Accounts Used in Password Manager
Accounts Used in Password Manager
The following accounts can be used in Password Manager:
-
Password Manager Service account
-
Application pool identity
-
Domain management account
-
Password policy account
-
Account for One Identity Quick Connect Sync Engine
Password Manager Service Account
Password Manager Service account is used to install Password Manager. For Password Manager to run successfully, Password Manager Service account must be a member of the Administrators group on the Web server where Password Manager is installed.
Application Pool Identity
Application pool identity is an account under which the application pool's worker process runs. The account you specify as the application pool identity during Password Manager setup will be used to run Password Manager Web sites.
Application pool identity account must meet the following requirements:
- This account must be a member of the IIS_IUSRS local group on the Web server in IIS 7.0.
- This account must have permissions to create files in the <Password Manager installation folder>\App_Data folder.
- Application pool identity account must the full control permission set for the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\One Identity\Password Manager.
Domain Management Account
Domain management account is an account under which Password Manager accesses a managed domain. Domain management account must meet the following minimum requirements to successfully perform password management tasks in the managed domain:
- Membership in the Domain Users group
- The Read permission for all attributes of user objects
- The Write permission for the following attributes of user objects: pwdLastSet, comment, userAccountControl, and lockoutTime
- The right to reset user passwords
- The permission to create user accounts and containers in the Users container
- The Read permission for attributes of the organizationalUnit object and domain objects
- The Write permission for the gpLink attribute of the organizationalUnit objects and domain objects
- The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers
- The permission to create container objects in the System container
- The permission to create the serviceConnectionPoint objects in the System container
- The permission to delete the serviceConnectionPoint objects in the System container
- The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container