지금 지원 담당자와 채팅
지원 담당자와 채팅

Password Manager 5.9.7 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Upgrading Password Manager Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Unregistering users from Password Manager Working with Redistributable Secret Management account Email Templates
Password Policies One Identity Starling Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Glossary

Authenticate with Defender

IMPORTANT:

  • Authenticating with Defender is an activity not supported with the current release of Password Manager ADLDS.
  • Change or Reset password in Active Directory and connected systems is not supported in ADLDS.

You can use this activity to configure Password Manager to use Defender to authenticate users.

Defender is a two-factor authentication solution that authenticates users without forcing them to remember another new password. Defender uses one-time passwords (OTP) generated by special hardware or software tokens. Even if an attacker captures the password, there will be no security violation, since the password is valid only for one-time-use and can never be re-used.

You can use the Defender authentication to authenticate users before resetting their passwords or unlocking their Q&A profiles.

Before configuring the settings in this activity, install and configure Defender as described in the Defender documentation.

IMPORTANT: To make Password Manager use the Defender authentication, you must install the Defender Client SDK on the server on which Password Manager Service is installed.

This activity has the following settings:

  • Defender Server (IP address or DNS name). Specify Defender Server IP address or DNS name.
  • Port number. Type the port number that the Defender Access Node uses to establish a connection with the Defender Server.
  • Server timeout. Specify Defender Server time-out (in minutes).
  • Defender shared secret. Provide the secret that the Defender Access Node will share when it attempts to establish a connection with the Defender Server.

Authenticate with Starling Two-Factor Authentication

Use this activity to configure Password Manager to use Starling Two-Factor Authentication to authenticate users.

You can use Starling Two-Factor Authentication to authenticate users before allowing them to reset or change their passwords, to unlock accounts, or manage Questions and Answers profiles.

Before using Starling Two-Factor Authentication for authentication, users have to configure it on One Identity Starling in General Settings tab on the home page of the Administration site. See One Identity Starling.

For authentication, you have to enter the Starling Two-Factor Authentication OTP that you have received through SMS, phone call or from the Starling 2FA app, or accept the notification received in your phone. To use Starling 2FA app for push notification or to generate OTP, you must install Starling 2FA app on your device and register your phone number.

This activity requires authentication using one of the following options:

  • OTP generated on Starling 2FA app. Open the Starling 2FA app, click the token and copy the OTP. Enter the OTP in the Starling-Two factor token response field,
  • SMS. Click SMS. Enter the OTP received through SMS in the Starling-Two factor token response field.
  • Phone call. Click Phone Call. Enter the OTP received through phone call in the Starling-Two factor token response field.
  • Push notification. Click Push Notification. Accept the notification received in your phone.

Authenticate with RADIUS Two-Factor Authentication

Use this activity to configure Password Manager to use a RADIUS server for two-factor authentication.

It uses one-time passwords (OTP) generated by hardware or software tokens for authentication.

You can use RADIUS Two-Factor Authentication to authenticate users before allowing them to reset or change their passwords, to unlock accounts, or manage Questions and Answers profiles.

Before using RADIUS Two-Factor Authentication for authentication, users have to configure it in General Settings tab on the home page of the Administration site. For more information, see RADIUS Two-Factor Authentication .

Action Activities

This section describes activities that provide core actions of the helpdesk workflows, such as Reset password in AD LDS, Unlock account, etc.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택