Some Unix systems silently truncate passwords to their maximum allowed length. For example, Macintosh OS X only allows a password of 128 characters. If an Asset Administrator creates a profile with an Account Password Rule that sets the password length to 136 characters, when Safeguard for Privileged Passwords changes the password for an account governed by that profile, the asset's operating system truncates the new password to the allowable length and does not return an error; however, the full 136-character password is stored in Safeguard for Privileged Passwords. This causes the following issues:
Check Password for that account will fail. When Safeguard for Privileged Passwords compares the password on the Unix host with the password in Safeguard for Privileged Passwords, they never match because the Unix host truncated the password generated by Safeguard for Privileged Passwords.
Safeguard for Privileged Passwords can resolve a situation when a user needs to request an account password but cannot because there is a previous password release request still in the “Pending Review” state and the designated reviewer is not available. If the request is left in this state, Safeguard for Privileged Passwords prevents users from checking out the account password. In such a situation, the Security Policy Administrator can close the request without review.
To close a password without review
|
Note: The Administrator control is only available in the Safeguard for Privileged Passwords desktop client application, not in the web client. |
You can query and view all requests closed without review in the Activity Center. Filter the events by Password Request Closed, then export the search results to see the old state and new state.
If a user receives a persistent message that states, "You cannot checkout the password for this account while another request is pending password reset" or "This account has password requests which have not yet expired or have to be reviewed. It cannot be deleted now", the account password is stuck in a pending password change state.
Ensure that the service account for the asset associated with this account is working. Then manually change the account password. For more information, see Checking, changing, or setting an account password.
Or, if the service account for the asset is working properly and the policy governing the account allows emergency access and has enabled multiple users simultaneous access, you can instruct the user to request the password using Emergency Access.
The password management settings Settings | Access Request | Enable or Disable Services enable the automatic profile check and change schedules in directories and partitions.
Ensure the password management settings are enable for profiles to run on schedule:
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy