サポートと今すぐチャット
サポートとのチャット

Password Manager 5.12.3 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable S2FA for Administrators & Enable S2FA for HelpDesk Users Reporting Password Manager Integration Accounts Used in Password Manager Open Communication Ports for Password Manager Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Glossary

Deploying and Configuring Secure Password Extension

This section describes the prerequisites and steps for deploying and configuring Secure Password Extension to provide access to the Self-Service site from the Windows logon screen on end-user computers. Secure Password Extension also provides dialog boxes displayed on end-user computers, these dialog boxes notify users who must create or update their Questions and Answers profiles with Password Manager.

Deploying Secure Password Extension

Secure Password Extension is deployed on client computers through Group Policy. You can create a new Group Policy object (GPO) or use an existing one to assign the installation package with Secure Password Extension for installing it on the destination computers. Secure Password Extension is then installed on computers to which the GPO applies. Depending on the operating system running on the destination computers, you must apply either of the following installation packages included on the installation CD:

  • SecurePasswordExtension_x86.msi - Installs Secure Password Extension on computers running x86 versions of operating systems.
  • SecurePasswordExtension_x64.msi - Installs Secure Password Extension on computers running x64 versions of operating systems.

You can modify the behavior and on-screen appearance of Secure Password Extension components by configuring an administrative template's settings, and then applying the template to the target computers through Group Policy.

The administrative template is available in only one format: prm_gina.admx.

The prm_gina.admx administrative template file is located in the \Password Manager\Setup\Template\Administrative Template\ folder of the installation CD. This administrative template is designed to be used with Windows Server 2012 R2 or later operating systems. Before using this administrative template, copy the prm_gina.admx and prm_gina.adml files from the installation CD to the following locations: %systemroot%\SYSVOL\domain\Policies\PolicyDefinitions(for the prm_gina.admx file) and %systemroot%\SYSVOL\sysvol\domain\Policies\PolicyDefinitions\en-US (for the prm_gina.adml file).

Alternatively, you could use the Administrative Template configuration tool to copy and use the admx templates.

Follow the steps below to configure and deploy the Secure Password Extension on end-user computers.

To deploy and configure Secure Password Extension

  1. Copy the required installation package (SecurePasswordExtension_x86.msi or SecurePasswordExtension_x64.msi) from the installation CD to a network share accessible from all domain controllers where you want to install Secure Password Extension. The MSI packages are located in the \Password Manager\Setup\ folder of the installation CD.
  2. Create a GPO and link it to all computers, sites, domains, or organizational units where you want to use Secure Password Extension. You may also choose an existing GPO to use with Secure Password Extension.
  3. Open the Group Policy Management Editor in the Group Policy Management, and then do the following
    • Expand Computer Configuration/Policies/Software Settings, right-click Software installation, and then select New | Package.
    • Browse for the MSI package you have copied in step 1, and then click Open.
    • In the Deploy Software window, select a deployment method and click OK.
    • Verify and configure the properties of the installation, if needed.

Configuring Secure Password Extension

This section describes how to override automatic location of the Self-Service site and customize Secure Password Extension.

Overriding Automatic Self-Service Site Location

By default, Secure Password Extension uses service connection points published in Active Directory to locate the Self-Service site. If you need to override the default behavior and force Secure Password Extension to use a specific Self-Service site, you must manually specify the URL path and override the default behavior of Secure Password Extension.

To override automatic Self-Service site location on a computer running Windows Server 2012 R2 or later

  1. Click the Start button, click Run, and type mmc. Click OK.
  2. In the Console window on the File menu, click Add/Remove Snap-in.
  3. Double-click Group Policy Management Editor in the list of available snap-ins.
  4. In the Group Policy Wizard window, click Browse, select Default Domain Policy and click OK.
  5. Click Finish to exit Group Policy Wizard.
  6. Click OK.
  7. Login to the Active Directory Domain Controller machine with Administrative Privileges.

  8. Copy the Administrative Template Configuration folder from <CD >/Password Manager/Setup/Tools.

  9. Copy the Administrative Template folder into the Machine from <CD>/Password Manager/Setup/Template.

  10. Double click QPM.AdministrativeTemplateConfiguration.exe tool from the Administrative Template Configuration folder.

  11. In the Password Manager Administrative Template Configuration windows, browse the Administrative Template folder path and verify the path to Policy Definitions.

  12. Click Execute to run the tool.

  13. Once the execution is complete, click Exit to close the window.
  14. Launch the Group Policy Management utility.

  15. Right click the domain, and then on the shortcut menu, click Create a GPO in the domain and Link it here to link the policy.

  16. Enter a name to the New GPO, say "OneIdentity".
  17. Right click the new GPO (OneIdentity) and select Enforced to apply the policy.

  18. Right click the new GPO (OneIdentity) and select Edit.

  19. To view the latest Administrative Template, follow the steps mentioned below
    1. Expand the newly created GPO.
    2. Go to Computer Configuration >> Policies.
    3. Expand Administrative Templates: Policy Definitions(ADMX files) retrieved from the central store >> One Identity Password Manager >> Generic Settings .
  1. Double-click Specify URL path to the Self-Service site.
  2. Select the Enabled option on the Settings tab and then enter the URL path to the Self-Service site into the entry field using the following format: https://COMPUTER_NAME/PMUser/, where COMPUTER_NAME is the name of the server in which the Self-Service site is installed. Substitute https:// with http:// if you don’t use HTTPS.

    IMPORTANT: It is strongly recommended that you enable HTTPS on the Password Manager server.
  3. Click OK. The specified URL will be used only if service connection points are unavailable or if the Self-Service site URL specified in the service connection point cannot be found. If you want Secure Password Extensions to always use the specified URL, perform the following steps.
  4. Double-click Override URL path to the Self-Service site.
  5. Select the Enabled option on the Settings tab.
  6. Click OK.
  7. Apply the updated policy to the computers in the managed domain.

    NOTE: Application of the updated policy to the computers in the managed domain may take some time to complete.
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択