Reset Password in Active Directory
Reset Password in Active Directory
This is a core activity of the Forgot My Password workflow. The activity allows users to reset passwords in Active Directory only. If you want to enable users to reset passwords in several systems, configure the Reset password in Active Directory and connected systems activity. For more information on configuring this activity and using One Identity Quick Connect Sync Engine, see Reset Password in Active Directory and Connected Systems.
In this activity you can configure the Enforce password history option. Password history determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. Password history is defined for a domain through Group Policy settings.
Before selecting this option, you should consider the following by-design behavior of Password Manager when that the Enforce password history option is enabled:
- Password Manager uses two slots from the password history every time a password is reset. For example, if the password history value defines that users cannot reuse any of the last 10 passwords, then Password Manager checks only the last five passwords. Therefore, it is advised that you double the password history value for all managed domains.
- Having entered a new password that is not policy compliant, users may end up with a randomly generated password they don't know.
The Enable QESSO integration option allows you to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
Select the Allow users to reset passwords offline option to enable users to use the offline password reset functionality provided by Password Manager. This functionality allows resetting passwords when users have forgotten their current passwords and their computers are not connected to the intranet (Active Directory is not available).
This functionality is based on resetting user password in locally cached logon data. The security is provided by using the challenge-response mechanism that guarantees the following:
- A user can reset the locally cached password only after resetting the password online on the Self-Service site.
- A user must specify the same password on the Self-Service site and on the computer in the Offline password reset wizard.
When offline password reset is enabled on users’ computers, a user must perform the following steps to reset his or her password:
- Open the Offline Password Reset wizard by clicking the corresponding link on the Windows logon screen.
- In the wizard, enter his or her user name (this step is optional). Click Next.
- Open the Self-Service site on a computer connected to the Internet and find his or her account.
- Select the corresponding task to reset password.
- When performing the task, the user must specify a new password. When the task is successfully performed, a response code is displayed for the user.
- Then, in the Offline Password Reset wizard, the user must enter the response code and the new password the user specified on the Self-Service site. Click Next.
- If the password is successfully reset, click Finish to close the wizard.
To enable the offline password reset functionality
- Install the offline password reset component on target user computers via group policy. Use the OfflinePasswordReset_x64.msi or OfflinePasswordReset_x86.msi files located in the \Password Manager\Setup folder on the installation CD.
Note, that Secure Password Extension must be installed on target user computers as well. For more information on installing Secure Password Extension, see Deploying and Configuring Secure Password Extension.
- Set the required number of cached user logon attempts. This is necessary because the offline password reset functionality will be available only for users who have previously logged in on their computers. You can use Microsoft knowledge base article http://support.microsoft.com/kb/172931 to change the number of cached logon attempts. It is recommended to use the default value.
- Use the administrative template prm_gina.adm or prm_gina.admx to turn on the offline password reset functionality. The administrative template file is located in the \Password Manager\Setup\Administrative Template\ folder of the installation CD. In the template, enable the following settings: “Display the Offline Password Reset button (command link)” and “Set custom name for the Offline Password Reset button (command link) in <Language>”. For more information on using the administrative template, see Managing Secure Password Extension UsingAdministrative Templates.
- Use the Reset password in Active Directory activity in a required workflow and select the Allow users to reset passwords offline option.
- Save the workflow.
To provide authentication during the offline password reset procedure, a shared secret is used. The shared secret is stored locally on a user computer and its copy is published in Active Directory in the computer’s account during the first logon if the computer is connected to the domain. By default, only domain administrators and the computer account have access to the shared secret. You can specify other users and groups who will have the permission to read the shared secret from the domain. To do it, use the “Configure scope for accessing the shared secret in Active Directory” setting in the administrative template. For more information on the administrative template, see Managing Secure Password Extension UsingAdministrative Templates.
|
IMPORTANT: Note, that the domain management account must have the permission to read the shared secret from the domain for the offline password reset functionality to work. |
You can also use the “Shared secret update period (hours)” setting in the administrative template to specify how often the shared secret should be updated. The recommended value is every 24 hours. For more information on the administrative template, see Managing Secure Password Extension UsingAdministrative Templates.
Change Password in Active Directory
Change Password in Active Directory
This is a core activity of the Manage My Passwords workflow. The activity allows users to change passwords in Active Directory only. If you want to enable users to change passwords in several systems, configure the Change password in Active Directory and connected systems activity. For more information on configuring this activity and using One Identity Quick Connect Sync Engine, see Change Password in Active Directory and Connected Systems.
Run this activity only when user must change password at next logon Select this check box when you use this activity in workflows other than Manage My Passwords. By using this option you can force users who are required to change password at next logon to change password while performing other tasks on the Self-Service site.
For example, if you add the Change password in Active Directory activity with this option selected to the My Questions and Answers Profile workflow, you will force users who are required to change password at next logon to change password when creating or updating their Q&A profiles.
The Enable QESSO integration option allows you to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
Reset Password in Active Directory and Connected Systems
Reset Password in Active Directory and Connected Systems
Using this activity, you can configure Password Manager to use One Identity Quick Connect to reset passwords in connected systems. If used in conjunction with Quick Connect, Password Manager allows you to enable users and helpdesk operators to manage passwords across a wide variety of connected systems. To be able to integrate Password Manager with Quick Connect, you must have a working knowledge of Quick Connect Sync Engine.
To enable Password Manager to set passwords in connected systems through a Quick Connect server, the account used to access Quick Connect must be a member of the local administrators group on the Quick Connect server.
