Converse agora com nosso suporte
Chat com o suporte

Password Manager 5.12 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable S2FA for Administrators & Enable S2FA for HelpDesk Users Reporting Password Manager Integration Appendixes Glossary

Removing a Domain Connection

To remove a domain connection

  1. On the Administration site, click the General Settings|Domain Connections tab.
  2. On the Domain Connections page, select the domain connection you want to delete and click Remove. Note, to permanently remove the domain connection, it should be removed from all sections where it is used. The Remove link becomes available only after the connection is removed from all sections where it is used.

Extensibility Features

Extensibility features allow you to customize and extend the Password Manager functionality. The features include the following:

  • Custom activities
  • Built-in web service
  • Custom web services
  • Import/export of activities and workflows
  • Troubleshooting mode

All these features are available only after you turn the extensibility on.

To turn extensibility features on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.

After you turn the extensibility features on, you can also turn on the troubleshooting mode. When the troubleshooting mode is on, the following additional information is displayed:

  • Identifiers of activities and workflows (on the Administration site)
  • PowerShell output (on the Self-Service site)

To turn the troubleshooting mode on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.
  4. Click the Turn on button under the troubleshooting mode.

Extensibility Features Overview

Custom activities are activities whose behavior is defined by a PowerShell script. You can create a custom activity from scratch or convert a built-in activity to a custom one. For more information, see Custom activities and refer to the Password Manager SDK.

The built-in web service allows a third-party system to access a whole workflow or a specific activity using HTTP and data exchange in XML and JSON formats. You can use the built-in web service to run a workflow and to interfere in a workflow running process. For more information, see the Password Manager SDK. For experimenting with the built-in web service, a Swagger UI is provided. For more information on how to use Swagger UI, see https://swagger.io/tools/swagger-ui/.

NOTE: The extensibility features are only supported by One Identity Professional Services, and are not covered by One Identity Technical Support.

Custom web services allow you to further extend the Password Manager functionality and enable scenarios that cannot be implemented with custom activities and the built-in web service. For example, you can create a custom web service that assigns passcodes to users employing the assign passcode functionality in Password Manager. For more information, see the Password Manager SDK.

Import/export of activities and workflows allows you to copy and share custom activities and workflows. For more information, see Importing and exporting workflows and Importing and exporting custom activities.

The troubleshooting mode provides you additional information about workflows and activities and their execution. When this mode is enabled, on the Administration site you can view identifiers of workflow and activities; you can use these identifiers in PowerShell scripts. On the Self-Service site, you can view the PowerShell output that allows you to troubleshoot the scripts.

RADIUS Two-Factor Authentication

RADIUS Two-Factor Authentication enables two-factor authentication on Password Manager. RADIUS Two-Factor Authentication uses one-time passwords to authenticate users on the Self-Service site and Helpdesk site.

To configure RADIUS Two-Factor Authentication in Password Manager, you have to configure the RADIUS server details in Password Manager.

To configure RADIUS Two-Factor Authentication

  1. On the home page of the Administration site, click General Settings | RADIUS Two-Factor.

    The RADIUS Two-Factor Authentication page is displayed.

  2. Click Add RADIUS server to add a new RADIUS server for authentication.

    RADIUS Two-Factor Authentication page is displayed.

    NOTE: You can add only two servers, one is used as a primary server and the other as a secondary server. The server that is created first is considered as the primary server and used for RADIUS authentication.
  3. In the RADIUS Server (IP address or hostname) field, enter the RADIUS server IP address.

  4. In the Port number field, enter the port number assigned during configuration of RADIUS.

  5. In the RADIUS Shared Secret field, enter the password set during RADIUS configuration.

  6. Specify the Active Directory attribute to authenticate the user from the drop-down menu.

  7. From the Additional RADIUS Attribute section, select the required RADIUS attribute from the drop-down menu. Specify the value for the selected attribute and click +.

    The RADIUS attributes and the corresponding values that you add is displayed.

    NOTE: The RADIUS attributes supported are NAS-IP-Address, NAS-Port, NAS-Port-Type, and NAS-Identifier.
  8. Click Save.

For more information, see Authenticate with RADIUS Two-Factor Authentication.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação