Converse agora com nosso suporte
Chat com o suporte

Password Manager 5.10.1 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies One Identity Starling Reporting Password Manager Integration Appendixes Glossary

Password Manager permission checker

The Password Manager permission checker is a script used to check the user permissions and privileges. The basic permissions for a user includes the local system permissions and the Active Directory read, write, and delete permissions. Using the permission checker script, you can evaluate the local and Active Directory permissions for the domain account to check if sufficient permissions are available to the Password manager with all privileges.

IMPORTANT:

  • Active Directory module for Windows PowerShell version 5.0 or later must be installed to run the tool. You can download relevant dependent script modules from the PowerShell Gallery, if not available before executing the permission checks.

  • Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 operating systems are supported.

Configuring Password Manager permission checker

  1. Login to the server by providing the domain account credentials where the Password Manager is to be installed.

  2. From the installation folder, <Password Manager\Setup\Tools\Permission Checker>, copy the Permission Checker folder and paste it on to the server.

  3. Update the Configuration.xml file with the required domain objects information that needs to be validated from the tool.

    The permissions associated with the user account is displayed. The PermissionChecker.log file available at the same location where the tool is placed and it contains the same permission report displayed in the script console.

IMPORTANT: If the data in the Configration.xml is not specified or incorrect, permis-sion checks are ignored for those sections. After this, the Permission check Warning Summary Report is displayed that is part of the tool which specifies the reasons for the domain account which doesn't have sufficient privileges.

Working with Power BI templates

Microsoft Power BI is an analytics service that is used to visualize large data with business intelligence. You can generate multiple interactive reports and customize dashboards with data insights and plot them on graphs to simplify data visualization.

IMPORTANT: The existing reporting in Password Manager is retained for the current release, after which it will be deprecated and replaced by Power BI reporting service.

The predefined Password Manager PowerBI template is available in Password Manager\Setup\Template\PowerBI Template of the installation CD. You can extend the functionality by exporting the predefined template using the PowerBI Desktop software. The template provides the following reports by default:

  • User Status

  • Actions by Users

  • Actions by Number of Users

  • Users actions by Month

  • Email Notification by Type and User

  • Helpdesk usage by Actions

  • Helpdesk usage by Operators

  • Helpdesk usage by Users

  • Registration by Month

To import the predefined PowerBI template

  1. Download and install the Power BI Desktop software from the Microsoft Download Center.

  2. Provide the credentials to login to the Power BI Desktop software.

  3. Navigate to File | Import | Power BI template.

  4. Select the predefined Power BI template and click Open.

    The SQL Server database window is displayed.

  5. The PowerBI Desktop initiates the process to connect to the database from which the template is created. Click Cancel.

  6. The Refresh window is displayed. Click Cancel.

  7. Navigate to the Data Source settings in the Power BI Desktop.

    The Data source settings window is displayed.

  8. Click Change Source.

  9. Provide the SQL Server name in the Server field and the Database name in the Database field.

  10. Click OK.

  11. Click Apply changes in the warning message to apply the latest changes.

    The Power BI Desktop is connected to the database and all the updates are displayed.

Alternative option

As an alternative to generating reports using predefined Power BI templates, you can use the Reporting feature. For more information, see Reporting and User Action History Overview section.

Password Manager Credential Checker

The Password Manager Credential Checker is based on PowerShell scripts used to check if the user’s password is compromised. Credential Checker deals with actions related to change in password in Active Directory, reset password in Active Directory, change password in Active Directory and connected systems, or reset password in Active Directory and connected systems. By default, the Credential Checker PowerShell script implements VeriClouds CredVerify functionality for leaked password with hash segment.

IMPORTANT: If you prefer to use other credential checker service, modify the Credential Checker PowerShell script appropraitely.

Configuring Password Manager credential checker

  1. After the Password Manager is installed, on the Password Manager Administrator portal, go to General settings | Extensibility and select Turn the credential checker mode on or off to enable the feature.

  2. On the Password Manager installation path, open the compromised_password_checker script. It is available in the <installation location\One Identity\Password Manager\Service\Resources\CredentialChecker> location.
  3. Edit the script to provide the Vericlouds credentials:

    $url=<valid URL>

    $api_key=<valid Key>

    $api_secret=<valid api secret>

  4. Save the file.

When you enter a new password on the Self-Service site using any of the workflows, such as, Forgot Password or Manage My Passwords, the Credential Checker validates the new password and check if it matches with the passwords listed in the VeriClouds. If the password matches, Provided password is compromised, type another password. If you've ever used it anywhere before, change it! is displayed.

This feature is not applicable if the user changes the password using CTRL+ALT+DELETE on the Windows logon screen.

Typical Deployment Scenarios

This section describes typical deployment scenarios for Password Manager, including scenarios with installation of the Self-Service and Helpdesk sites on standalone servers, using realms, and others.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação