立即与支持人员聊天
与支持团队交流

Password Manager 5.13.2 - Administration Guide

About Password Manager Getting started Password Manager architecture
Password Manager components and third-party applications Typical deployment scenarios Password Manager in a perimeter network Management Policy overview Password policy overview Secure Password Extension overview reCAPTCHA overview User enrollment process overview Questions and Answers policy overview Password change and reset process overview Data replication Phone-based authentication service overview
Management policies
Checklist: Configuring Password Manager Understanding Management Policies Configuring access to the Administration Site Configuring access to the Legacy Self-Service Site or Password Manager Self-Service Site Configuring access to the Helpdesk Site Configuring Questions and Answers policy Workflow overview Custom workflows Custom activities Legacy Self-Service or Password Manager Self-Service Site workflows Helpdesk workflows Notification activities User enforcement rules
General Settings
General Settings overview Search and logon options Importing and exporting configuration settings Outgoing mail servers Diagnostic logging Scheduled tasks Web Interface customization Instance reinitialization Realm Instances Domain Connections Extensibility features RADIUS Two-Factor Authentication Internal Feedback Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable 2FA for administrators and helpdesk users Reporting Password Manager integration Accounts used in Password Manager Open communication ports for Password Manager Customization options overview Feature imparities between the legacy and the new Self-Service Sites Third-party contributions Glossary

Using fine-grained password policies

By default, existing fine-grained password policies are applied to users from fine-grained password policies’ scopes. But to be able to manage fine-grained password policies and to have the Self-Service Site display the password policy rules when users reset or change passwords, you need to add a domain connection on the Password Policies tab of the Administration Site.

When adding the domain connection, you specify the domain to which password policies will be applied and the credentials that will be used to access the domain.

NOTE: The default domain password policy is applied to users from the policy scope, but the policy itself is not displayed in the policy list on the Administration Site.

NOTE: Creating a new Windows fine-grained password policies, does not contain a Policy Scope by default. Hence, by clicking Edit on the newly created Windows fine-grained password policies and configuring the required Policy Scope in the Password Policy Properties window, one can view these policies for the configured users in the Self-Service Site.

Applying multiple password policies

If a user is found in the scopes of a default domain password policy, a fine-grained password policy, and a One Identity password policy, the applicable policy is selected in the following algorithm. The default domain policy is ignored. The rules from the fine-grained and One Identity policies are merged with the strictest value selected for each rule.

If a user is found in the scopes of several fine-grained password policies, the applicable policy is selected automatically in Active Directory.

If a user is found in the scopes of several One Identity password policies, then the policy with the highest priority is applied to the user. Note that priority can be changed for policies with the same scope.

Using Password Policy Manager

Password Policy Manager is a separate component of Password Manager that allows enforcing One Identity password policy rules when users change or reset passwords by means other than the Self-Service Site.

For example, you have configured a One Identity password policy for users from domain My Domain. When users from this domain change or reset passwords on the Self-Service Site (the user on the left in the diagram below), the configured One Identity password policy is applied, and corresponding policy rules are displayed. This happens because Password Policy Manager is always available with the Password Manager service. But when users try to change or reset passwords by pressing Ctrl+Alt+Delete, for example (the user on the right in the diagram below), the configured One Identity password policy will not be enforced.

To enforce the configured One Identity password policy in cases when users change or reset passwords not via the Self-Service Site, you must install Password Policy Manager on all domain controllers in the domain. In the case when Password Policy Manager is installed on domain controllers in the managed domain, when the same users change or reset password by pressing Ctrl+Alt+Delete, the One Identity password policy will be applied.

Therefore, if users from your managed domain change or reset their password on the Self-Service Site only, you do not need to install Password Policy Manager on all domain controllers in the domain. But if you want to ensure that password policies are enforced when users change or reset passwords by means other than the Self-Service Site, you must install Password Policy Manager on all domain controllers in the domain.

For more information on how to install Password Policy Manager, see Installing Password Policy Manager.

Secure Password Extension overview

This section explains how Secure Password Extension locates the Self-Service Site and launches notification dialogs on end-user computers that remind users to create or update their Questions and Answers profiles.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级