• |
A wide range of authentication methods is supported. To add more authentication methods to the list, please contact your Quest Software representative. |
• |
The Session authentication method works only with Active Directory. |
• |
For smart card authentication methods (as Cryptoflex smart card, CyberFlex PKCS#11 or Rainbow iKey3000 for example), you can assign a specific configuration using the Select Configuration button. These configurations are defined in the Smart Card panel. For more details, see Section 8.11, "Managing Smart Card Configuration Profiles". |
• |
The Biometrics Store-On-Server and Biometrics Store-On-PC methods cannot be used simultaneously. You must only select one of them. For more information on available biometric methods, see section 11., "Managing Biometric Enrolment". |
• |
The RFID authentication method can be configured in the RFID panel: see section 10., "Managing RFID Tokens" for more details. |
• |
SSOWatch module supports only one activated OTP authentication method at a time. For more information, see Quest ESSO Installation Guide. |
Click the |
• |
In "no-access-point-management" mode, a user can open a Quest ESSO session on an access point of his/her domain only if the Allow on all access points field is selected. |
• |
To interconnect Quest ESSO with Web Access Manager (WAM). |
In Smart Card Logon mode, if the Windows password is not yet stored as an SSO account, of if a bad password is detected by SSOWatch module of Quest ESSO upon the SSO process, SSOWatch module of Quest ESSO requests the user to re-authenticate with his/her smart card and asks for his/her primary password.
|
• |
User, administrators and external key: allows an external application to decipher the user's SSO primary account using a public key. For example, you must select this entry if you want to use Quest ESSO with WAM. By selecting this entry, you allow WAM to decipher the Quest ESSO SSO primary account of the user so that it can perform SSO with this account. |
• |
Quest ESSO must be configured in "manage-access-point" mode. |
• |
A Quest ESSO Controller must be available. |
As Double-Login Prevention information is stored in the directory, the directory architecture and replication time (in case several servers are replicated) must be taken into account. The Double-Login Prevention feature can only work if the time it takes for the user to change computer is longer than the time it takes to replicate data between all directory servers.
If replication time is too long, you can configure Quest ESSO Controllers to make them use a list of directory servers according to their availability. As Double-Login Prevention information is stored in the directory, the directory architecture and replication time (in case several servers are replicated) must be taken into account. The Double-Login Prevention feature can only work if the time it takes for the user to change computer is longer than the time it takes to replicate data between all directory servers.
If replication time is too long, you can configure Quest ESSO Controllers to make them use a list of directory servers according to their availability. |
• |
User authentication area |
Allows the user to manually change his/her primary password (whatever the authentication method used) every "n" days using the default password format control policy (PFCP) displayed in the User PFCP field.
Note: In Smart Card Logon mode, the Windows password is changed automatically every "n" days when SSOWatch module of Quest ESSO starts.
Note: If you also select the Change password on token every<n> days check box, the present option is disabled for users whose authentication method does not require to provide the primary password (smart cards, biometrics). | |||||
The default password format control policy (PFCP) is selected by default. This PFCP applies when the user types his/her password.
Click the Note: Click the | |||||
Select this check box to enable the automatic change of the smart card or USB token password every <n> days. This operation has no consequence on the user authentication tasks (the user still uses his/her PIN to authenticate).
If the automatic password change policy detects expiration date of the password when the user authenticates offline, the automatic password change is not performed (it is performed upon the next authentication in connected mode of the user).
You can force the user to re-authenticate when the directory is available again in the opened session, so that the directory password can be automatically changed. For this, set the following registry key to 1: "AutoPwdChangeMandatory" (DWORD), which is located in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Enatel\WiseGuard\Framework\Authentication.
Note: This option is unavailable if the Change password on token every <n> days check box is cleared. | |||||
The default password format control policy (PFCP) is selected by default. This PFCP applies when password change is performed automatically, without user intervention (e.g.: the password is stored on smart card and changes every x days).
