When accessing https://ServiceCluster.democorp.com, I receive an invalid certificate error in my browser.
Because you are not accessing each host by its real host name, you must ensure that the SSL certificate is issued to the common name matching the cluster’s fully qualified domain name, and that the fully qualified domain name is set in the Subject Alternative Names (SAN) field.
When accessing https://ServiceCluster.democorp.com, Kerberos authentication fails.
Because you are accessing all servers in this cluster with the same fully qualified domain name, Kerberos authentication will fail. If you have NT Lan Manager disabled as fallback, authentication will not work.
 
    
Installing the Password Capture Agent with MSIEXEC 
 
The Password Capture Agent setup can be automated using MSIEXEC parameters.
NOTE: MSIEXEC does not recognize 0 to clear check boxes; instead, for example, use PROP_FINAL_FUNCTION_TEST="".
 
Parameters for MSIEXEC
PROP_WEBSERVICE 
Values: URL of the web service
Configuration after setup: Registry value Service\WebService_URL
  
PROP_CERTIFICATE 
Values: One Identity Manager password encryption certificate
Configuration after setup: Registry value Service\CertificateThumbprint
  
PROP_ENCRYPTED_PASSWORD_TRANSMISSION 
Values: 0 | 1
Default: 1
Configuration after setup: Registry value Service\EncryptedPasswordTransmission
  
PROP_ENCRYPTED_PASSWORD_TRANSMISSION_SIGNING
Values: 0 | 1
Default: 1
Configuration after setup: Registry value Service\EncryptedPasswordTransmissionSigning
  
PROP_WEB_SERVICE_TYPE 
It is strongly recommended you use the One Identity Manager application server (REST). The One Identity ManagerSOAP Web Service support (Soap) is only included for backward compatibility to One Identity Manager version 6.x and should not be used anymore.
Values: REST | Soap
Configuration after setup: Set-ServiceConfig.exe WebServiceType
  
PROP_LOGGING_SUCCESSFUL_OPERATIONS 
Values: 0 | 1
Default: 0
Configuration after setup: Registry value Driver\LoggingSuccessfulOperations
  
PROP_IGNORE_PASSWORD_RESET_OPERATIONS 
Values: 0 | 1
Default: 0
Configuration after setup: Registry value Driver\Ignoring\PasswordResetOperations
  
PROP_BACKEND_CLIENT_CREDENTIAL_TYPE 
Values: DialogUser | WebADS | ADSAccount
Default: DialogUser
Configuration after setup: Set-ServiceConfig.exe BackendClientCredentialType
  
PROP_BACKEND_CLIENT_CREDENTIAL_USER_NAME 
Default: viCaptureAgent
Configuration after setup: Set-ServiceConfig.exe BackendClientCredentialUserName
  
PROP_BACKEND_CLIENT_CREDENTIAL_USER_PWD
Configuration after setup: Set-ServiceConfig.exe BackendClientCredentialUserPwd
  
PROP_BACKEND_CLIENT_CREDENTIAL_USER_PWD_ACCEPT_EMPTY 
Values: 0 | 1
Default: 0
Configuration after setup: Set-ServiceConfig.exe BackendClientCredentialUserPwd_AcceptEmpty
  
PROP_WEB_SERVICE_CLIENT_SKIP_HTTPS_VALIDATION 
Values: 0 | 1
Default: 0
Configuration after setup: Set-ServiceConfig.exe WebServiceClientSkipHttpsValidation
  
PROP_WEB_SERVICE_CLIENT_CREDENTIAL_TYPE 
Values: WindowsIntegrated | Certificate 
Default: WindowsIntegrated
Configuration after setup: Set-ServiceConfig.exe WebServiceClientCredentialType
  
PROP_WEB_SERVICE_CLIENT_CREDENTIAL_CERTIFICATE_FIND_BY_TYPE 
Values: All values of the X509FindType-enumeration are allowed.
Default: FindByThumbprint
Configuration after setup: Set-ServiceConfig.Exe WebServiceClientCredentialCertificateFindByType
  
PROP_WEB_SERVICE_CLIENT_CREDENTIAL_CERTIFICATE 
Configuration after setup: Set-ServiceConfig.Exe WebServiceClientCredentialCertificate
  
PROP_FINAL_FUNCTION_TEST 
Only used by setup to determine whether final function test should be run. Failure will cause setup to fail.
Values: 0 | 1 
Default: 1
Configuration after setup: Only used by setup.
  
