지금 지원 담당자와 채팅
지원 담당자와 채팅

Password Manager 5.12.1 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Password Policies Enable S2FA for Administrators and Enable S2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Open Communication Ports for Password Manager for AD LDS Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Glossary

Step 1: Obtain and Install Custom Certificates From a TrustedWindows-Based Certification Authority

Step 1: Obtain and Install Custom Certificates From a Trusted
Windows-Based Certification Authority

You must obtain two certificates from a trusted Windows-based certification authority: one for the computer running the Password Manager Service (server computer) and another for computers running the Self-Service or Helpdesk site (client computers).

When obtaining certificates, make sure that:

  • The server computer can be accessed from the client computers by using the server certificate CN.
  • Both is selected as a key usage in a certificate request.
  • Enable strong private key protection option is NOT selected in a certificate request.

The following is a sample procedure describing how to obtain a certificate through the Windows 2012 Certificate Services Web interface.

To request a certificate using Windows 2012 Certificate Services Web Interface

  1. Use a browser to open https://servername/certsrv, where servername refers to the name of the web server running Windows Server 2012 where the certification authority that you want to access is located.
  2. On the Welcome page, click Request a certificate.
  3. On the Request a Certificate page, click advanced certificate request.
  4. On the Advanced Certificate Request page, click Create and submit a certificate request to this CA.
  5. Provide identification information as required. In the Name text box, enter the name of the server for which you are requesting a certificate.
  6. In Type of Certificate Needed, select Server Authentication Certificate.
  7. In Key Options, select Create new key set, and specify the following options:
    • In CSP (Cryptographic service provider), select Microsoft Enhanced RSA and AES Cryptographic Provider.
    • In Key Usage, click Both.
    • In Key Size, set 1024 or more.
    • Select Automatic key container name.
    • Select the Mark keys as exportable check box.
    • Clear the Enable strong private key protection check box.
  8. In Additional Options, specify the following:
  • In Request Format, select CMC.
  • In Hash Algorithm, select sha256.
  • Do not select the Save request check box.
  • Specify attributes if necessary and a friendly name for your request.
  1. Click Submit.
  2. If you see the Certificate Issued Web page, click Install this certificate. If your request needs to be approved by your administrator first, wait for the approval and then go to the https://servername/certsrv, click View the status of a pending certificate request, and then install the issued certificate.

Step 2: Provide Certificate Issued for Server Computer toPassword Manager Service

Step 2: Provide Certificate Issued for Server Computer to
Password Manager Service

In this step, you provide the certificate issued for the server computer to the Password Manager Service by using the Administration site.

To provide the certificate to the Password Manager Service

  1. Open the Administration site by entering the following address: http(s)://<ComputerName>/PMAdminADLDS, where <ComputerName> is the name of the computer on which Password Manager is installed.
  2. Click General Settings|Instance Reinitialization. Under the Service connection settings, select the custom certificate issued for the server computer from the Certificate name drop-down list.
  3. Click Save.

Step 3: Provide Certificate Issued for Client Computers toSelf-Service and Helpdesk Sites

Step 3: Provide Certificate Issued for Client Computers to
Legacy Self-Service, Password Manager Self-Service, and Helpdesk Sites

In this step, you provide the certificate issued for the client computers to the Self-Service and Helpdesk sites installed separately from the Password Manager Service.

To provide the certificate to the Legacy Self-Service Site and Password Manager Self-Service site

  1. Open the Self-Service site by entering the following address: http(s)://<ComputerName>/PMUserADLDS, where <ComputerName> is the name of the computer on which Self-Service site is installed. The Self-Service Site Initialization page will be displayed automatically if the Self-Service site is opened for the first time.
  2. From the Certificate name drop-down list, select the custom certificate issued for the client computer.
  3. Click Save.

To provide the certificate to the Helpdesk Site

  1. Open the Helpdesk site by entering the following address: http(s)://<ComputerName>/PMHelpdeskADLDS, where <ComputerName> is the name of the computer on which Helpdesk site is installed. The Helpdesk Site Initialization page will be displayed automatically if the Helpdesk site is opened for the first time.
  2. From the Certificate name drop-down list, select the custom certificate issued for the client computer.
  3. Click Save.

Upgrading Password Manager

Upgrading Password Manager

This section briefs about the process to upgrade Password Manager to the latest version (5.12.1).

NOTE:

  • It is recommended to back up the current configuration by exporting the settings from 5.7.1 or later versions. For more information, see To export configuration settings from Password Manager for AD LDS 5.7.1 or later versions to 5.12.1.
  • Running the Migration Wizard is not required while upgrading from Password Manager 5.7.1 or later versions to 5.12.1.
  • If you want to upgrade to 5.12.1, it is recommended to reinstall the license file from the Administration site once the upgrade is complete. Before installing the license, delete the existing SoftLicense binary value from [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Quest Software] registry key.

  • Any workflows that are customized in the previous versions of Password Manager should be manually merged with the workflow of the latest version of the Password Manager to avoid any end user data corruption.

    For example, changes made to the Register workflow (Self-Service workflows) such as addition/update of any authentication steps to the default configuration, should be manually recreated after upgrade to PM 5.12.1.

  • To update storage files with new encryption mechanism, all realm instances must be updated with the Password Manager 5.12.1 configuration and must have the same encryption key.

    To perform the same, login to PMAdmin site from the primary server, Navigate to General Settings > Import/Export > Export. Copy and Save the password securely. Import this configuration data in all the PM secondary replication instances by selecting the exported configuration data and providing the password.

  • If the secondary instances are not updated with new configuration, a notification will be displayed in Administration site as 'Import configuration settings from primary instance”.

    In the replication instances, Navigate to General Settings > Import/Export > Import, select the exported data from the primary server and input the password saved.

  • Shared.storage file will be encrypted and copied to Active Directory only when all replication instances are updated with Password Manager 5.12.1 configuration and encryption key.

  • When all the realm instances are updated with Password Manager 5.12.1, Q&A profiles of users will be updated with new encryption key when one of the following is performed:

    • User updates Q&A profile

    • Run Migration wizard to update all the user profiles automatically

 

This section consists of the following topics:

 

To export configuration settings from Password Manager for AD LDS 5.7.1 or later versions to 5.12.1

  1. Connect to the Administration site by typing the Administration site URL in the address bar of your Web browser. By default, the URL is http://<ComputerName>/PMAdminADLDS/.

    NOTE: When prompted to log in, provide your domain user name in a domainname\username format.

  2. On the left pane, click General > Settings, and click the Import/Export tab and select the Export configuration settings option, and then click Export.

After you have exported configuration settings from Password Manager 5.12.1 or later versions, you can uninstall it.

To uninstall Password Manager for AD LDS 5.7.1 or later versions

  1. Click Start, click Run, type appwiz.cpl, and then press ENTER.
  2. Select One Identity Password Manager for AD LDS x86/x64 in the list, and then click Uninstall.

After you uninstall Password Manager 5.7.1 or later versions, install Password Manager 5.12.1 on the same computer. All configuration settings will be automatically detected by the new version.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택