サポートと今すぐチャット
サポートとのチャット

Password Manager 5.11.1 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Password Policies Enable S2FA for Administrators and Enable S2FA for HelpDesk Users Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Appendix D: Feature imparities between the legacy and the new Self-Service Sites Glossary

Removing Connection to AD LDS Instance

To remove a connection

  1. On the Administration site, click the General Settings|AD LDS Instance Connections tab.
  2. On the AD LDS Instance Connections page, select the connection you want to delete and click Remove. Note, to permanently remove the connection, it should be removed from all sections where it is used. The Remove link becomes available only after the connection is removed from all sections where it is used.

Extensibility Features

Extensibility features allow you to customize and extend the Password Manager functionality. The features include the following:

  • Custom activities
  • Built-in web service
  • Custom web services
  • Import/export of activities and workflows
  • Troubleshooting mode

All these features are available only after you turn the extensibility on.

To turn extensibility features on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.

After you turn the extensibility features on, you can also turn on the troubleshooting mode. When the troubleshooting mode is on, the following additional information is displayed:

  • Identifiers of activities and workflows (on the Administration site)
  • PowerShell output (on the Self-Service site)

To turn the troubleshooting mode on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.
  4. Click the Turn on button under the troubleshooting mode.

Extensibility Features Overview

Custom activities are activities whose behavior is defined by a PowerShell script. You can create a custom activity from scratch or convert a built-in activity to a custom one. For more information, see Custom Activities and refer to the Password Manager SDK.

Built-in web service allow a third-party system to access a whole workflow or a specific activity using HTTP and data exchange in XML and JSON formats. You can use the built-in web service to execute a workflow and to interfere in a workflow execution process. For more information refer the Password Manager SDK.

Custom web services allow you to further extend the Password Manager functionality and enable scenarios that cannot be implemented using custom activities and the built-in web service. For example, you can create a custom web service that assigns passcodes to users employing the assign passcode functionality in Password Manager. For more information refer the Password Manager SDK.

Import/export of activities and workflows allows you to copy and share custom activities and workflows. For more information, see Importing and exporting workflows and Importing and Exporting Custom Activities.

The troubleshooting mode provides you additional information about workflows and activities and their execution. When this mode is enabled, on the Administration site you can view identifiers of workflow and activities; you can use these identifiers in PowerShell scripts. On the Self-Service site, you can view the PowerShell output that allows you to troubleshoot the scripts.

RADIUS Two-Factor Authentication

RADIUS Two-Factor Authentication

RADIUS Two-Factor Authentication enables two-factor authentication on Password Manager. RADIUS Two-Factor Authentication uses one-time passwords to authenticate users on the Self-Service site and Helpdesk site.

To configure RADIUS Two-Factor Authentication in Password Manager, you have to configure the RADIUS server details in Password Manager.

To configure RADIUS Two-Factor Authentication:

  1. On the home page of the Administration site, click General Settings | RADIUS Two-Factor.

    The RADIUS Two-Factor Authentication page is displayed.

  2. Click Add RADIUS server to add a new RADIUS server for authentication.

    RADIUS Two-Factor Authentication page is displayed.

    NOTE: You can add only two servers, one is used as a primary server and the other as a secondary server. The server that is created first is considered as the primary server and used for RADIUS authentication.
  3. In the RADIUS Server (IP address or hostname) field, enter the RADIUS server IP address.

  4. In the Port number field, enter the port number assigned during configuration of RADIUS.

  5. In the RADIUS Shared Secret field, enter the password set during RADIUS configuration.

  6. Specify the ADLDS attribute to authenticate the user from the drop-down menu.

  7. From the Additional RADIUS Attribute section, select the required RADIUS attribute from the drop-down menu. Specify the value for the selected attribute and click +.

    The RADIUS attributes and the corresponding values that you add is displayed.

    NOTE: The RADIUS attributes supported are NAS-IP-Address, NAS-Port, NAS-Port-Type, and NAS-Identifier.
  8. Click Save.
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択