サポートと今すぐチャット
サポートとのチャット

Password Manager 5.13.1 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Legacy Self-Service Site and Password Manager Self-Service site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Legacy Self-Service or Password Manager Self-Service site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Glossary

Specifying Access Account for AD LDS Instance Connections

When creating a connection, you must specify an access account - an account under which Password Manager will access an AD LDS instance and a specified application directory partition. You can use the Password Manager Service account, an Active Directory account or an AD LDS account. These accounts must have the following minimum set of permissions:

  • Membership in the Domain Users group (for the Password Manager Service account and the Active Directory account only)

  • Membership in the Readers group in the application directory partition (for the AD LDS account only)

  • Membership in the Administrators group in the configuration directory partition

  • The Read permission for all attributes of user objects

  • The Write permission for the following attributes of user objects: pwdLastSet, comment, unicodePwd, lockoutTime, msDS-UserAccountDisabled

  • The right to reset user passwords

  • The permission to create user accounts and containers in the Users container

  • The Read permission for attributes of the organizationalUnit object and container objects

  • The Write permission for the gpLink attribute of the organizationalUnit objects and container objects

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers

  • The permission to create container objects in the System container

  • The permission to create the serviceConnectionPoint objects in the System container

  • The permission to delete the serviceConnectionPoint objects in the System container

  • The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container

If you want to use the same connection in password policies as well, make sure the account has the following permissions:

  • The Read permission for attributes of the groupPolicyContainer objects.

  • The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.

  • The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.

  • The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.

To add connection

  1. On the home page of the Administration site, click the General Settings > AD LDS Instance Connections tab.

  2. To add a connection, click Connect to AD LDS instance.

  3. In the Connect to AD LDS Instancedialog, configure the following options:

    • In the Server name on which AD LDS instance is installed field, enter the name of the server to which you want to connect.

    • In the Port number (LDAP or SSL) field, enter the port number that you specified when installing the AD LDS instance. If you select the Use SSL check box, enter the SSL port number; otherwise, LDAP port number. It is recommended to use SSL in your production environment.

    • In the Application directory partition field, enter the name of the application directory partition from the AD LDS instance to which you want to connect.

    • In the Application directory partition alias field, type the alias for the application directory partition which will be used to address the partition on the Self-Service site.

    • In the Access account section, select Password Manager Service account to have Password Manager access the AD LDS instance using the Password Manager Service account, otherwise, select The following Active Directory account or The following AD LDS account and enter the required user name and password.

  4. Click Save.

    NOTE: After you create a connection on the General Settings > AD LDS Instance Connections tab, you can use it in the user scope, helpdesk scope and password policies by selecting the connection in the Connect to AD LDS Instance dialog on the corresponding page of the Administration site. For example, to use the connection in the user scope of your Management Policy, open the user scope of this Management Policy, click Connect to AD LDS instance, and select the corresponding connection from the list.

Changing Access Account for AD LDS Instance Connections

To change access account

  1. On the home page of the Administration site, click the General Settings > AD LDS Instance Connections tab.

  2. Select the connection you want to modify and click Edit.

  3. In the Edit AD LDS Instance Connection dialog, select Password Manager Service account to have Password Manager access the managed instance using the Password Manager Service account. Otherwise, select The following Active Directory account or The following AD LDS account, then enter the required user name and password. Note, that the selected account should have the required permissions.

  4. Click Save.

    NOTE: The updated settings will be applied everywhere where this connection is used.

Removing Connection to AD LDS Instance

To remove a connection

  1. On the Administration site, click the General Settings > AD LDS Instance Connections tab.

  2. On the AD LDS Instance Connections page, select the connection you want to delete and click Remove.

    NOTE: To permanently remove the connection, it should be removed from all sections where it is used. The Remove link becomes available only after the connection is removed from all sections where it is used.

Extensibility Features

Extensibility features allow you to customize and extend the Password Manager functionality. The features include the following:

  • Custom activities

  • Built-in web service

  • Custom web services

  • Import/export of activities and workflows

  • Troubleshooting mode

All these features are available only after you turn the extensibility on.

To turn extensibility features on

  1. Open the Administration site and click the General Settings tab.

  2. On the General Settings page, select the Extensibility tab.

  3. On the Extensibility settings page, click the upper Turn on button.

After you turn the extensibility features on, you can also turn on the troubleshooting mode. When the troubleshooting mode is on, the following additional information is displayed:

  • Identifiers of activities and workflows (on the Administration site)

  • PowerShell output (on the Self-Service site)

To turn the troubleshooting mode on

  1. Open the Administration site and click the General Settings tab.

  2. On the General Settings page, select the Extensibility tab.

  3. On the Extensibility settings page, click the upper Turn on button.

  4. Click the Turn on button under the troubleshooting mode.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択