Chat now with support
Chat with Support

Password Manager 5.13.0 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable S2FA for Administrators & Enable S2FA for HelpDesk Users Reporting Password Manager Integration Accounts Used in Password Manager Open Communication Ports for Password Manager Customization Options Overview Feature imparities between the legacy and the new Self-Service Sites Glossary

How to Use Phone-Based Authentication

To use phone-based authentication on the Self-Service and Helpdesk sites, add the Authenticate via Phone activity in self-service and helpdesk workflows. When configuring this activity, you can specify Active Directory attributes from which phone numbers can be retrieved, and available authentication methods: that is, SMS or automated voice call.

Phone numbers that belong to Private Branch Exchange (PBX) are also supported. PBX phones require either a live switchboard operator or an automated attendant to complete the call. By default, Password Manager supports automated attendant scenario. It can be configured for live operators by changing PhoneNumberExtensionType parameter in QPM.Service.Host.exe.config file. For automated attendants, set PhoneNumberExtensionType to 1 and for live operators, set PhoneNumberExtensionType to 2.

For PhoneNumberExtensionType set to 1 (DTMF digits are dialed), include commas in the PhoneNumberExtensionTemplate, where each comma represents one second pause in the dialing sequence. To increase the pause in the dialing sequence, add the required number of commas in PhoneNumberExtensionTemplate in the configuration file.

NOTE: The phone number extension must be configured with extension separator in the Active Directory. Phone number with extension must have "x" or "X" in it to separate the extension number from the phone number as given in the following examples:

+91-98881234567 Extension 1234

+91-98881234567 Ext 1234

+91-98881234567 Extn 1234

+91-98861234567 x 1234

+91-98861234567 Ex 1234

For more information on configuring this activity, see Authenticate via phone.

System Requirements

To use the phone-based authentication service, the following requirements must be met:

  1. You have a valid license for the phone-based authentication service (see the About page of the Administration site for the service status).
  2. Outbound SSL connections are allowed from the computer on which Password Manager Service runs to the following address: https://*.telesign.com. * can be replaced with any valid subdomain name; for example, https://api.telesign.com or https://www.telesign.com.

 

Management Policies

Checklist: Configuring Password Manager

When you have installed Password Manager, follow this checklist to configure the solution to implement automated and secure password management in an Active Directory domain.

Table 2:  Checklist to configure Password Manager

Step

Reference

Prepare a domain management account.

Configuring Permissions for Domain Management Account

Configure a user scope.

Configuring user scope

Configure the Questions and Answers policy: Create language-specific question lists, and configure Q&A profile settings if required.

Configuring Questions and Answers policy

Configure a Helpdesk scope to grant access permissions for the Helpdesk site to Helpdesk operators and delegate administrative tasks.

Configuring access to the Helpdesk site

Configure Self-Service and Helpdesk workflows to define what tasks will be available on the Self-Service and Helpdesk sites.

Legacy Self-Service or Password Manager Self-Service site workflows

Helpdesk Workflows

If required, configure rules for user registration notification and enforcement by specifying a registration schedule and enabling registration notification.

User Enforcement Rules

Configure general settings that apply to all user scopes (such as account search options, SMTP servers, scheduled tasks, and so on.)

General Settings Overview

If you want to provide access to the Self-Service site from the Windows login screen and notify users that they should create or update Q&A profiles, install Secure Password Extension.

Deploying and Configuring Secure Password Extension

If you want to use Password Manager to enforce password policies, you must install Password Policy Manager (PPM) on all domain controllers in the domain. Then, create password policies and configure password policy rules.

Installing Password Policy Manager

If you want to use Password Manager for cross-platform password synchronization, install One Identity Quick Connect Sync Engine and configure the product to integrate with Password Manager.

Reset Password in Active Directory and Connected Systems

Ensure that all Password Manager users have JavaScript enabled in their browser settings.

 

Ensure that the users know the Self-Service site URL and can access the site to register and perform password self-management tasks.

 

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating