How To Guide: One Identity Password Manager 5.8.2
How To Guide: One Identity Password Manager 5.8.2
One Identity Password Manager 5.8.2
How to Guide
Copyright 2018 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide
is furnished under a software license or nondisclosure agreement. This software may be used or copied
only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser’s personal use without the written permission of
One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes no
representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity does not make any commitment to update the information
contained in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (http://www.OneIdentity.com) for regional and international office information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at http://www.OneIdentity.com/legal/patents.aspx.
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at www.OneIdentity.com/legal. All other trademarks are the property of their
respective owners.
Legend
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting
information.
Password Manager How to Guide
Updated - December 2018
Version - 5.8.2
Contents
Overview 6
What’s new in Password Manager 5.8.2 6
System requirements 6
Minimum permissions 9
Licensing 10
Using a license from a previous version 10
Telephone verification license 11
Starling 2FA license 11
RADIUS Two-Factor Authentication 11
How to obtain a new license key 11
Upgrading 12
Upgrade considerations 12
Is it possible to upgrade the Password Manager servers first and then the SPE
(Secure Password Extension) at a later time? 12
Is it possible to roll back after the upgrade? 13
Does Password Policy Manager have to be upgraded on the Domain Controllers? 13
Upgrading from Password Manager 5.6.3 or later versions 14
Upgrading the Secure Password Extension 14
To remove the existing and assign a latest-version package 15
To remove an assigned MSI package 15
To deploy and configure Secure Password Extension 15
Upgrading Offline Password Reset 16
To remove the existing and assign a latest-version package 16
To remove an assigned MSI package 17
To deploy and configure Secure Password Extension 17
Additional information regarding upgrading 18
Configuration 30
Common Sample Questions 32
Helpdesk scope and options 33
Reinitialization 37
Reports 38
How to configure reports 39
Can you use a report database from a previous version of Password Manager? 39
Starling 2FA 40
Customizations 41
Customization tool 41
Troubleshooting 42
How to enable logging 42
To enable logging for Password Manager service 43
To enable logging for a stand-alone server 44
To enable logging for the Secure Password Extension (SPE) 44
To enable Password Policy Manager (PPM) logging: 45
Common solutions 46
How to move the Password Manager database 46
Changing the Password Manager service account 47
Workflow design considerations 48
When to use one Workflow 48
Benefit: 48
About us 51
Contacting us 51
Technical support resources 51
Overview
This guide is intended for Password Manager 5.8.2. For versions 5.6.3 up to and including
5.7.1, please refer to the 5.7 How-To Guide. Unless otherwise stated, any reference to
Password Manager in this guide is only applicable to versions 5.8.2.
For information on the Product Life Cycle, please visit the Password Manager product page
at https://support.oneidentity.com/password-manager/.
System requirements
This section provides system requirements for installing and running Password Manager
and its components.
Table 1:
Password Manager and supported operating systems
5.8.x l Microsoft Windows Server 2008 R2
l Microsoft Windows Server 2012
l Microsoft Windows Server 2012 R2
l Microsoft Windows Server 2016
NOTE: Password Manager is not supported on Windows
Server Core mode setup.
Table 2:
Password Policy Manager and supported operating systems
5.8.x l Microsoft Windows Server 2008 R2
l Microsoft Windows Server 2012
l Microsoft Windows Server 2012 R2
l Microsoft Windows Server 2016
NOTE: Password Manager is not supported on Windows
Server Core mode setup.
Table 3:
Secure Password Extension and supported operating systems
5.8.x l Microsoft Windows 7 Service Pack 1
l Microsoft Windows 8
l Microsoft Windows 8.1
l Microsoft Windows 10
NOTE: Password Manager is not supported on Windows
Server Core mode setup.
Table 4:
Offline Password Reset and supported operating systems
5.8.x l Microsoft Windows 7 Service Pack 1
l Microsoft Windows 8
l Microsoft Windows 8.1
l Microsoft Windows 10
NOTE: Password Manager is not supported on Windows
Server Core mode setup.
