to configure, and, under the rule's name, modify the appropriate rule settings.

  5. Repeat step 4 for each of the rules that you want to configure for this password policy, and then click Save.

NOTE: Starting from version 5.9.5, if a Password Manager policy is applied, then the Next button remains disabled in the Forgot my password/ Manage My Passwords screen and gets enabled only when all the Password Manager's policies are met and shows GREEN.

For information about how to configure each of the policy rules, see the sections below.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione