The symmetry rule ensures that password or its part does not read the same in both directions.
For example, if you enable the Reject passwords that read the same in both directions option, then the password “redivider” will be rejected.
To configure the symmetry rule
- Follow the steps outlined in Configuring Password Policy Rules.
- On the Policy Rules tab, click Symmetry Rule to expand the rule settings.
- Under Symmetry Rule, select the Password must comply with symmetry criteria check box, and then specify the following options:
Table 24: Symmetry criteria
Reject passwords that read the same in both directions (pass8ssap) |
Select to reject passwords that are palindromes. |
Maximum number of beginning characters that match ending characters of password if read backwards (pas47sap) |
Specify the number of beginning characters matching the ending characters of password, if read backwards, which the policy will tolerate before rejecting a password. |
Maximum number of consecutive characters within a password, that read the same in both directions (pass4554word) |
Specify the number of password characters in a row that read the same in both directions, which the policy will tolerate before rejecting a password. |
Case sensitive |
Select to define this rule as case sensitive. |
You can use this rule to create your own password policy message to be displayed on the Self-Service site when users change or reset their passwords. For example, use this rule to enter the settings of the local or domain password policy applied to the server on which AD LDS is running.
If you want to hide all other policy messages and display your custom message to users, enable this policy rule, enter the message text, and select the Hide messages from other policy rules and display only this message check box. If you do not select this check box, messages from all enabled policy rules will be displayed.
Note, that this rule does not check the password compliance with the configured password policy. Configure this rule to display your custom message instead of or together with other policy messages when users change or reset passwords on the Self-Service site.
To configure the custom rule
- Follow the steps outlined in Configuring Password Policy Rules.
- On the Policy Rules tab, click Custom Rule to expand the rule settings.
- Under Custom Rule, select the Enable check box to enable this rule.
- Select the Hide messages from other policy rules and display only this message check box if you want users to see only the custom password rule message and hide all other password policy messages.
- In the text box, enter the rule message in the default language (English). To enter the message in other languages, click the Add new language link, select the language, specify the message and click OK. Note, that only languages of the user interface of the Self-Service site are available in the list.
To delete a password policy
- On the home page of the Administration site, click the Password Policies tab.
- Click the One Identity Password Policies link under the AD LDS instance that you want to manage.
- Click Remove under the policy that you want to delete.
|
NOTE: When you delete a password policy, the deleted policy is no longer valid for an AD LDS instance. To restore a deleted password policy, create a new policy and manually configure its settings as required. |
Enable S2FA for Administrators and Enable S2FA for HelpDesk Users
This section describes the steps to enable 2FA to protect AD LDS Administration site and Helpdesk site users.
To enable 2FA for Administrators and HelpDesk Users
-
On the home page of the AD LDS Administration site, click the Management/2FA enforcement tab.
-
Select Use Secure Token Server for authentication checkbox for admin authentication and/or helpdesk authentication, then choose one of the Secure Token Server providers, which you need to use for 2FA authentication. The login interface presentation can be selected from the Choose the behaviour of the authentication dropdown.
-
Click Save to save the settings.
NOTE: At least one Secure Token Server provider needs to be configured. If there is an external provider, which loads their content while sending a X-Frame-Options : Deny header, then the iframe option will not work. In this case, the redirect or the popup option is required.