Table 5:
Password Manager and supported Microsoft SQL server
5.8.x l Microsoft SQL Server 2008
l Microsoft SQL Server 2008 R2
l Microsoft SQL Server 2008 R2 Service Pack 2
l Microsoft SQL Server 2012
l Microsoft SQL Server 2012 R2
l Microsoft SQL Server 2014
l Microsoft SQL Server 2016
Table 6:
Password Manager and supported Web browsers
5.8.x l Microsoft Internet Explorer 11
l Microsoft Edge
l Mozilla Firefox 10 or later
l Apple Safari 5
l Google Chrome 15 or later
Table 7:
Microsoft .Net Framework
5.8.x l Microsoft .NET Framework 4.6.1
l Microsoft .NET Framework 4.7
l Microsoft .NET Framework 4.7.1
For additional detailed requirements, see the Password Manager 5.8.2 Release Notes.
l Password Manager service account must be a member of the local Administrators
group on the server where Password Manager is installed
l The Application pool identity account must be a member of the IIS_IUSRS local
group when using IIS 7.0. The account must also have permissions to create files in
the <Password Manager installation folder>\App_Data folder.
l The Application pool identity account must have the Full Control permission set for
the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\One
Identity\Password Manager
Licensing
The Password Manager license specifies the maximum number of user accounts enabled
for management by Password Manager in all managed domains. When launching the
Administration site, Password Manager counts the actual number of user accounts defined
in all of the User scopes, and compares it with the maximum number specified by the
license. If the number exceeds the maximum licensed number, a license violation occurs.
A warning message is displayed on every connection to the Administration site of Password
Manager. In the event of a license violation, you have the following options:
l Exclude a number of user accounts from the user accounts managed by Password
Manager to bring your license count in line with the licensed value and reconnect to
the Administration site to recalculate the license number
l Remove one or more managed domains to decrease the number of managed
user accounts
l Purchase a new license with a greater number of user accounts. Click Licensing on
the left menu and then select Install License
Note that the following items are not limited by the license:
l The number of computers connected to the Administration, Self-Service, and
Helpdesk sites of Password Manager
l The number of Password Manager instances in a large enterprise. Password Manager
can be installed on multiple servers for enhanced performance and fault tolerance
with no impact to the license count
Upgrading
Upgrade considerations
Upgrading from Password Manager 5.6.3 or later versions
Upgrading the Secure Password Extension
Upgrading Offline Password Reset
Upgrade considerations
Password Manager 5.8.2 only supports upgrading from 5.6.3 or later.
If you have customized Password Manager in any manner, it is recommended to backup
any of the modified files prior to upgrading as the upgrade process will remove the
folder structure of the previous version of Password Manager, thus removing any
custom settings.
It is not recommended to replace these files after upgrading, however you can refer to
them for any custom settings. For instance, if you have changed the OU in which the _
QPMStorageContainer account is stored in, then change the new file settings accordingly as
the rest of the file will contain version-specific information. Failure to retain the new file
could result in the product not functioning.
1. Leave one old Password Manager server live (such as 5.6.3) so that the old SPE
clients can still reach it.
2. Create a GPO using the Password Manager ADM template to force the Self Service
URL to the new server
NOTE: Older SPE clients will work with the new Self Service site, but only if URL redir-
ection is enabled.
3. Update DNS to have the old Password Manager server IP updated to the new
server IP.
It is recommended to upgrade the SPE clients as soon as possible to avoid having
the overlap.
NOTE: Although 5.6.x components such as the SPE and Password Policy Manager may
work with later Password Manager server versions, it has not been fully tested and is
not officially supported.
NOTE: The Migration Wizard must be run as the account running Password
Manager service as only that account will have the ability to update and re-
encrypt the user profiles.
When upgrading Secure Password Extension, do not forget to upgrade the prm_gina.adm
(x) administrative template with the one located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD.
The prm_gina.adm administrative template file is located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD. Before using
the file, copy it from the installation CD. The recommended target location is the \inf
subfolder of the Windows folder on a domain controller.
