Password Manager Service account is used to install Password Manager. For Password Manager to run successfully, Password Manager Service account must be a member of the Administrators group on the Web server where Password Manager is installed.
Password Manager Service account is used to install Password Manager. For Password Manager to run successfully, Password Manager Service account must be a member of the Administrators group on the Web server where Password Manager is installed.
Application pool identity is an account under which the application pool's worker process runs. The account you specify as the application pool identity during Password Manager setup will be used to run Password Manager websites.
Application pool identity account must meet the following requirements:
This account must be a member of the IIS_IUSRS local group on the web server in IIS 7.0.
This account must have permissions to create files in the <password-manager-installation-folder>\App_Data folder.
Application pool identity account must the full control permission set for the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\One Identity\Password Manager.
Domain management account is an account under which Password Manager accesses a managed domain. Domain management account must meet the following minimum requirements to successfully perform password management tasks in the managed domain:
Membership in the Domain Users group
The Read permission for all attributes of user objects
The Write permission for the following attributes of user objects: pwdLastSet, comment, userAccountControl, and lockoutTime
The permission to create user accounts and containers in the Users container
The Read permission for attributes of the organizationalUnit object and domain objects
The Write permission for the gpLink attribute of the organizationalUnit objects and domain objects
The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers
The permission to create container objects in the System container
The permission to create the serviceConnectionPoint objects in the System container
The permission to delete the serviceConnectionPoint objects in the System container
The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container
You can use Password Manager to create password policies that define which passwords to reject or accept. Password policy account is an account that you specify when you add a domain for configuring password policies.
Password policy account must meet the following minimum requirements:
The Read permission for attributes of the groupPolicyContainer objects.
The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.
The Read permission for the nTSecurityDecriptor attribute of the groupPolicyContainer objects.
The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.
The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.
The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.
The Write permission for the following attributes of the msDS-PasswordSettings object:
msDS-LockoutDuration
msDS-LockoutThreshold
msDS-MaximumPasswordAge
msDS-MinimumPasswordAge
msDS-MinimumPasswordLength
msDS-PasswordComplexityEnabled
msDS-PasswordHistoryLength
msDS-PasswordReversibleEncryption
msDS-PasswordSettingsPrecedence
msDS-PSOApplied
msDS-PSOAppliesTo
name
For more information on password policies that can be configured in Password Manager, see Creating and Configuring a Password Policy.
In the Register workflow, if the Admin selects Corporate authentication check box, user will only be able to review the corporate account details while registration. If Allow user to edit corporate details check box is selected, the user will be able to update the respective corporate details such as Corporate email and Corporate phone number, provided that the details are not previously populated by administrator in the AD.
If Corporate authentication registration mode is selected in the Register activity, make sure that Domain management account has the following set of permissions.
The read permission for Corporate email attribute and Corporate phone attribute where, Mobile is the default attribute for the Corporate phone.
If Allow user to edit corporate details is selected under Corporate authentication, both Read and Write permission must be available for Corporate email attribute and Corporate phone attribute, where Mobile is the default attribute for the Corporate phone.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center