The symmetry rule ensures that password or its part does not read the same in both directions.
For example, if you enable the Reject passwords that read the same in both directions option, then the password “redivider” will be rejected.
To configure the symmetry rule
- Follow the steps outlined in Configuring Password Policy Rules.
- On the Policy Rules tab, click Symmetry Rule to expand the rule settings.
- Under Symmetry Rule, select the Password must comply with symmetry criteria check box, and then specify the following options:
Table 24: Symmetry criteria
Reject passwords that read the same in both directions (pass8ssap) |
Select to reject passwords that are palindromes. |
Maximum number of beginning characters that match ending characters of password if read backwards (pas47sap) |
Specify the number of beginning characters matching the ending characters of password, if read backwards, which the policy will tolerate before rejecting a password. |
Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word) |
Specify the number of password characters in a row that read the same in both directions, which the policy will tolerate before rejecting a password. |
Case sensitive |
Select to define this rule as case sensitive. |
You can use this rule to create your own password policy message to be displayed on the Self-Service site when users change or reset their passwords. For example, use this rule to enter the settings of the local or domain password policy applied to the server on which AD LDS is running.
If you want to hide all other policy messages and display your custom message to users, enable this policy rule, enter the message text, and select the Hide messages from other policy rules and display only this message check box. If you do not select this check box, messages from all enabled policy rules will be displayed.
Note, that this rule does not check the password compliance with the configured password policy. Configure this rule to display your custom message instead of or together with other policy messages when users change or reset passwords on the Self-Service site.
To configure the custom rule
- Follow the steps outlined in Configuring Password Policy Rules.
- On the Policy Rules tab, click Custom Rule to expand the rule settings.
- Under Custom Rule, select the Enable check box to enable this rule.
- Select the Hide messages from other policy rules and display only this message check box if you want users to see only the custom password rule message and hide all other password policy messages.
- In the text box, enter the rule message in the default language (English). To enter the message in other languages, click the Add new language link, select the language, specify the message and click OK. Note, that only languages of the user interface of the Self-Service site are available in the list.
To delete a password policy
- On the home page of the Administration site, click the Password Policies tab.
- Click the One Identity Password Policies link under the AD LDS instance that you want to manage.
- Click Remove under the policy that you want to delete.
|
NOTE: When you delete a password policy, the deleted policy is no longer valid for an AD LDS instance. To restore a deleted password policy, create a new policy and manually configure its settings as required. |
Password Manager for AD LDS 5.10.1 supports integration with the One Identity Starling services. To connect to One Identity Starling, the Software as a Service (SaaS) solution of One Identity, use the Join to Starling feature of Password Manager for AD LDS.
To use One Identity Starling, you must have a One Identity Starling subscription. Each One Identity Starling subscription is registered with a phone number that receives token responses for authentication or push notifications. The type of token generation depends on the authentication method set for your subscription. Currently, Password Manager for AD LDS supports the following authentication methods:
-
SMS
-
Phone call
-
OTP on Starling 2FA app
-
Push notification
Prerequisites
To configure Starling for Password Manager for AD LDS, make sure that the following conditions are met:
- Users have valid Starling credentials, that is a Starling Organization Admin account or a Collaborator account associated with their One Identity subscription. For more information, see the One Identity Starling User Guide.
- Password Manager for AD LDS runs on the computer where you want to configure Starling.
- Password Manager for AD LDS runs in a managed domain.
To configure One Identity Starling for authentication
|
NOTE: If you upgrade Password Manager for AD LDS, the Starling subscription key and the configuration details set for Starling Two-Factor Authentication will no longer be available. Therefore, you will need to perform the following steps again, and re-register with a valid Starling account. |
-
On the Password Manager Administration Site, navigate to One Identity Starling > One Identity Starling > Join to Starling.
-
To start the configuration process, click Join to Starling. Password Manager for AD LDS then redirects you to the One Identity Starling website.
-
To configure the Starling services available for your subscription, enter your One Identity Starling credentials.
After a successful verification, you will be redirected to the One Identity Starling page.
Once the information is saved, the Starling Join status appears.
-
Perform the applicable step, depending on whether you already have a Starling account or not:
-
If you have a Starling account when the subscription is created for you, you will receive a Starling invitation email. Click the link in the email and log in to your Starling account.
-
If you do not have a Starling account when the subscription is created for you, you will receive a Starling sign-up email to complete the registration process to create your Starling account.
Complete the registration and log in using the credentials that you provided during registration. For more information on creating a Starling account, see the One Identity Starling User Guide.
-
For Starling Two-Factor Authentication, configure the user phone numbers in the appropriate Active Directory attribute.
|
NOTE: Starling Two-Factor Authentication is available in the United States only. |
-
Under General Settings > Reinitialization, configure the same Active Directory attribute.
-
Under Select the attribute of user’s account..., in the Method and Storage attribute table, configure Corporate phone. The default value is mobile.
To disconnect Password Manager for AD LDS from One Identity Starling
-
On the Password Manager Administration Site, navigate to One Identity Starling > One Identity Starling > Unjoin Starling.
-
To unjoin from the One Identity Starling service, click Unjoin Starling. This deletes the joined instances from One Identity Starling services and the Starling Join information from storage.
Once the disconnect process finished, the initial Join to Starling page appears.
One Identity Starling Two-Factor Authentication for Password Manager for AD LDS
Password Manager for AD LDS manages confidential user details both in on-premises and cloud-based environments. Therefore, One Identity strongly recommends using additional security measures, such as two-factor authentication to secure data. Available in the United States, Password Manager for AD LDS now supports the One Identity Starling Two-Factor Authentication service.
One Identity Starling Two-Factor Authentication (One Identity Starling 2FA) provides enhanced security by requiring users to provide two types of authentication to Password Manager for AD LDS: a user name and password combination, along with a token response. This token response is collected through an SMS, phone call, or push notification received on a physical device, for example a mobile.
Registering to One Identity Starling 2FA
To use Starling 2FA, you must register to the product. If you register with your mobile number, One Identity sends an SMS with a link of the Starling mobile app. Click the link to access the Apple App Store or Google Play Store from where you can download the Starling mobile app. Alternatively, visit the Apple App Store or Google Play Store, and download the Starling app manually.
Starling 2FA supports the following authentication options:
- Push Notification: After the Starling app is downloaded and registered with the user email ID and mobile number, the user will receive push notifications to approve or deny Starling authentication.
- Voice: The user will receive a voice call on the registered mobile number. During the call, the user will receive an OTP.
- SMS OTP: The user will receive an OTP through SMS sent to their registered mobile number.
- Users can also open the Starling app and copy the code from the Starling app to Password Manager for AD LDS. To authenticate with this code, click Verify.
Logging in to the Password Manager for AD LDS sites with Starling 2FA authentication
If a user has Starling 2FA enabled, attempting to log in to a Password Manager for AD LDS site results in Starling 2FA prompting the user to enter the configured token response. Based on the option selected by the user, the token response is provided through SMS, phone call or push notifications.
After entering the token response and verifying the user successfully, the Password Manager for AD LDS site appears.
|
NOTE: Push notifications work only if the Starling app is installed on the device of the registered mobile number. The link to install the Starling app is sent to the registered mobile number at the time of registering to Starling. |