RADIUS Two-Factor Authentication
RADIUS Two-Factor Authentication enables two-factor authentication on Password Manager. RADIUS Two-Factor Authentication uses one-time passwords to authenticate users on the Self-Service site and Helpdesk site.
To configure RADIUS Two-Factor Authentication in Password Manager, you have to configure the RADIUS server details in Password Manager.
To configure RADIUS Two-Factor Authentication for authentication
- On the home page of the Administration site, click GeneralSettings, and click the RADIUS Two-Factor tab.
- In the RADIUS Server (IP address): text box, enter the RADIUS server IP address.
- In the Port number text box, enter the port number assigned during configuration of RADIUS.
- In the RADIUS Shared Secret text box, enter the password set during RADIUS configuration.
-
Select the check box, if Radius server requires two-step authentication like Azure MFA.
|
NOTE: The Administrator can choose which user’s active directory attributes to be used for authentication from the Specify user's AD attribute to authenticate the user dropdown box. The administrator can also specify additional active directory attributes to use for authentication apart from the list. |
-
From the Additional RADIUS Attribute section, select the required RADIUS attribute from the drop-down menu. Specify the value for the selected attribute and click +. The RADIUS attributes and the corresponding values that you add is displayed. Click - to remove the RADIUS attribute you added.
|
NOTE: The RADIUS attributes supported are NAS-IP-Address, NAS-Port, NAS-Port-Type, and NAS-Identifier. |
- Click Save.
For more information, see Authenticate with RADIUS Two-Factor Authentication.
Redistributable Secret Management Service
Redistributable Secret Management Service
Redistributable Secret Management Service (rSMS) can be used to manage user passwords across multiple connected systems. Using the rSMS service it is possible to quickly synchronize the passwords across connected systems. By default, the rSMS service is installed with the Password Manager software.
Alternative option
The Redistributable Secret Management Service (rSMS) feature, can be used as an alternative to Quick Connect Sync Engine.
|
NOTE: Target platform IP address or the Hostname should not be same server where One Identity rSMS service is installed. |
Location sensitive authentication
The location sensitive authentication feature allow you to skip certain authentication methods for users trying to execute a workflow on Self-Service site from a defined corporate network. Using this feature, you can also restrict the capability of searching for the users on Self-Service Site from IP addresses that is not specified in the defined corporate IP address range.
|
IMPORTANT: It is mandatory to have at least one authentication method for users accessing the application from the defined corporate network. |
You can use the location sensitive authentication feature for any of the following authentication types:
-
Q&A profile (random questions)
-
Q&A profile (specific questions)
- Defender
-
Starling Two-Factor Authentication
-
RADIUS Two-Factor Authentication
- Phone
Configuring corporate IP address range
You must specify a defined corporate IP address range that help in determining if the users are trying to execute the workflow from an internal or external network.
-
On the home page of the Administration site, click General Settings | Corporate IP Address Ranges.
-
On the Corporate IP Address Ranges page, click Add Corporate IP Address Range.
-
Provide the Network Address and Subnet Mask.
- Click Save.
The corporate IP address range is successfully added.
To edit the defined corporate IP address, click Edit. Click Remove to delete the defined corporate IP address.
Working with Power BI
Microsoft Power BI is an analytics service that is used to visualize large data with business intelligence. You can generate multiples interactive reports and customize dashboards with data insights and plot them on graphs to simplify data visualization.
|
IMPORTANT:The existing reporting in Password Manager is retained for the current release, after which it will be deprecated and replaced by Power BI reporting service. |
The predefined Password Manager PowerBI template is available in Password Manager\Setup\Template\PowerBI Template of the installation CD. You can extend the functionality by exporting the predefined template using the PowerBI Desktop software. The template provides the following reports by default:
-
User Status
-
Actions by Users
-
Actions by Number of Users l
-
Users actions by Month
-
Email Notification by Type and User
-
Helpdesk usage by Actions
-
Helpdesk Usage by Operators
-
Helpdesk Usage by Users
-
Registration by Month
To import the predefined PowerBI template
-
Download and install the Power BI Desktop software from the Microsoft Download Center.
-
Provide the credentials to login to the Power BI Desktop software.
-
Navigate to File | Import | Power BI template.
-
Select the predefined Power BI template and click Open.
The SQL Server database window is displayed.
-
The PowerBI Desktop initiates the process to connect to the database from which the template is created. Click Cancel.
-
The Refresh window is displayed. Click Cancel.
-
Navigate to the Data Source settings in the Power BI Desktop.
The Data source settings window is displayed.
-
Click Change Source.
-
Provide the SQL Server name in the Server field and the Database name in the Database field.
-
Click OK.
-
Click Apply changes in the warning message to apply the latest changes.
The Power BI Desktop is connected the database and all the updates are displayed.
Alternative option
As an alternative to generating reports using predefined Power BI templates, you can use the Reporting feature. For more information, see Reporting and User Action History Overview