Chat now with support
Chat with Support

Password Manager 5.14.2 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Adding or cloning a new Management Policy Configuring Access to the Administration Site Configuring Access to the Password Manager Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Password Manager Self-Service Site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Customizing help link URL Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Third-party contributions Glossary

User Properties Rule

The user properties rule rejects passwords that contain part of a user account property value.

This rule splits the user account property value by non-alphanumeric characters (for example, “_”), and then checks if any part of the value is available in the password. For example, if user’s name is “Peter_US”, Password Manager splits the property into: “Peter” and “US”, and checks if any part can be found in the password. For example, the password “US_US” will be rejected.

To configure the user properties rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click User Properties Rule to expand the rule settings.

  3. Under User Properties Rule, select the Prevent users from using account properties as part of passwords check box, and then specify the following options:

Table 20: User properties rule

Option

Description

Initial characters of a user property value

Set the maximum number of initial characters from a user property value that users are allowed to use as part of their passwords.

For example, if a user's full name is “Anna Fairweather”, and the option value is set to 3, then the user is allowed to type the strings “Ann” and “Fai” as part of her password. The password will be rejected if it contains “Anna” or “Fair”.

You can select from the following user account properties:

  • displayNamePrintable

  • mailNickname

  • userPrincipalName

  • displayName

  • title

  • sn

  • samAccountName

  • personalTitle

  • middleName

  • mail

  • givenName

  • employeeID

  • cn

NOTE: The administrator can add other user attributes to the existing list of attributes and select to use. Click Add other attribute to the list to add other user attributes.

The entire value of a user property

Select to reject passwords containing the entire value of a user property.

You can select any of the user account properties listed in the description of the Initial characters of a user property value option above.

Case sensitive

Select this check box to require case sensitivity for this rule.

Enable bi-directional analysis

Select to reject passwords containing the entire value of a user property or its part (depending on which of the two previous options you have selected), if read backwards.

Symmetry Rule

The symmetry rule ensures that a password or its part does not read the same in both directions.

For example, if you enable the Reject passwords that read the same in both directions option, then the password “redivider” will be rejected.

To configure the symmetry rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click Symmetry Rule to expand the rule settings.

  3. Under Symmetry Rule, select the Password must comply with symmetry criteria check box, and then specify the following options:

Table 21: Symmetry criteria

Option

Description

Reject passwords that read the same in both directions (pass8ssap)

Select to reject passwords that are palindromes.

Maximum number of initial characters that match ending characters of password if read backwards (pas47sap)

Specify the number of initial characters matching the ending characters of password, if read backwards, which the policy will tolerate before rejecting a password.

Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word)

Specify the number of password characters in a row that read the same in both directions, which the policy will tolerate before rejecting a password.

Case sensitive

Select to define this rule as case sensitive.

Custom Rule

You can use this rule to create your own password policy message to be displayed on the Self-Service Site when users change or reset their passwords. For example, use this rule to enter the settings of the local or domain password policy applied to the server on which AD LDS is running.

If you want to hide all other policy messages and display your custom message to users, enable this policy rule, enter the message text, and select the Hide messages from other policy rules and display only this message check box. If you do not select this check box, messages from all enabled policy rules will be displayed.

Note, that this rule does not check the password compliance with the configured password policy. Configure this rule to display your custom message instead of or together with other policy messages when users change or reset passwords on the Self-Service Site.

To configure the custom rule

  1. Follow the steps outlined in Configuring Password Policy Rules.

  2. On the Policy Rules tab, click Custom Rule to expand the rule settings.

  3. Under Custom Rule, select the Enable check box to enable this rule.

  4. Select the Hide messages from other policy rules and display only this message check box if you want users to see only the custom password rule message and hide all other password policy messages.

  5. In the text box, enter the rule message in the default language (English). To enter the message in other languages, click the Add new language link, select the language, specify the message and click OK.

    NOTE: Only languages of the user interface of the Self-Service Site are available in the list

Deleting a Password Policy

In Password Manager, you can delete password policies after creating them.

For more information on password policies, see About Password Policies.

To delete a password policy

  1. On the home page of the Administration Site, click the Password Policies tab.

  2. Click the One Identity Password Policies link under the AD LDS instance that you want to manage.

  3. Click Remove under the policy that you want to delete.

    NOTE: When you delete a password policy, the deleted policy is no longer valid for an AD LDS instance. To restore a deleted password policy, create a new policy and manually configure its settings as required.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating