立即与支持人员聊天
与支持团队交流

Identity Manager 9.2 - Identity Management Base Module Administration Guide

Basics for mapping company structures in One Identity Manager Dynamic roles Departments, cost centers, and locations
One Identity Manager users for managing departments, cost centers, and locations Basic information for departments, cost centers, and locations Creating and editing departments Creating and editing cost centers Creating and editing locations Setting up IT operating data for departments, cost centers, and locations Assigning identities, devices, and workdesks to departments, cost centers, and locations Assigning company resources to departments, cost centers, and locations Creating dynamic roles for departments, cost centers, and locations Dynamic roles with incorrectly excluded identities Assign organizations Specifying inheritance exclusion for departments, cost centers, and locations Assigning extended properties to departments, cost centers, and locations Certifying departments, cost centers, and locations Reports about departments, cost centers, and locations
Identity administration
One Identity Manager users for managing identities Basics for managing identities Creating and editing identities Assigning company resources to identities Displaying the origin of identities' roles and entitlements Analyzing role memberships and identity assignments Deactivating and deleting identities Deleting all personal data Limited access to One Identity Manager Changing the certification status of identities Displaying the identities overview Displaying and deleting identities' Webauthn security keys Determining the language for identities Determining identities working hours Manually assigning user accounts to identities Entering tickets for identities Assigning extended properties to identities Reports about identities Basic configuration data for identities
Managing devices and workdesks Managing resources Setting up extended properties Configuration parameters for managing departments, cost centers, and locations Configuration parameters for managing identities Configuration parameters for managing devices and workdesks

Editing password policies for identities

Predefined password policies are supplied with the default installation that you can use or customize if required.

To edit a password policy

  1. In the Manager, select the Identities > Basic configuration data > Password policies category.

  2. In the result list, select the password policy.

  3. Select the Change main data task.

  4. Edit the password policy's main data.

  5. Save the changes.
Detailed information about this topic

Creating password policies for identities

Predefined password policies are supplied with the default installation that you can use or customize if required. You can also define your own password policies.

To create a password policy

  1. In the Manager, select the Identities > Basic configuration data > Password policies category.

  2. On the main data form, enter the main data of the password policy.

  3. Save the changes.
Detailed information about this topic

General main data for password policies

Enter the following main data of a password policy.

Table 37: main data for a password policy

Property

Meaning

Display name

Password policy name. Translate the given text using the button.

Description

Text field for additional explanation. Translate the given text using the button.

Error Message

Custom error message generated if the policy is not fulfilled. Translate the given text using the button.

Owner (Application Role)

Application roles whose members can configure the password policies.

Default policy

Mark as default policy for passwords. This option cannot be changed.

NOTE: The One Identity Manager password policy is marked as the default policy. This password policy is applied if no other password policy can be found for identities, user accounts, or system users.

Password policy settings

Define the following settings for a password policy on the Password tab.

Table 38: Policy settings

Property

Meaning

Initial password

Initial password for newly created user accounts. The initial password is used if a password is not entered when you create a user account or if a random password is not generated.

NOTE: The initial password is not used as an identity's system user password. You can implement this behavior by customizing if required.

Password confirmation

Reconfirm password.

Minimum Length

Minimum length of the password. Specify the number of characters a password must have. If the value is 0, no password is required.

Max. length

Maximum length of the password. Specify the number of characters a password can have. The maximum permitted value is 256.

Max. errors

Maximum number of errors. Set the number of invalid passwords attempts. The number of failed logins is only taken into account when logging in to One Identity Manager. If the value is 0, the number of failed logins is not taken into account.

This data is only taken into account if the One Identity Manager login was through a system user or identity based authentication module. If a user has exceeded the maximum number of failed logins, the identity or system user will not be able to log in to One Identity Manager.

You can use the Password Reset Portal to reset the passwords of identities and system users who have been locked. For more information, see the One Identity Manager Web Designer Web Portal User Guide.

Validity period

Maximum age of the password. Enter the length of time a password can be used before it expires. If the value is 0, then the password does not expire.

Password history

Enter the number of passwords to be saved. If, for example, a value of 5 is entered, the user's last five passwords are stored. If the value is 0, then no passwords are stored in the password history.

Minimum password strength

Specifies how secure the password must be. The higher the password strength, the more secure it is. The value 0 means that the password strength is not tested. The values 1, 2, 3 and 4 specify the required complexity of the password. The value 1 represents the lowest requirements in terms of password strength. The value 4 requires the highest level of complexity.

Name properties denied

Specifies whether name properties are permitted in the password. If this option is set, name properties are not permitted in passwords. The values of these columns are taken into account if the Contains name properties for password check option is set. In the Designer, adjust this option in the column definition. For more information, see the One Identity Manager Configuration Guide.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级