Removing Connection to AD LDS Instance
To remove a connection
- On the Administration site, click the General Settings|AD LDS Instance Connections tab.
- On the AD LDS Instance Connections page, select the connection you want to delete and click Remove. Note, to permanently remove the connection, it should be removed from all sections where it is used. The Remove link becomes available only after the connection is removed from all sections where it is used.
Extensibility Features
Extensibility features allow you to customize and extend the Password Manager functionality. The features include the following:
- Custom activities
- Built-in web service
- Custom web services
- Import/export of activities and workflows
- Troubleshooting mode
All these features are available only after you turn the extensibility on.
To turn extensibility features on
- Open the Administration site and click the General Settings tab.
- On the General Settings page, select the Extensibility tab.
- On the Extensibility settings page, click the upper Turn on button.
After you turn the extensibility features on, you can also turn on the troubleshooting mode. When the troubleshooting mode is on, the following additional information is displayed:
- Identifiers of activities and workflows (on the Administration site)
- PowerShell output (on the Self-Service site)
To turn the troubleshooting mode on
- Open the Administration site and click the General Settings tab.
- On the General Settings page, select the Extensibility tab.
- On the Extensibility settings page, click the upper Turn on button.
- Click the Turn on button under the troubleshooting mode.
Extensibility Features Overview
Custom activities are activities whose behavior is defined by a PowerShell script. You can create a custom activity from scratch or convert a built-in activity to a custom one. For more information, see Custom Activities and refer to the Password Manager SDK.
Built-in web service allow a third-party system to access a whole workflow or a specific activity using HTTP and data exchange in XML and JSON formats. You can use the built-in web service to execute a workflow and to interfere in a workflow execution process. For more information refer the Password Manager SDK.
Custom web services allow you to further extend the Password Manager functionality and enable scenarios that cannot be implemented using custom activities and the built-in web service. For example, you can create a custom web service that assigns passcodes to users employing the assign passcode functionality in Password Manager. For more information refer the Password Manager SDK.
Import/export of activities and workflows allows you to copy and share custom activities and workflows. For more information, see Importing and exporting workflows and Importing and Exporting Custom Activities.
The troubleshooting mode provides you additional information about workflows and activities and their execution. When this mode is enabled, on the Administration site you can view identifiers of workflow and activities; you can use these identifiers in PowerShell scripts. On the Self-Service site, you can view the PowerShell output that allows you to troubleshoot the scripts.
RADIUS Two-Factor Authentication
RADIUS Two-Factor Authentication
RADIUS Two-Factor Authentication enables two-factor authentication on Password Manager. RADIUS Two-Factor Authentication uses one-time passwords to authenticate users on the Self-Service site and Helpdesk site.
To configure RADIUS Two-Factor Authentication in Password Manager, you have to configure the RADIUS server details in Password Manager.
To configure RADIUS Two-Factor Authentication:
-
On the home page of the Administration site, click General Settings | RADIUS Two-Factor.
The RADIUS Two-Factor Authentication page is displayed.
-
Click Add RADIUS server to add a new RADIUS server for authentication.
RADIUS Two-Factor Authentication page is displayed.
|
NOTE: You can add only two servers, one is used as a primary server and the other as a secondary server. The server that is created first is considered as the primary server and used for RADIUS authentication. |
-
In the RADIUS Server (IP address or hostname) field, enter the RADIUS server IP address.
-
In the Port number field, enter the port number assigned during configuration of RADIUS.
-
In the RADIUS Shared Secret field, enter the password set during RADIUS configuration.
-
Specify the ADLDS attribute to authenticate the user from the drop-down menu.
-
From the Additional RADIUS Attribute section, select the required RADIUS attribute from the drop-down menu. Specify the value for the selected attribute and click +.
The RADIUS attributes and the corresponding values that you add is displayed.
|
NOTE: The RADIUS attributes supported are NAS-IP-Address, NAS-Port, NAS-Port-Type, and NAS-Identifier. |
- Click Save.