Password Manager 5.8.2 - Administrator Guide (AD LDS edition)

About Password Manager Getting Started Upgrading Password Manager to 5.8.1 Password Manager Architecture Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow Overview Custom Workflows Custom Activities Self-Service Workflows Helpdesk Workflows User Enforcement Rules
General Settings Password Policies One Identity Hybrid Subscription One Identity Starling Reporting Appendix A: Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Appendix C: Customization Options Overview Glossary

Specifying Access Account for AD LDS Instance Connections

Specifying Access Account for AD LDS Instance Connections

When creating a connection, you must specify an access account - an account under which Password Manager will access an AD LDS instance and a specified application directory partition. You can use the Password Manager Service account, an Active Directory account or an AD LDS account. These accounts must have the following minimum set of permissions:

  • Membership in the Domain Users group (for the Password Manager Service account and the Active Directory account only)
  • Membership in the Readers group in the application directory partition (for the AD LDS account only)
  • Membership in the Administrators group in the configuration directory partition
  • The Read permission for all attributes of user objects
  • The Write permission for the following attributes of user objects: pwdLastSet, comment, unicodePwd, lockoutTime, msDS-UserAccountDisabled
  • The right to reset user passwords
  • The permission to create user accounts and containers in the Users container
  • The Read permission for attributes of the organizationalUnit object and container objects
  • The Write permission for the gpLink attribute of the organizationalUnit objects and container objects
  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers
  • The permission to create container objects in the System container
  • The permission to create the serviceConnectionPoint objects in the System container
  • The permission to delete the serviceConnectionPoint objects in the System container
  • The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container

If you want to use the same connection in password policies as well, make sure the account has the following permissions:

  • The Read permission for attributes of the groupPolicyContainer objects.
  • The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.
  • The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.
  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.
  • The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.

To add connection

  1. On the home page of the Administration site, click the General Settings|AD LDS Instance Connections tab.
  2. Click Connect to AD LDS instance to add a connection.
  3. In the Connect to AD LDS Instance dialog, configure the following options:
    • In the Server name on which AD LDS instance is installed text box, type the name of the server to which you want to connect.
    • In the Port number (LDAP or SSL) text box, enter the port number that you specified when installing the AD LDS instance. If you select the Use SSL check box, enter the SSL port number; otherwise, LDAP port number. It is recommended to use SSL in your production environment.
    • In the Application directory partition text box, enter the name of the application directory partition from the AD LDS instance to which you want to connect.
    • In the Application directory partition alias text box, type the alias for the application directory partition which will be used to address the partition on the Self-Service site.
    • In the Access account section, select Password Manager Service account to have Password Manager access the AD LDS instance using the Password Manager Service account, otherwise, select The following Active Directory account or The following AD LDS account radio button and enter the required user name and password.
  4. Click Save.

    IMPORTANT: After you create a connection on the General Settings|AD LDS Instance Connections tab, you can use it in the user scope, helpdesk scope and password policies by selecting the connection in the Connect to AD LDS Instance dialog on the corresponding page of the Administration site. For example, to use the connection in the user scope of your Management Policy, open the user scope of this Management Policy, click Connect to AD LDS instance, and select the corresponding connection from the list.

Changing Access Account for AD LDS Instance Connections

Changing Access Account for AD LDS Instance Connections

To change access account

  1. On the home page of the Administration site, click the General Settings|AD LDS Instance Connections tab.
  2. Select the connection you want to modify and click Edit.
  3. In the Edit AD LDS Instance Connection dialog, select Password Manager Service account to have Password Manager access the managed instance using the Password Manager Service account. Otherwise, select The following Active Directory account or The following AD LDS account and then enter the required user name and password. Note, that the selected account should have the required permissions.
  4. Click Save. Note, that the updated settings will be applied everywhere where this connection is used.

Removing Connection to AD LDS Instance

Removing Connection to AD LDS Instance

To remove a connection

  1. On the Administration site, click the General Settings|AD LDS Instance Connections tab.
  2. On the AD LDS Instance Connections page, select the connection you want to delete and click Remove. Note, to permanently remove the connection, it should be removed from all sections where it is used. The Remove link becomes available only after the connection is removed from all sections where it is used.

Extensibility Features

Extensibility Features

Extensibility features allow you to customize and extend the Password Manager functionality. The features include the following:

  • Custom activities
  • Built-in web service
  • Custom web services
  • Import/export of activities and workflows
  • Troubleshooting mode

All these features are available only after you turn the extensibility on.

To turn extensibility features on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.

After you turn the extensibility features on, you can also turn on the troubleshooting mode. When the troubleshooting mode is on, the following additional information is displayed:

  • Identifiers of activities and workflows (on the Administration site)
  • PowerShell output (on the Self-Service site)

To turn the troubleshooting mode on

  1. Open the Administration site and click the General Settings tab.
  2. On the General Settings page, select the Extensibility tab.
  3. On the Extensibility settings page, click the upper Turn on button.
  4. Click the Turn on button under the troubleshooting mode.
Related Documents