The prm_gina.admx administrative template file is located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD. This
administrative template is designed to be used with Windows Server 2008 R2 and later
operating systems. Before using this administrative template, copy the prm_gina.admx
and prm_gina.adml files from the installation CD to the following locations:
%systemroot%\policyDefinitions (for the prm_gina.admx file) and
%systemroot%\policyDefinitions\En-US (for the prm_gina.adml file).
When upgrading Offline Password Reset, do not forget to upgrade the prm_gina.adm(x)
administrative template with the one located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD.
The prm_gina.adm administrative template file is located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD. Before using
the file, copy it from the installation CD. The recommended target location is the \inf
subfolder of the Windows folder on a domain controller.
The prm_gina.admx administrative template file is located in the \Password
Manager\Setup\Administrative Template\ folder of the installation CD. This
administrative template is designed to be used with Windows Server 2008 R2 and later
operating systems. Before using this administrative template, copy the prm_gina.admx
and prm_gina.adml files from the installation CD to the following locations:
%systemroot%\policyDefinitions (for the prm_gina.admx file) and
%systemroot%\policyDefinitions\En-US (for the prm_gina.adml file).
Secure Password Extension is an application that provides one-click access to the
complete functionality of the Self-Service site from the Windows logon screen. Secure
Password Extension also provides dialog boxes displayed on end-user computers. These
dialog boxes notify users who must create or update their Questions and Answers profiles
with Password Manager.
Figure 1:
Common Issues
Common issues for the SPE client include network restrictions such as load balancers,
proxy servers and Certificate Authorities. If the SPE is restricted by any of these then the
Password Manager server cannot be contacted and the user will receive an error.
Table 8:
Proxy settings
Enable proxy server access This policy setting determines whether connections to the
Self-Service from the Windows logon screen are
established through the specified proxy server.
Enable proxy server access Specifies the settings required to enable proxy server
access to the Self-Service site from the Windows logon
screen.
Configure optional proxy Specifies optional settings for the proxy server access.
settings
Workarounds
As previously noted, common issues include conflicts with proxy servers, load balancers
and firewalls.
1. Logon to the workstation and confirm that the Self-Service URL that is published on
the desktop (shortcut) works
2. Make note of the URL that is set in the browser address bar
3. Logon to the Password Manager Admin site and under General Settings | Realm
Instances ensure the URL is the same.
If the URL is incorrect in the Admin site:
l Update the setting on the Realm Instances page to the correct desired URL
If the URL is correct in the Admin site:
l Check in Active Directory under System\One Identity for any Service
Connection Points. You can either use ADSIEdit or Active Directory Users
and Computers MMC Snap-Ins.
Any stale or invalid Service Connections Points available, must be deleted.
In order to determine whether or not the Service Connection Points are valid, you will have
to right-click and select Properties on the object and click Attribute Editor. Look for
keywords and then click Edit. Look for the entries called CONFIGURATION.SERVER_
URLS, CONFIGURATION.TIME_STAMP and also VERSION.ProductVersion.
Example:
Figure 2:
Requirements
l The client machine must have the Offline Password Reset utility installed along with
the SPE (Secure Password Extension).
l The user must have Internet access from another machine or Internet-capable
Smartphone to access the public-facing corporate Password Manager Self
Service site
l The Forgot My Password workflow (or similar) must have the Allow Users to reset
passwords offline option enabled on the Change Password In Active Directory action.
l Cached logon attempts must be configured
l The Password Manager administrative template must be configured to turn on Offline
Reset functionality
3. Use the administrative template prm_gina.adm or prm_gina.admxto turn on the
offline password reset functionality. The administrative template file is located in the
\Password Manager\Setup\Administrative Template\ folder of the
installation CD. In the template, enable the following settings:
l Display the Offline Password Reset button (command link)
l Set custom name for the Offline Password Reset button (command link) in
<Language>”
Figure 5:
Figure 6:
Figure 7:
5. Save the workflow.
To provide authentication during the offline password reset procedure, a shared
secret is used. The shared secret is stored locally on the user’s computer and its copy
is published in Active Directory in the computer’s account during the first logon if the
computer is connected to the domain. By default, only domain administrators and the
Overview
In addition to providing the ability to manage user passwords, Password Manager also
provides the ability to configure Password Policies similar to native Password Policies
and Windows Fine-Grained Password Policies found in Active Directory. Password
Manager Password policies can provide restrictions such as password length, dictionary
lookup and history.
The Password Policies are stored in Group Policy Objects (GPOs) and are applied by
linking the GPO to a target container defined in Active Directory, such as an Organizational
Unit or group.
Password Policy Manager (PPM) is an optional and independently deployed component of
Password Manager. The Password Policy Manager component is necessary to enforce
password policies configured in Password Manager in instances when users change their
passwords using tools other than Password Manager. To enforce password policies which
you define with Password Manager, you must deploy Password Policy Manager on all
Domain Controllers (DCs) in a managed domain.
How it Works
When a user changes a password in Password Manager, the new password is checked right
away, and if it complies with password policies configured in Password Manager, the new
password is accepted.
When a user changes a password outside of Password Manager, such as pressing
CTRL+ALT+DELETE, the new password will not be checked immediately by Password
Manager. The password's compliance with password policy rules will be checked on a
Domain Controller. This is why Password Policy Manager must be installed on all Domain
Controllers in a managed domain. If Password Policy Manager is not installed, in this case
when the user changes password not in Password Manager, password policies configured in
Password Manager will be ignored.
NOTE: Password Policy Manager does not override the native Windows security policy
rules, rather the more restrictive of the two rules will be enforced. So if both
Password Manager and the Windows Password policy have minimum length require-
ments and they are not the same, then the more restrictive of the two will be
enforced. Password Manager does not overwrite or exclude the native default
Windows policies. If you don't want those in place, you will need to disable them.
l PasswordPolicyManager_x86.msi
Or
l PasswordPolicyManager_x64.msi
The installation packages are located in the \Password Manager\Setup\ folder on the
installation media.
NOTE: You must select both or the policy will not be applied to users. The
options set here are exactly as you would see the Link option in the native
Microsoft Group Policy Management Console (GPMC.msc) MMC Snap-In.
10. Once the Policy Rules are configured and the Policy is linked, click the Policy
Settings tab and un-check the Disable this policy feature to enable the policy
11. Click Save
Configuration
The following are the common configuration recommendations:
l Use the same Domain Connection for User Scope, Helpdesk Scope and Password
Policy settings.
Example:
Figure 8:
Example:
Figure 10:
Why?
The duplicate entries increase the size of the Shared.storage file, which in turn gets
replicated to Active Directory, which will increase network traffic with a larger replicated
data size. The duplicate entries also cause numerous duplicate connections with the
Scheduled Tasks and thus increases the time it takes to complete each Scheduled Task.
l It is not possible to use Optional questions to authenticate for the Helpdesk site. Only
Mandatory and Helpdesk questions can be used
l It is recommended to use a Helpdesk question as the Helpdesk staff can see the
answers which allows the Helpdesk staff to authenticate the user
l To pre-populate and pre-register users, use the Bulk Import Wizard. Please follow
solution 128944:
https://support.oneidentity.com/password-manager/kb/128944
Figure 11:
Password Manager allows a Helpdesk group to be added for each Management Scope. If
you require different Helpdesk groups to be able to administer different scopes of users,
additional Management Scopes will have to be created to accommodate the restrictions for
the Helpdesk groups.
The Scope of who can logon to the Helpdesk site can be configured in the Admin site for
each Management Policy:
To select the Groups who can access the Helpdesk site, first click Helpdesk Scope, then
click Add domain connection.
Figure 13:
Add in the Groups to be allowed access to the Helpdesk site and perform Helpdesk actions.
Reinitialization
As of version 5.5.1, Password Manager has the ability to change the configuration options,
such as the encryption level and the attribute used to store Users’ Q&A Profile settings
without the need to reinstall or modify configuration files.
If you choose to perform a Reinitialization, please keep the following in mind:
When changing the Encryption algorithm within the PMAdmin site | General settings |
Reinitialization section the following message occurs:
What are the next steps?