Before you can configure Password Manager to use a Quick Connect server for cross-platform password synchronization, you must do the following in Quick Connect:
- Create a connection to the Active Directory domains managed by Password Manager.
- Create connections to the systems you want Password Manager to synchronize passwords with.
- Map users from the managed domains to users in the connected systems.
For more information on how to configure Quick Connect to set passwords in connected systems, see One Identity Quick Connect documentation.
To enable Password Manager for cross-platform password synchronization
- Include the Reset password in Active Directory and connected systems activity in a workflow and click the activity to edit its settings.
- In the Quick Connect server name text box specify the Quick Connect server URL.
- Select the account to be used to access the Quick Connect server. You can use either Password Manager Service account or specify another account.
You can use either pre-Windows 2000 logon name (such as DomainName\UserName) or User Principal Name (such as UserName@DomainName.com) to specify the user name.
- Specify how you want Password Manager to act when the Quick Connect server is unavailable. To do it, select one of the following and click Next:
- Act as if no Quick Connect server was specified. Users can manage their passwords only in the Active Directory domain. No warnings are displayed to users if Quick Connect server is not available.
- Alert users and allow them to reset passwords only in Active Directory. Users are notified that other connected data sources are temporarily unavailable, and are allowed to continue managing their passwords only in the Active Directory domain.
- Do not allow users to reset passwords. Users cannot perform any password management tasks in the Active Directory domain and in connected data sources, if the Quick Connect server is not available.
- From the list of connected systems, select the systems in which you want to manage user passwords. For each selected system, specify the following options and click Next:
- System alias
- Reset password in this system independently from Active Directory. Select this option to allow users to reset their passwords in a connected system independently from Active Directory.
- Do not allow resetting password in this system independently from Active Directory. Select this option to prevent users from resetting their passwords in a connected system independently from Active Directory. Note, if you select this option, a user’s password will be reset in the connected system only after the password has been successfully reset in Active Directory. If the user’ password is not reset in Active Directory, it will be not reset in the connected system. Users can specify a different password for the connected system, if you select the Allow users to specify different password for this system option.
- To enforce password history in the Active Directory domains managed by Password Manager, select the Enforce password history check box. Password history determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. Password history is defined for a domain through Group Policy settings
|
IMPORTANT: Before selecting this option, you should consider the following by-design behavior of Password Manager when that the Enforce password history option is enabled:
- Password Manager uses two slots from the password history every time a password is reset. For example, if the password history value defines that users cannot reuse any of the last 10 passwords, then Password Manager checks only the last five passwords. Therefore, it is advised that you double the password history value for all managed domains.
- Having entered a new password that is not policy compliant, users may end up with a randomly generated password they don't know.
|
- Select the Enable QESSO integration to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
- Click OK to close the wizard.
Change Password in Active Directory and Connected Systems
Change Password in Active Directory and Connected Systems
Using this activity, you can configure Password Manager to use One Identity Quick Connect to reset passwords in connected systems. If used in conjunction with Quick Connect, Password Manager allows you to enable users and helpdesk operators to manage passwords across a wide variety of connected systems. To be able to integrate Password Manager with Quick Connect, you must have a working knowledge of Quick Connect Sync Engine.
To enable Password Manager to set passwords in connected systems through a Quick Connect server, the account used to access Quick Connect must be a member of the local administrators group on the Quick Connect server.
Before you can configure Password Manager to use a Quick Connect server for cross-platform password synchronization, you must do the following in Quick Connect:
- Create a connection to the Active Directory domains managed by Password Manager.
- Create connections to the systems you want Password Manager to synchronize passwords with.
- Map users from the managed domains to users in the connected systems.
For more information on how to configure Quick Connect to set passwords in connected systems, see One Identity Quick Connect documentation.
- To enable Password Manager for cross-platform password synchronization
- Include the Change password in connected systems and Active Directory activity in a workflow and click the activity to edit its settings.
- In the Quick Connect server name text box specify the Quick Connect server URL.
- Select the account to be used to access the Quick Connect server. You can use either Password Manager Service account or specify another account.
You can use either pre-Windows 2000 logon name (such as DomainName\UserName) or User Principal Name (such as UserName@DomainName.com) to specify the user name.
- Specify how you want Password Manager to act when the Quick Connect server is unavailable. To do it, select one of the following and click Next:
- Act as if no Quick Connect server were specified. Users can manage their passwords only in the Active Directory domain. No warnings are displayed to users if Quick Connect server is not available.
- Alert users and allow them to change passwords only in Active Directory. Users are notified that other connected data sources are temporarily unavailable, and are allowed to continue managing their passwords only in the Active Directory domain.
- Do not allow users to change passwords. Users cannot perform any password management tasks in the Active Directory domain and in connected data sources, if the Quick Connect server is not available.
- From the list of connected systems, select the systems in which you want to manage user passwords. For each selected system, specify the following options and click Next:
- System alias
- Change password in this system independently from Active Directory. Select this option to allow users to change their passwords in a connected system independently from Active Directory.
- Do not allow changing password in this system independently from Active Directory. Select this option to prevent users from changing their passwords in a connected system independently from Active Directory. Note, if you select this option, a user’s password will be changed in the connected system only after the password has been successfully changed in Active Directory. If the user’ password is not changed in Active Directory, it will be not changed in the connected system. Users can specify different password for the connected system, if you select the Allow users to specify different password for this system option.
- Select the Enable QESSO integration to integrate Password Manager with Quest Enterprise Single Sign-On (QESSO) and notify QESSO about user’s password changes. For more information, see Quest Enterprise Single Sign-On (QESSO).
- Click OK to close the wizard.