Example 1: Silent install with default settings
msiexec.exe /i "<SETUP_MSI_FILE>" /quiet /norestart /L "<LOGFILE>"
 
Example 2: Silent install with parameters
msiexec.exe /i "<SETUP_MSI_FILE>" /quiet /norestart PROP_WEBSERVICE="<WEBSERVICE_URL>" PROP_WEB_SERVICE_TYPE="<WEBSERVICE_TYPE>" PROP_CERTIFICATE="<CERTIFICATE_THUMBPRINT>" PROP_ENCRYPTED_PASSWORD_TRANSMISSION="1" PROP_ENCRYPTED_PASSWORD_TRANSMISSION_SIGNING="1" PROP_BACKEND_CLIENT_CREDENTIAL_USER_NAME="<One Identity Manager system user>" PROP_BACKEND_CLIENT_CREDENTIAL_USER_PWD="<System user password>" PROP_FINAL_FUNCTION_TEST="1" PROP_IGNORE_PASSWORD_RESET_OPERATIONS="" /L "<LOGFILE>"
 
Example 3: Interactive installation
msiexec.exe /i "<SETUP_MSI_FILE>" /norestart PROP_WEBSERVICE="<WEBSERVICE_URL>" PROP_WEB_SERVICE_TYPE="<WEBSERVICE_TYPE>" PROP_CERTIFICATE="<CERTIFICATE_THUMBPRINT>" PROP_ENCRYPTED_PASSWORD_TRANSMISSION="1" PROP_ENCRYPTED_PASSWORD_TRANSMISSION_SIGNING="1" PROP_BACKEND_CLIENT_CREDENTIAL_TYPE="DialogUser" PROP_BACKEND_CLIENT_CREDENTIAL_USER_NAME="<One Identity Manager system user>" PROP_BACKEND_CLIENT_CREDENTIAL_USER_PWD="<System user password>" PROP_FINAL_FUNCTION_TEST="1" PROP_IGNORE_PASSWORD_RESET_OPERATIONS="" /L "<LOGFILE>"
 
Example 4: Uninstall
msiexec.exe /X{E7D3E2C0-0BD9-4EBB-A70C-E835D575611B} /quiet /norestart /L "<LOGFILE>"
 
Related topics
 
    
Certificate lookup options 
 
Because certificates have a limited lifetime and therefore need to be renewed or updated, Password Capture Agent service has the option to configure the search for valid certificates. Note that not all configurable FindByTypes may be suitable for your needs. 
Example: Use certificate from local trusted root certificate authority (Active Directory Certificate Services)
All certificates issued by DEMOCORP DEMO ROOT CA are valid for this purpose. Automatic enrollment is used to distribute the certificates, and new certificates will automatically be generated before expiration.
- OR-
- 
WebServiceClientCredentialCertificateFindByType = FindByIssuerDistinguishedName 
- 
WebServiceClientCredentialCertificate = "CN=DEMOCORP DEMO ROOT CA, DC=Democorp, DC=com" 
 
Example: Use certificate based on subject
All certificates with the subject demoadmn are valid for this purpose.
- OR- 
- 
WebServiceClientCredentialCertificateFindByType = FindBySubjectDistinguishedName 
- 
WebServiceClientCredentialCertificate = "CN=demoadmn, CN=Users, DC=Democorp, DC=com" 
 
Example: Use static certificate by thumbprint and change manually when new certificate is available
  
    
There are several known error codes that the VI_CaptureAgent_SetPassword script can use to reject a password change. The script is stored in the One Identity Manager database. If that script does not suit your needs, you can overwrite it.
Following is the list of possible errors and appropriate actions that are returned by the VI_CaptureAgent_SetPassword script.
Table 2: Errors and appropriate actions
| 0  | No Error. Change went through.  | OK  |  | 
| 1  | Password cycle detected.  | Skip  | Check manual for password cycles.  | 
| 2 | ADS Account is marked as privileged and will not be handled.  | Skip |   | 
| 1212  | ADS Account has no domain.  | Skip |   | 
| 1317  | ADS Account is not known by One Identity Manager.  | Skip | Check if your Active Directory domain has been configured to be synchronized regularly within One Identity Manager.  | 
| 1332 | ADS Account exists but is not mapped to a Person in One Identity Manager.  | Skip | Check One Identity Manager configuration; you should not have Active Directory user accounts without mapped employees.  | 
| 1355  | ADS Domain is not known by One Identity Manager.  | Skip | Check if your Active Directory domain has been configured to be synchronized within One Identity Manager.  | 
| 9901  | More than one ADS Account found in One Identity Manager database matching DOMAIN\SAMAccountName.  | Skip | Check for duplicate entries in table ADSAccount within One Identity Manager.  | 
| 9902  | Failed to load Person mapped to ADS Account from One Identity Manager database.  | Skip | Check One Identity Manager for problems; try loading that employee within the Object Browser.  | 
| 8205  | Password encryption does not match the configuration in One Identity Manager.  | Skip  | Compare configuration of One Identity Manager and Password Capture Agent.  |