1. Once the setting has been changed select Save
2. Provide a password to the new configuration file
3. Select Export (do not click Save yet)
4. Click Save after the Export is complete or it will not work
5. Launch the Migration Wizard found in the Password Manager Autorun and select:
Update users’ Q&A profiles with new instance settings and follow the wizard
Reports
Reporting is an optional component. The Reports section of the Admin site includes a
number of pre-defined reports that help you perform the following tasks:
l Track user registration activity
l Analyze information about what actions are performed by users in Password Manager
l Check users’ registration status
l View a list of users whose Questions and Answers profiles must be updated to comply
with the current administrator-defined settings
l Track helpdesk operators’ activity
To use Password Manager Reports, you need to connect to a Microsoft SQL Server and a
Microsoft Reporting Service Server (SSRS).
To use the User Action History functionality, you need to connect to an SQL Server only.
NOTE: When a user registers with Password Manager, the Q&A profile information is
stored within the user object in Active Directory. Reporting only allows the ability to
query user statistic information and does not store the profile data in the database.
If you choose to take advantage of the Password Manager reports, the following is
required:
l Microsoft SQL Reporting Services (SSRS) must be installed and configured
l Please note that if the SQL Server service and SSRS are on different hosts, you
may encounter a “Double-Hop” authentication issue. Please see this article for
more information:
https://support.oneidentity.com/password-manager/kb/69693
l The Password Manager service account must have sufficient permissions to create
and write to a database on the SQL server
NOTE: You cannot pre-create the database. Password Manager must create it.
l The Password Manager service account must have sufficient permission to publish
reports on the SSRS server.
1. Navigate to the Password Manager Admin site
2. Click the Reports tab
3. Select Edit Connections
4. Enter the name of the SQL Server
5. Provide the name of the database the Password Manager will create
6. Provide the name of the account that will create the database server.
NOTE: This account must have the DB Creator role.
7. Click Next
8. Enter the Report Server URL which can be obtained from the SQL Reporting Service
Configuration Manager (on the SQL Reporting Services server)
NOTE: As of Password Manager 5.6.x, HTTPS is supported.
9. Enter the Report Manager URL.
10. Click OK.
11. The Reports are now configured. However, in order to populate the data the
Scheduled Tasks found under the General Settings tab must be run.
Please also refer to Video Solution 106401 which demonstrates how to configure Reports in
Password Manager:
https://support.oneidentity.com/password-manager/kb/106401
Starling 2FA
To add Starling 2FA in Password Manager, perform the following:
Figure 16:
For full configuration details please refer to the following video demonstration:
https://support.oneidentity.com/kb/255662.
Customizations
You can now create custom activities and workflows in Password Manager. An embedded
user interface designer allows you to easily create user interface for your custom
activities. You can also convert any built-in activity to custom and modify its behavior by
PowerShell scripts. The import/export functionality enables you to share custom activities
and workflows with Password Manager instances outside of the replication group. This
feature requires PSO assistance and is not covered by the technical support.
For PSO assistance, please contact your Account Manager or Sales Representative.
Customization tool
The Customization Tool available for 5.7.1 and 5.8.x can be downloaded here:
https://support.oneidentity.com/password-manager/kb/254176.
Troubleshooting
After you upgrade, there is a possibility that the Local.storage file changes the value of
“role” from “Primary” to “Secondary” if it detects any existing Service Connection Points in
Active Directory.
This issue can happen in these scenarios: One Identity Password Manager
1. If you have an old Service Connection Point from a previous version (such as 4.7 or
5.0.3) and it was not cleaned up/removed from Active Directory
2. If you have more than one Password Manager server instance in the same domain
and you upgraded both. They may both default to “Secondary” as a precaution
Please keep in mind that if you have multiple Password Manager servers, one of these
must be “Primary” and all others “Secondary” for the same domain (realm) instances.
If you fall into either of the aforementioned scenarios, please check the settings in the
following file after you finish the overall upgrade process:
C:\ProgramData\One Identity\Password Manager\Local.storage
The setting is located near the top of the file:
<setting name=”role” value=”Secondary” />
Ensure only one Password Manager server has this setting:
<setting name=”role” value=”Primary” />
NOTE: If no servers are set to "Primary", designate one of your choosing and update
it. After the file is updated and saved, restart the Password Manager service on that
server only.
