지금 지원 담당자와 채팅
지원 담당자와 채팅

Password Manager 5.9.5 - Administration Guide (AD LDS edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow Overview Custom Workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings Password Policies One Identity Hybrid Subscription One Identity Starling Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Glossary

Email Templates

Password Manager provides option to set the default template for confirmation e-mail. To send an auto generated email to user if workflow succeeds or fails, configure the email template from the General Settings tab for authentication.

To configure default e-mail template:

  1. On the home page of the Administration site, click General Settings, and then click the Email Template tab.

  2. Select the desired language from the Select language to customize template drop down menu, to customize the email template.

  3. Click the + sign before the desired workflow to edit the template. Edit the subject and body of the notification template in the default language as required. When editing the notification template, you can use the parameters available in the notification editor, for example #USER_ACCOUNT_NAME#, #WORKFLOW_RESULT#, and others.

  4. In the Message format box, select the format to use for the notifications. You can select from two options: either HTML or Plain text.

  5. Select the default language from the Select default language for email drop down menu, to select the default email template to send to the user.

  6. In the User notification settings, select one of the following options for user notification subscription:

    • Subscribe users to this notification. Allow users to unsubscribe.
    • Subscribe users to this notification. Do not allow users to unsubscribe.
    • Do not subscribe users to this notification. Allow users to subscribe to this notification.
  7. Click Save, to save the settings

Password Policies

About Password Policies

By default, an AD LDS instance applies existing local or domain password policies. If a server on which AD LDS is installed belongs to a workgroup, the server’s local password policy settings and account lockout settings are enforced. If the server on which AD LDS is running belongs to a domain, the password policy settings and account lockout settings from the domain are enforced.

You can use Password Manager to create additional password policies that define which passwords to reject or accept. For each policy, you can configure a number rules, for example, a password age rule, complexity and length rules, custom rule, and others. It is recommended to use the custom rule to display the settings of the local or domain password policy applied to the server on which AD LDS is running. For more information, see Custom Rule.

Password policy settings are stored in Group Policy objects (GPOs). A GPO is applied to a target organizational unit. Group Policy objects from parent containers are inherited by default. When multiple Group Policy objects are applied, the policy settings are aggregated. For information on how to apply a password policy and change the policy priority, see Managing Password Policy Scope.

Creating a Password Policy

To create a password policy, you need add a connection to the AD LDS instance to which this policy will be applied.

The account you use to access the AD LDS instance for which you want to create password policies should have the following permissions:

  • The Read permission for attributes of the groupPolicyContainer objects.
  • The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.
  • The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.
  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.
  • The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.

To connect to AD LDS instance

  1. On the home page of the Administration site, click the Password Policies tab.
  2. Click Connect to AD LDS instance to add an instance for which you want to create password policies.
  3. If connections already exist, select a connection from the list. If you want to create a new connection, click Add new connection.
  4. If you selected to create the new connection, in the Connect to AD LDS Instance dialog, configure the following options:
    • In the Server name on which AD LDS instance is installed text box, type the name of the server to which you want to connect.
    • In the Port number (LDAP or SSL) text box, enter the port number that you specified when installing the AD LDS instance. If you select the Use SSL check box, enter the SSL port number; otherwise, LDAP port number. It is recommended to use SSL in your production environment.
    • In the Application directory partition text box, enter the name of the application directory partition from the AD LDS instance to which you want to connect.
    • In the Application directory partition alias text box, type the alias for the application directory partition which will be used to address the partition on the Self-Service site.
    • In the Access account section, select Password Manager Service account to have Password Manager access the AD LDS instance using the Password Manager Service account, otherwise, select The following Active Directory account or The following AD LDS account radio button and enter the required user name and password.
  5. Click Save.

For more information on modifying settings for the connection, see AD LDS Instance Connections.

To create a password policy

  1. On the home page of the Administration site, click the Password Policies tab.
  2. Click the <N> One Identity Password Policies or One Identity Password Policies are not configured link under the application directory partition that you want to manage.
  3. On the One Identity Password Policies for <application directory partition> page, click the Add a policy button or Add new password policy link.
  4. In the Add New Policy dialog box, type a name for the new policy and click Save.

To configure settings for a password policy

  1. On the home page of the Administration site, click the Password Policies tab.
  2. Click the <N> One Identity Password Policies link under the application directory partition that you want to manage.
  3. On the One Identity Password Policies for <application directory partition> page, click Edit under the policy whose properties you want to view or modify.
  4. On the Policy Settings tab of the Password Policy Properties dialog box, view or modify the following options, and then click Save:
Table 17: Password Policy Properties

Option

Description

Disable this policy

Select this check box to temporarily turn off the policy.

Policy name

View or modify the name of the password policy.

  1. Click the Policy Rules tab to configure the password policy rules by using the procedure outlined in Configuring Password Policy Rules, and then click Save.
  2. Click the Policy Scope tab to manage the password policy links by using the procedure outlined in Managing Password Policy Scope, and then click Save.
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택