サポートと今すぐチャット
サポートとのチャット

Password Manager 5.14.2 - Administration Guide

About Password Manager Getting started Password Manager architecture
Password Manager components and third-party applications Typical deployment scenarios Password Manager in a perimeter network Management Policy overview Password policy overview Secure Password Extension overview reCAPTCHA overview User enrollment process overview Questions and Answers policy overview Password change and reset process overview Data replication Phone-based authentication service overview
Management policies
Checklist: Configuring Password Manager Understanding Management Policies Adding or cloning a new Management Policy Configuring access to the Administration Site Configuring access to the Password Manager Self-Service Site Configuring access to the Helpdesk Site Configuring Questions and Answers policy Workflow overview Custom workflows Custom activities Password Manager Self-Service Site workflows Helpdesk workflows Notification activities User enforcement rules
General Settings
General Settings overview Search and logon options Importing and exporting configuration settings Outgoing mail servers Diagnostic logging Scheduled tasks Web Interface customization Instance reinitialization Realm Instances Domain Connections Extensibility features RADIUS Two-Factor Authentication Internal Feedback Customizing help link URL Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable 2FA for administrators and helpdesk users Reporting Password Manager integration Accounts used in Password Manager Open communication ports for Password Manager Customization options overview Third-party contributions Glossary

Applying multiple password policies

If a user is found in the scopes of a default domain password policy, a fine-grained password policy, and a One Identity password policy, the applicable policy is selected in the following algorithm. The default domain policy is ignored. The rules from the fine-grained and One Identity policies are merged with the strictest value selected for each rule.

If a user is found in the scopes of several fine-grained password policies, the applicable policy is selected automatically in Active Directory.

If a user is found in the scopes of several One Identity password policies, then the policy with the highest priority is applied to the user. Note that priority can be changed for policies with the same scope.

Using Password Policy Manager

Password Policy Manager is a separate component of Password Manager that allows enforcing One Identity password policy rules when users change or reset passwords by means other than the Self-Service Site.

For example, you have configured a One Identity password policy for users from domain My Domain. When users from this domain change or reset passwords on the Self-Service Site (the user on the left in the diagram below), the configured One Identity password policy is applied, and corresponding policy rules are displayed. This happens because Password Policy Manager is always available with the Password Manager service. But when users try to change or reset passwords by pressing Ctrl+Alt+Delete, for example (the user on the right in the diagram below), the configured One Identity password policy will not be enforced.

To enforce the configured One Identity password policy in cases when users change or reset passwords not via the Self-Service Site, you must install Password Policy Manager on all domain controllers in the domain. In the case when Password Policy Manager is installed on domain controllers in the managed domain, when the same users change or reset password by pressing Ctrl+Alt+Delete, the One Identity password policy will be applied.

Therefore, if users from your managed domain change or reset their password on the Self-Service Site only, you do not need to install Password Policy Manager on all domain controllers in the domain. But if you want to ensure that password policies are enforced when users change or reset passwords by means other than the Self-Service Site, you must install Password Policy Manager on all domain controllers in the domain.

For more information on how to install Password Policy Manager, see Installing Password Policy Manager.

Secure Password Extension overview

This section explains how Secure Password Extension locates the Self-Service Site and launches notification dialogs on end-user computers that remind users to create or update their Questions and Answers profiles.

Locating Self-Service Site

By default, Secure Password Extension uses a URL from a service connection point to locate the Self-Service Site. You can also override the default URL published in the service connection point by specifying a different URL in the General Settings of the Administration Site or by specifying a different URL in the supplied administrative template and applying the template to selected users.

For more information, see:

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択