Figure 17:
The log files created on the Password Manager server are called:
l QPM.Service.Host_****-**-**.log
l QPM.UI.Admin.MVC_****-**-**.log
l QPM.UI.User.MVC_****-**-**.log
a. LogFolder and set the “Value data” to C:\ (You can specify any location/folder, but
the folder needs to be created beforehand)
b. LogLevel and set the “Value data” to All
Figure 18:
NOTE: If the keys Password Manager\Logging do not exist please create them.
Under Password Manager\Logging create the following strings:
Figure 19:
Once you are done gathering the logs, either delete the two new string values or change
LogLevel to a value of None. Failure to disable logging afterwards can result in the
server’s hard drive becoming full and disrupting all services for the server.
The logfiles generated will be QPM_SPE.log and QPM_SPEnroll.log (for all versions).
1. LogFolder and set the “Value data” to C:\ (You can specify any location/folder, but
the folder needs to be created beforehand)
2. LogLevel and set the “Value data” to ffffffff (8 F’s in Hexadecimal)
The logfile generated will be QPM.PPMgr_XXXX-XX-XX.log
Common solutions
l SSL Certificate is Invalid:
https://support.oneidentity.com/password-manager/kb/85083
l User Status Statistics errors:
https://support.oneidentity.com/password-manager/kb/129522
https://support.oneidentity.com/password-manager/kb/135020
l SSL options:
https://support.oneidentity.com/password-manager/kb/88265
l Expired certificate:
https://support.oneidentity.com/password-manager/kb/134732
Also see Solution 87872:
https://support.oneidentity.com/password-manager/kb/87872
NOTE: If you want to modify the service account after installing Password Manager
5.8.2, you cannot modify it by changing the account on Password Manager service
because the new account will not be able to read the current configuration.
NOTE: Due to security enhancements, a complex password is generated while
exporting the configuration. You must remember the password or store it in a
secure place, to use while importing the configuration.
2. Stop the Password Manager Service.
3. At the command prompt, type services.msc and select Password Manager
Service in the console and change the log on details.
4. Start the Password Manager Service.
NOTE: Before you continue, it is recommended to back up the One Identity
folder at C:\ProgramData.
5. Delete the One Identity folder at C:\ProgramData.
6. Restart the computer.
7. Open the Administration site.
8. On the Instance Initialization page, select Unique instance and click Save.
On the menu bar, click General Settings, then click the Import/Export tab
and import the configuration file, which was exported before changing the
service account.
1. Launch IIS (Internet Information Server)
2. Select Application Pools
3. Right-click PMAdmin
4. Select Advanced settings
5. Select Identity
6. Within the Application Pool identity select “Set…”
7. Then set the new credentials
Benefit:
l Reduced administrative overhead (less items to update – i.e. email templates)
l Reduced size of the Shared.storage file which contains all Q&A profile settings,
including all associated Questions, Email templates and additional language additions
Drawback:
l Cannot provide different requirements for exception users/groups (i.e. separate
requirements for service accounts)
Benefit:
l Ability to provide different requirements for different subsets of users
Drawback:
Increased Shared.storage file leading to increased memory usage of the Password
Manager Service process and increased size of the corresponding _
QPMStorageContainer AD account which in turn will increase replication traffic due to
the size of the user account
Figure 20:
Summary
If possible, keep the number of Workflows and associated customizations within each to an
absolute minimum. The more you add, the larger the Shared.storage file grows and in
Notes
If you are going to use the same Workflow for all domains, you can easily add in the
required domain in the User Scope section:
Figure 21:
This will apply the Workflow settings to users within all Domains listed and the
corresponding groups that you select in each respective Domain.
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
Contacting us
For sales or other inquiries, visit https://www.oneidentity.com/company/contact-us.aspx
or call +1-800-306-9329.
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to-videos at www.YouTube.com/OneIdentity
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product