サポートと今すぐチャット
サポートとのチャット

Identity Manager 9.0 LTS - Administration Guide for Connecting to LDAP

About this guide Managing LDAP environments Synchronizing LDAP directories
Setting up initial LDAP directory synchronization Adjusting the synchronization configuration for LDAP environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing LDAP user accounts and employees Managing memberships in LDAP groups Login information for LDAP user accounts Mapping LDAP objects in One Identity Manager Handling of LDAP objects in the Web Portal Basic data for managing an LDAP environment Troubleshooting Configuration parameters for managing an LDAP environment Default project template for LDAP LDAP connector V2 settings

Policy settings

Define the following settings for a password policy on the Password tab.

Table 19: Policy settings

Property

Meaning

Initial password

Initial password for newly created user accounts. The initial password is used if a password is not entered when you create a user account or if a random password is not generated.

Password confirmation

Reconfirm password.

Minimum Length

Minimum length of the password. Specify the number of characters a password must have. If the value is 0, no password is required.

Max. length

Maximum length of the password. Specify the number of characters a password can have. The maximum permitted value is 256.

Max. errors

Maximum number of errors. Set the number of invalid passwords attempts. The number of failed logins is only taken into account when logging in to One Identity Manager. If the value is 0, the number of failed logins is not taken into account.

This data is only taken into account if the One Identity Manager login was through a system user or employee based authentication module. If a user has exceeded the maximum number of failed logins, the employee or system user will not be able to log in to One Identity Manager.

You can use the Password Reset Portal to reset the passwords of employees and system users who have been blocked. For more information, see the One Identity Manager Web Designer Web Portal User Guide.

Validity period

Maximum age of the password. Enter the length of time a password can be used before it expires. If the value is 0, then the password does not expire.

Password history

Enter the number of passwords to be saved. If, for example, a value of 5 is entered, the user's last five passwords are stored. If the value is 0, then no passwords are stored in the password history.

Minimum password strength

Specifies how secure the password must be. The higher the password strength, the more secure it is. The value 0 means that the password strength is not tested. The values 1, 2, 3 and 4 specify the required complexity of the password. The value 1 represents the lowest requirements in terms of password strength. The value 4 requires the highest level of complexity.

Name properties denied

Specifies whether name properties are permitted in the password. If this option is set, name properties are not permitted in passwords. The values of these columns are taken into account if the Contains name properties for password check option is set. In the Designer, adjust this option in the column definition. For more information, see the One Identity Manager Configuration Guide.

Character classes for passwords

Use the Character classes tab to specify which characters are permitted for a password.

Table 20: Character classes for passwords

Property

Meaning

Required number of character classes

Number of rules for character classes that must be fulfilled so that a password adheres to the password policy. The following rules are taken into account for Min. number letters, Min. number lowercase, Min. number uppercase, Min. number digits, and Min. number special characters.

That means:

  • Value 0: All character class rules must be fulfilled.

  • Value >0: Minimum number of character class rules that must be fulfilled. At most, the value can be the number of rules with a value >0.

NOTE: Generated passwords are not tested for this.

Min. number letters

Specifies the minimum number of alphabetical characters the password must contain.

Min. number lowercase

Specifies the minimum number of lowercase letters the password must contain.

Min. number uppercase

Specifies the minimum number of uppercase letters the password must contain.

Min. number digits

Specifies the minimum number of digits the password must contain.

Min. number special characters

Specifies the minimum number of special characters the password must contain.

Permitted special characters

List of permitted special characters.

Max. identical characters in total

Specifies the maximum number of identical characters that can be present in the password in total.

Max. identical characters in succession

Specifies the maximum number of identical character that can be repeated after each other.

Denied special characters

List of special characters that are not permitted.

Do not generate lowercase letters

Specifies whether a generated password can contain lowercase letters. This setting only applies when passwords are generated.

Do not generate uppercase letters

Specifies whether a generated password can contain uppercase letters. This setting only applies when passwords are generated.

Do not generate digits

Specifies whether a generated password can contain digits. This setting only applies when passwords are generated.

Do not generate special characters

Specifies whether a generated password can contain special characters. If this option is set, only letters, numbers, and spaces are allowed in passwords. This setting only applies when passwords are generated.

Custom scripts for password requirements

You can implement custom scripts for testing and generating passwords if the password requirements cannot be mapped with the existing settings options. Scripts are applied in addition to the other settings.

Detailed information about this topic

Checking passwords with a script

You can implement a script if additional policies need to be used for checking a password that cannot be mapped with the available settings.

Syntax of check scripts

Public Sub CCC_CustomPwdValidate( policy As VI.DB.Passwords.PasswordPolicy, spwd As System.Security.SecureString)

With parameters:

policy = password policy object

spwd = password to check

TIP: To use a base object, take the Entity property of the PasswordPolicy class.

Example: Script that checks a password

A password cannot start with ? or ! . The password cannot start with three identical characters. The script checks a given password for validity.

Public Sub CCC_PwdValidate( policy As VI.DB.Passwords.PasswordPolicy, spwd As System.Security.SecureString)

Dim pwd = spwd.ToInsecureArray()

If pwd.Length>0

If pwd(0)="?" Or pwd(0)="!"

Throw New Exception(#LD("Password can't start with '?' or '!'")#)

End If

End If

If pwd.Length>2

If pwd(0) = pwd(1) AndAlso pwd(1) = pwd(2)

Throw New Exception(#LD("Invalid character sequence in password")#)

End If

End If

End Sub

To use a custom script for checking a password

  1. In the Designer, create your script in the Script Library category.

  2. Edit the password policy.

    1. In the Manager, select the LDAP > Basic configuration data > Password policies category.

    2. In the result list, select the password policy.

    3. Select the Change main data task.

    4. On the Scripts tab, enter the name of the script to be used to check a password in the Check script field.

    5. Save the changes.

Related topics
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択