Click the Note: Click the | |||||
Select this check box to allow users to ask for their password to be sent by email through the Self Service Admin Portal. The list of passwords sent to the user is controlled by the option set on the application. For more information, see Section 6.1.3.2, "Defining Account Properties".
| |||||
If you change the duration time parameter once the roaming session has started, the new value will only be taken into account once the session in progress has expired, or has been deleted by the user (from Advanced Login) or in by the administrator from Quest ESSO Console (see Section 6.2.2.2, "Displaying User Authentication Information and Administering Roaming Sessions").
|
• |
Single sign On (SSO) area |
Defines the time of inactivity of SSOWatch module of Quest ESSO before its state switches to locked.
Note: The "0" value means infinite time: SSOWatch module of Quest ESSO never locks. | |
Allows you to define if the users associated with this user security profile can pause, refresh, stop and restart SSOWatch module of Quest ESSO. | |
When SSOWatch module of Quest ESSO is started, this check box allows you to define if the SSOWatch desktop can be opened on the application launcher. | |
Allow Enterprise Studio | |
Allows you to define if the users associated with this user security profile can select different roles in SSOWatch module of Quest ESSO. | |
Enter a user hierarchy level (0 is the lowest level, and 50000 is the highest). | |
1. |
Use Advanced Login to log on as User 1. |
3. |
• |
Quest ESSO user: User 2. |
• |
Windows user: User 1. |
For a complete description of the SSPR feature (installation, administration...), see Advanced Login Self Service Password Request Administrator Guide. |
You must set the list of the SSPR servers to be used, as detailed in 5.4.2.6 Self Service Password Request Tab. Always available: the user is always able to run the SSPR feature, even if the workstation is not connected to the network or if the SSPR server is not available. You can configure this mode so that the SSPR server can be used if it is available; by selecting item 10 in the SSPR Policy window (see description of the Security Services Tab below).
| |||||
This option is only available if the Always available mode is selected.
It allows you to force the user to call the help desk to reset his/her password.
| |||||
This option is only available if the Always available mode is selected.
It allows you to set the Self Service Password Request (SSPR) feature as an authentication method:
| |||||
Questions area
|
This area allows you to define the number of questions to ask to the end-user and to manage a list of available questions. These questions will be displayed by the Self Service Password Request wizard (through Advanced Login) to your end users.
For details, see "Question List Management Procedures", below. | ||||
Security area
|
The Advanced button allows you to define other security parameters, as explained in the following table:
| ||||
Security area
|
Select this check box to set a waiting period before allowing the user to attempt to answer questions again on his/her workstation. Note: The timeout is set only on the concerned workstation: the user can answer the questions from another workstation before the end of the timeout.
To try the use of the Self Service Password Request (SSPR) server before using the disconnected mode. | ||||
Security area
|
• |
To create the questions, go to Procedure 1. |
• |
To import the questions, go to Procedure 2. |
1. |
In the Questions area, click the Select button, and in the displayed window, click Manage questions. |
a) |
c) |
Set the Question Type: select either Predefined Question to specify a question that cannot be modified by the end user or User-supplied question to allow the end user to define his/her own question. |
d) |
• |
Click Translations. |
• |
Click Add. |
• |
Click OK. |
f) |
Set the Answer constraints: |
• |
Fill in Must match regular expression, to set restrictions on the string corresponding to the answer entered by the end user. For details on the syntax of regular expressions, see Appendix A. "Regular Expressions - Basic Syntax". |
g) |
3. |
4. |
Set a question number to an available question to define a list of available questions for each Question field of the Self Service Password Request wizard (available through Advanced Login): |
b) |
c) |
Click OK. |
• |
To import a set of questions, a .csv file containing the questions must have been generated with the Export button. |
• |
If there are more questions in the .csv file than in the Existing Questions, then the additional questions are added to the Existing Questions. |
• |
If there are less questions in the Existing Questions than in the csv file, the Existing Questions are kept. |
• |
If both the .csv file and the Existing Questions contain the same questions with a few discrepancies, then the Existing Questions are replaced by the questions of the .csv file. |
• |
1. |
In the Questions area, click the Select button, and in the displayed window, click Manage questions. |
2. |
4. |
Click Open. |
5. |
6. |
a) |
In the list of questions drop down list, select the Question number, click the Add button. |
b) |
c) |
Click OK. |
© 2022 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy