Chat now with support
Chat with Support

Password Manager 5.7.1 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow Overview Custom Workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings Upgrading Password Manager Secure Password Extension Password Policies Reporting Password Manager Integration Appendixes Glossary About us

Symmetry Rule

Symmetry Rule

The symmetry rule ensures that password or its part does not read the same in both directions.

For example, if you enable the Reject passwords that read the same in both directions option, then the password “redivider” will be rejected.

To configure the symmetry rule

  1. Follow the steps outlined in Configuring Password Policy Rules.
  2. On the Policy Rules tab, click Symmetry Rule to expand the rule settings.
  3. Under Symmetry Rule, select the Password must comply with symmetry criteria check box, and then specify the following options:
Table 29:

 

Option

Description

Reject passwords that read the same in both directions (pass8ssap)

Select to reject passwords that are palindromes.

Maximum number of beginning characters that match ending characters of password if read backwards (pas47sap)

Specify the number of beginning characters matching the ending characters of password, if read backwards, which the policy will tolerate before rejecting a password.

Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word)

Specify the number of password characters in a row that read the same in both directions, which the policy will tolerate before rejecting a password.

Case sensitive

Select to define this rule as case sensitive.

Custom Rule

You can use this rule to create your own password policy message to be displayed on the Self-Service site when users change or reset their passwords. For example, if you want to hide all other policy messages and display your custom message to users, enable this policy rule, enter the message text, and select the Hide messages from other policy rules and display only this message check box. If you do not select this check box, messages from all enabled policy rules will be displayed.

Note, that this rule does not check the password compliance with the configured password policy. Configure this rule to display your custom message instead of or together with other policy messages when users change or reset passwords on the Self-Service site.

  1. To configure the custom rule
  2. Follow the steps outlined in Configuring Password Policy Rules.
  3. On the Policy Rules tab, click Custom Rule to expand the rule settings.
  4. Under Custom Rule, select the Enable check box to enable this rule.
  5. Select the Hide messages from other policy rules and display only this message check box if you want users to see only the custom password rule message and hide all other password policy messages.
  6. In the text box, enter the rule message in the default language (English). To enter the message in other languages, click the Add new language link, select the language, specify the message and click OK. Note, that only languages of the user interface of the Self-Service site are available in the list.

Managing Password Policy Scope

This section provides information on how to apply a password policy to groups and organizational units in a managed domain.

Applying Password Policies

A newly created password policy is linked to the managed domain for which it was created and applies to the “Authenticated users” groups by default. You can define granular password policies by linking them to certain organizational units and groups in a managed domain.

IMPORTANT: To apply a password policy to users from a managed domain, include at least one group and one organization unit from the domain to the policy scope. Users must be members of the corresponding group and organizational unit.

To link a password policy to organizational units and groups

  1. Display properties of a password policy by using the procedure outlined in About Password Policies.
  2. Click the Policy Scope tab.
  3. Click the Add button under This policy is applied to the following organizational units, and then browse for an organizational unit.
  4. Click the Add button under This policy is applied to the following groups, and then browse for a group.
  5. Click Save.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating