サポートと今すぐチャット
サポートとのチャット

Password Manager 5.13.2 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Legacy Self-Service Site and Password Manager Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Legacy Self-Service or Password Manager Self-Service Site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Third-party contributions Glossary

Modifying Advanced Settings

Using the advanced settings you can specify the following:

  • Encryption algorithm: use this setting to select the encryption algorithm that is used to encrypt users’ answers to secret questions and other security sensitive information. You can select from two options: Triple DES and AES. By default, Password Manager uses Triple DES algorithm to encrypt data.

    NOTE: Users’ answers will be encrypted if the Store answers using reversible encryption option is selected in the Q&A Profile settings. Otherwise, the answers will be hashed.

  • Encryption key length: use this setting to select whether a 192-bit or 256-bit encryption key will be used.

  • Attribute for storing Q&A profiles: use this setting to enter the attribute name that will be used for storing Q&A profile data. By default, Password Manager stores Q&A profile data in the comment attribute of each user's account and the configuration data in the comment attribute of a configuration storage account, which is automatically created when installing Password Manager.

    IMPORTANT: If you change encryption settings and the attribute for storing Q&A profiles, the current instance will be excluded from a realm it belongs to and users may lose their Q&A profiles.

    When you change these settings, do the following to keep users’ Q&A profiles:

    • Export the current configuration when saving updated instance settings.

    • Update Q&A profiles using the Migration wizard (upload the exported configuration to the wizard) on the current instance.

    • To replicate new settings and updated Q&A profiles export the updated configuration from the current instance and import the configuration to other instances.

    If you do not use the Migration wizard to update users’ Q&A profile after changing the settings, users will have to re-register with Password Manager.

  • Hashing algorithm: Use this setting to select the hashing algorithm that will be used to hash users’ answers to secret questions. The following algorithms are available: MD5 and SHA-256. By default, Password Manager uses SHA-256 hashing algorithm. Password Manager will hash users’ answers if Store answers using reversible encryption option is not selected in the Q&A Profile settings.

    IMPORTANT: If you change the hashing algorithm, the selected algorithm will be applied to newly created Q&A profiles only. Existing Q&A profiles will be hashed with the previously selected algorithm.

To modify the advanced settings

  1. On the home page of the Administration Site, click General Settings > Reinitialization, and expand the Advanced settings section.

  2. From the Encryption algorithm drop-down list, select the encryption algorithm for encrypting users’ answers to secret questions and other security sensitive data.

  3. From the Encryption key length drop-down list, select whether a 192-bit or 256-bit encryption key will be used to encrypt data.

  4. From the Hashing algorithm drop-down list, select the algorithm that will be used to hash users’ authentication answers.

  5. In the Select the attribute of user’s account in Active Directory in which user’s Questions and Answers profile and Corporate phone will be stored section, provide the following data.

    1. Security questions: Enter the required security question.

    2. Corporate Phone: Enter the mobile number of the user.

    3. Corporate email: Enter the corporate's email id of the user.

  6. Click Save.

    Once you click Save, Reinitialize Instance dialog appears.

  7. In the Reinitialize Instance dialog, a password is generated for the configuration file that you should export to update users’ Q&A profiles and click Export.

  8. Click Save.

To update users’ Q&A profiles with new instance settings

Before running the Migration Wizard, update the following attributes in the Migration Wizard\Resources\productinfo.xml file:

  • <productNameFull>: One Identity LLC for AD LDS

  • <productNameShort>: Password Manager for AD LDS

  • <realmType>: AD LDS

The values specified above can be also copied from One Identity\Password Manager for AD LDS\Service\Resources\productinfo.xml.

  1. Run the Migration wizard from the Password Manager media autorun window.

  2. On the Welcome page, select the Update users’ Q&A profiles with new instance settings task.

  3. On the next page, upload the configuration file you exported when reinitializing the instance. Click Browse to select the file, enter the password you specified for the file, and click Next.

  4. Select users whose Q&A profiles you want to update and click Next. To select groups, click Add and do the following:

    • In the Add Groups dialog, enter the group name, select the application directory partition from the list and click Search.

    • Select the required groups in the list and click Save.

  5. On the next page, do one of the following and click Next:

    1. Security Questions: Provide the required security questions.

    2. Corporate Phone: Provide the required corporate phone.

    3. Corporate email, Personal email, and Personal phone fields are not editable.

  6. On the status page, click View the report for detailed information to view a detailed account of updating profiles. If you updated Q&A profiles in test mode, click Update Q&A profiles in production mode.

After you have updated the Q&A profiles with new instance settings, join other instances to this realm by exporting the configuration from the current instance and importing it to other instances. For more information on how to import and export configuration settings, see Import/Export Configuration Settings.

Realm Instances

On the Administration Site you can view a list of installed Password Manager instances belonging to one realm. This information is available on the Realm Instances page.

To open the Password Manager Service Instances page, on the Administration Site click General Settings. On the General Settings page, click the Realm Instances tab.

In Realm instances, the Primary instance is in red for easy identification.

All Password Manager Service instances belonging to one realm share the following settings: certificate name, port number, encryption algorithm, encryption key length, hashing algorithm, attribute for storing Q&A profile data, realm affinity ID, and configuration data. These options are configured when initializing a Password Manager Service instance. To change any of these settings, see Instance Reinitialization.

AD LDS Instance Connections

This section provides information on creating, modifying, and using connections to AD LDS instances.

Using Connections to AD LDS Instances

On the General Settings > AD LDS Instance Connections tab of the Administration Site, you can view a list of available connections.

To manage AD LDS instance with Password Manager you need to create a connection to the required AD LDS instance. When adding a connection, you can select an existing connection or create a new one. It is possible to use the same connection in different sections: user and helpdesk scopes, and password policies.

You can add a connection to an AD LDS instance either on the AD LDS Instance Connections tab or from the User scope, Helpdesk scope, and Password Policies pages.

NOTE: When you modify the connection on the User scope, Helpdesk scope or Password Policies pages, you can select how you want to apply the updated connection settings: only for the specified section, or everywhere this connection is used. If you choose to update settings for the specified section only, a copy of the connection will be created with these settings and will be added to the list of available connections to AD LDS instances.

IMPORTANT: When you modify the connection on the AD LDS Instance Connections tab, the updated settings will be automatically applied everywhere the connection is used.

If you want to remove the connection from the list on the AD LDS Instance Connections tab, you should first remove it from all sections where it is used, and only then remove the connection from the list.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択