Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Password Manager 5.9.7 - Administration Guide

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in Perimeter Network Management Policy Overview Password Policy Overview Secure Password Extension Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Password Change and Reset Process Overview Data Replication Phone-Based Authentication Service Overview
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring Access to the Administration Site Configuring Access to the Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Self-Service Workflows Helpdesk Workflows Notification Activities User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances Domain Connections Extensibility Features RADIUS Two-Factor Authentication Unregistering users from Password Manager Working with Redistributable Secret Management account Email Templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies One Identity Starling Reporting Password Manager Integration Appendixes Glossary

Reset Password

You can use this workflow to configure the Reset Password task for the Helpdesk site. Helpdesk operators use this task to reset user passwords in managed domains and other connected data sources, if applicable.

The default configuration of this workflow is the following:

  1. Authentication Methods.
  2. Reset password in Active Directory.
  3. Restart workflow if error occurs.
  4. Email user if workflow succeeds.
  5. Email user if workflow fails.

Unlock Account

You can use this workflow to configure the Unlock Account task for the Helpdesk site.

The default configuration of this workflow is the following:

  1. Authentication Methods.
  2. Unlock account.
  3. Restart workflow if error occurs.
  4. Email user if workflow succeeds.
  5. Email user if workflow fails.

Unlock Profile

You can use this workflow to configure the Unlock Profile task for the Helpdesk site. By using this task, helpdesk operators can unlock user's profiles that are locked as a result of a sequence of failed attempts to provide the correct answers to secret questions.

The default configuration of this workflow is the following:

  1. Unlock profile.
  2. Restart workflow if error occurs.
  3. Email user if workflow succeeds.
  4. Email user if workflow fails.

Verify User Identity

You can use this workflow to configure the Verify User Identity task for the Helpdesk site. A helpdesk operator should verify user identity before performing any password management task.

The default configuration of this workflow is the following:

  1. Authentication Methods.
  2. Restart workflow if error occurs.
  3. Email user if workflow succeeds.
  4. Email user if workflow fails.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating