立即与支持人员聊天
与支持团队交流

Password Manager 5.14.2 - Administration Guide

About Password Manager Getting started Password Manager architecture
Password Manager components and third-party applications Typical deployment scenarios Password Manager in a perimeter network Management Policy overview Password policy overview Secure Password Extension overview reCAPTCHA overview User enrollment process overview Questions and Answers policy overview Password change and reset process overview Data replication Phone-based authentication service overview
Management policies
Checklist: Configuring Password Manager Understanding Management Policies Adding or cloning a new Management Policy Configuring access to the Administration Site Configuring access to the Password Manager Self-Service Site Configuring access to the Helpdesk Site Configuring Questions and Answers policy Workflow overview Custom workflows Custom activities Password Manager Self-Service Site workflows Helpdesk workflows Notification activities User enforcement rules
General Settings
General Settings overview Search and logon options Importing and exporting configuration settings Outgoing mail servers Diagnostic logging Scheduled tasks Web Interface customization Instance reinitialization Realm Instances Domain Connections Extensibility features RADIUS Two-Factor Authentication Internal Feedback Customizing help link URL Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Administrative Templates Secure Password Extension Password Policies Enable 2FA for administrators and helpdesk users Reporting Password Manager integration Accounts used in Password Manager Open communication ports for Password Manager Customization options overview Third-party contributions Glossary

Specifying access account for domain connections

Before adding the domain connection, make sure the account you want to use to access the domain has the required permissions.

The following permissions must be granted to the account in case you want to add the domain to the user or helpdesk scopes:

  • Membership in the Domain Users group.

  • The Read permission for all attributes of user objects.

  • The Write permission for the following attributes of user objects: pwdLastSet, comment, userAccountControl, and lockoutTime.

  • The right to reset user passwords.

  • The permission to create user accounts and containers in the Users container.

  • The Read permission for attributes of the organizationalUnit object and domain objects.

  • The Write permission for the gpLink attribute of the organizationalUnit objects and domain objects.

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.

  • The permission to create container objects in the System container.

  • The permission to create the serviceConnectionPoint objects in the System container.

  • The permission to delete the serviceConnectionPoint objects in the System container.

  • The Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container.

If you want to use the domain connection in password policies as well, make sure the account has the following permissions:

  • The Read permission for attributes of the groupPolicyContainer objects.

  • The Write permission to create and delete the groupPolicyContainer objects in the System Policies container.

  • The Read permission for the nTSecurityDecriptor attribute of the groupPolicyContainer objects.

  • The permission to create and delete container and the serviceConnectionPoint objects in Group Policy containers.

  • The Read permission for the attributes of the container and serviceConnectionPoint objects in Group Policy containers.

  • The Write permission for the serviceBindingInformation and displayName attributes of the serviceConnectionPoint objects in Group Policy containers.

  • The Write permission for the following attributes of the msDS-PasswordSettings object:

    • msDS-LockoutDuration

    • msDS-LockoutThreshold

    • msDS-MaximumPasswordAge

    • msDS-MinimumPasswordAge

    • msDS-MinimumPasswordLength

    • msDS-PasswordComplexityEnabled

    • msDS-PasswordHistoryLength

    • msDS-PasswordReversibleEncryption

    • msDS-PasswordSettingsPrecedence

    • msDS-PSOApplied

    • msDS-PSOAppliesTo

    • name

To add domain connection

  1. On the home page of the Administration Site, click the General Settings > Domain Connections tab.

  2. Click Add domain connection to add a domain connection.

  3. If domain connections already exist, select a domain connection from the list. If you want to create a new connection, click Add domain connection.

  4. In the Add New Domain Connection dialog, configure the following options:

    • In the Domain name text box, enter the name of the domain that you want to add.

    • In the Domain alias text box, enter the alias for the domain which will be used to address the domain on the Self-Service Site. This field is required because you can use the domain connection in the user scope.

    • To have Password Manager access the domain using the Password Manager Service account, click Password Manager Service account. Otherwise, click Specified user name and password and then enter user name and password in the corresponding text boxes. Note, that the selected account should have the required permissions.

  5. Click Save.

    IMPORTANT: After you create a domain connection on the General Settings > Domain Connections tab, you can use it in the user scope, helpdesk scope and password policies by selecting the connection in the Add Domain Connection dialog on the corresponding page of the Administration Site. For example, to use the domain connection in the user scope of your Management Policy, open the user scope of this Management Policy, click Add domain connection, and select the corresponding connection from the list.

Changing the access account for domain connections

After setting up domain connections, you can change the access account. Under access accounts, Password Manager will access the AD LDS instance and a specified application directory partition.

To change domain access account

  1. On the home page of the Administration Site, click the General Settings > Domain Connections tab.

  2. Select the domain connection you want to modify and click Edit.

  3. In the Edit Domain Connection dialog, select Password Manager Service account to have Password Manager access the domain using the Password Manager Service account. Otherwise, click Specified user name and password, then enter the user name and password in the corresponding text boxes.

    NOTE: The selected account must have the required permissions. For more information, see Configuring permissions for domain management account.

  4. Click Save.

    NOTE: The updated settings will be applied everywhere where this domain connection is used.

Specifying advanced settings for domain connection

After you have created a domain connection, you can specify advanced settings for the connection: domain controllers and Active Directory sites of the managed domain. For more information about domain controllers, see Domain Controller.

To specify domain controllers

  1. On the Administration Site, click the General Settings > Domain Connections tab.

  2. On the Domain Connections page, select the domain connection for which you want to specify domain controllers and click Edit.

  3. On the Advanced settings tab of the Edit Domain Connection dialog, click Add under the domain controllers table and select required domain controllers, and click Add.

  4. Click Save. Note, that the updated settings will be applied everywhere where this domain connection is used.

Active Directory sites

By specifying Active Directory sites in the domain connection settings you select the site in which you want Password Manager to replicate changes as soon as they occur in other sites. This can reduce downtime that users may experience when your environment has several Active Directory sites and changes may not get immediately replicated between the sites.

For example, when users unlock their accounts on the Self-Service Site, this operation may occur in one site. But when they attempt to log in to their computers, this operation may occur in another site, to which the information about the unlocked account has not been replicated yet. In this case, users will not be able to log in until the information is replicated to the second site. To mitigate this issue, select the Active Directory sites in which you want to replicate changes immediately in the domain connection settings.

NOTE: You cannot force replication of changes related to password policies. Such changes are replicated by Active Directory.

To specify Active Directory sites

  1. On the Administration Site, click the General Settings > Domain Connections tab.

  2. On the Domain Connections page, select the domain connection for which you want to specify domain controllers and click Edit.

  3. On the Advanced Settings tab of the Edit Domain Connection dialog, click Add under the Active Directory sites table, select required sites, and click Add.

  4. Click Save.

    NOTE: Password Manager will apply the updated settings everywhere where this domain connection is used.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级