サポートと今すぐチャット
サポートとのチャット

Password Manager 5.11.1 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Password Policies Enable S2FA for Administrators and Enable S2FA for HelpDesk Users Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Appendix D: Feature imparities between the legacy and the new Self-Service Sites Glossary

Enable Account

Use this activity to enable users’ disabled accounts. You can use the activity in different workflows. It is recommended to place this activity after authentication activities in a workflow.

For example, to enable users with disabled accounts to reset passwords and enable their accounts, you can use the Enable account activity in the Forgot My Password workflow:

  1. Authenticate with Q&A profile (random questions).
  2. Enable account.
  3. Reset password in AD LDS.
  4. Restart workflow if error occurs.
  5. Email user if workflow succeeds.
  6. Email user if workflow fails.

Force User to Change Password at Next Logon

Force User to Change Password at Next Logon

Use this activity when users want to change their passwords during the next logon.

For example, you can use this activity in the Reset Password workflow and can force users to change passwords at the next logon once the password has been reset by a helpdesk operator.

To allow users to change password at the next logon, the helpdesk operator must select Helpdesk operators can choose whether to force users to change password at next logon check box available in the Force user to change password at next logon activity.

It is recommended to place this activity after the Reset Password in AD LDS activity in a workflow.

Subscribe to Notifications

Subscribe to Notifications

This activity is a core activity of the My Notifications workflow. It allows users to select on the Self-Service site the events they want to be notified about, such as when their password is changed or account is unlocked.

The event list available on the Self-Service site depends on the settings you configure in the user notification activities included in the self-service workflows. Each user notification activity (Email user if workflow succeeds and Email user if workflow fails) has the settings that allow you to subscribe users to this notification or to allow users to choose whether they want to receive this notification or not.

If user notifications activities are not included in a workflow, users will not receive any email notifications about this workflow.

A notification text depends on the workflow in which the notification activity is used. For example, if the Email user if workflow succeeds activity is used in the Forgot My Password workflow, after successfully performing this task on the Self-Service site the user will be notified that his password has been reset. By default, the Email user if workflow succeeds and Email user if workflow fails activities are included in each built-in self-service workflow and offer notification templates.

Note, that notification templates are available for built-in activities and built-in workflows only.

For more information on configuring user notification activities, see Notification Activities.

IMPORTANT: If a user notification activity is included in a helpdesk workflow, the user will receive the corresponding notification. You cannot change user subscription settings of notifications about helpdesk workflows.

Lock Q&A Profile

Lock Q&A Profile

If you want to lock the user’s Questions and Answers profile after several failed authentication attempts, place the Lock Q&A profile activity before the Restart workflow if error occurs activity in a workflow. The Lock Q&A profile activity locks the profile when the total number of attempts to authenticate the user by using any of the following activities equals or exceeds the lockout threshold value:

  • Authenticate with Q&A profile
  • Authenticate via phone
  • Authenticate with passcode

By default, the Lock Q&A profile activity is included in the Forgot My Password and Unlock My Account workflows.

IMPORTANT:

  • If the user’s Q&A profile gets locked, all tasks on the Self-Service site will be unavailable for the user. In this case, the user must contact help desk to obtain a passcode and unlock the Q&A profile.
  • If an unregistered user is registering for the first time and tries to enter a wrong password beyond the specified limit, the profile shall be locked out. The user has to wait for the duration configured for Reset lockout Account.

This activity has the following settings:

  • Lockout duration. Specify the number of minutes the profile remains locked out before automatically becoming unlocked.
  • Lockout threshold. Specify the number of failed authentication attempts that will cause a the profile to be locked out.
  • Reset account lockout counter after. Specify the number of minutes that must elapse from the time a user fails to authenticate before the failed authentication attempt counter is reset to 0 bad authentication attempts.
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択