This section discusses actions you can take to provide secure access for user accounts and to manage user privileges in Identity Manager.
Resource password policies establish the limitations for passwords. Strong password policies provide added security to help protect resources from unauthorized login attempts. You can edit a password policy to set or select values for a range of characteristics.
To begin working with password policies, click Security on the main menu, and then click Policies.
To edit a password policy, click it in the Policies list. To create a password policy, select String Quality Policy from the New list of options.
For more information on policies, see Configuring Identity Manager Policies.
Password policies are the default type for string quality policies. After naming and providing an optional description for the new policy, select options and parameters for the rules that define it.
Length rules set the minimum and maximum required character length for a password. Select this option to enable the rule, and then enter a limit value for the rule.
Choose one of the policy type buttons . If you choose the Other option, you must enter the type in the text field provided.
Character type rules establish the minimum and maximum characters of certain types and number that can be included in a password.
These include:
Minimum and maximum alphabetic, numeric, uppercase, lowercase, and special characters
Minimum and maximum embedded numeric characters
Maximum repetitive and sequential characters
Minimum beginning alphabetic and numeric characters
Enter a numeric limit value for each character type rule; or enter All to indicate that all characters must be of that type.
Minimum Number of Character Type Rules
You can also set the minimum number of character type rules that must pass validation, as illustrated in Figure 3–7. The minimum number that must pass is one. The maximum cannot exceed the number of character type rules that you have enabled.
To set the minimum number that must pass to the highest value, enter All.
You can choose to check passwords against words in a dictionary to guard against simple dictionary attacks.
Before you can use this option, you must:
Configure the dictionary
Load dictionary words
You configure the dictionary from the Policies page. For more information about how to set up the dictionary, see What is a Dictionary Policy?.
You can prohibit re-use of passwords that were used immediately preceding a newly selected password.
In the Number of Previous Passwords that Cannot be Reused field, enter a numeric value greater than one to prohibit re-use of the current and preceding passwords. For example, if you enter a numeric value of 3, the new password cannot be the same as the current password or the two passwords used immediately before it.
You can also prohibit re-use of similar characters from passwords used previously. In the Maximum Number of Similar Characters from Previous Passwords that Cannot be Reused field, enter the number of consecutive characters from the previous password or passwords that cannot be repeated in the new password. For example, if you enter a value of 7, and the previous password was password1, then the new password cannot be password2 or password3.
If you enter a value of 0, then all characters must be different regardless of sequence. For example, if the previous password was abcd, then the new password cannot include the characters a, b, c, or d.
The rule can apply to one or more previous passwords. The number of previous passwords checked is the number specified in the Number of Previous Passwords that Cannot be Reused field.
You can enter one or more words that the password may not contain. In the entry box, enter one word on each line.
You can also exclude words by configuring and implementing the dictionary policy. For more information, see What is a Dictionary Policy?.
You can enter one or more attributes that the password may not contain.
You can specify the following attributes:
accountID
firstname
fullname
lastname
You can change the allowed set of “must not contain” attributes for passwords in the UserUIConfig configuration object. See Must Not Contain Attributes in Policies for more information.
Password policies are established for each resource. To put a password policy in place for a specific resource, select it from the Password Policy list of options, which is located in the Policy Configuration area of the Create or Edit Resource Wizard: Identity Manager Parameters pages.
If a user forgets his password or his password is reset, the user can answer one or more account authentication questions to gain access to Identity Manager. You establish these questions, and the rules that govern them, as part of an Identity Manager account policy. Unlike password policies, Identity Manager account policies are assigned to the user directly or through the organization assigned to the user (on the Create and Edit User pages).
Click Security in the main menu, and then click Policies.
Select “Default Identity Manager Account Policy” from the list of policies.
Authentication selections are offered in the Secondary Authentication Policy Options area of the page.
Important! When first set up, the user should log in to the User interface and provide initial answers to his authentication questions. If these answers are not set, the user cannot successfully log in without his password.
The authentication question policy determines what happens when a user clicks on the Forgot Your Password? button on the login page or when accessing the Change My Answers page. User Authentication describes each option.
Option |
Description |
---|---|
All |
Requires the user to answer all policy-defined and personalized questions. |
Any |
Identity Manager displays all policy-defined and personalized questions. You must specify how many questions the user must answer. |
Next |
Requires the user to answer all possible policy-defined questions the first time that user logs in. If the user clicks the Forgot Your Password? button during login, Identity Manager displays the first question. If the user answers incorrectly, Identity Manager displays the next question, and so on until the user answers an authentication question correctly and logs in, or is locked out based on the specified failure attempts limit. User-generated questions are not supported for this policy. |
Random |
Allows the administrator to specify how many questions the user must answer. Identity Manager randomly selects and displays the specified number of questions from the list of questions defined in the policy as well as those the user has defined. The user must answer all questions displayed. |
Round robin |
Identity Manager selects the next question from the list of configured questions and assigns this question to the user. The first user is assigned the first question in the list of authentication questions, and the second user is assigned the second question. This pattern continues until the number of questions is exceeded. At that point, questions are assigned to users in sequential order. For example, if there are 10 questions, the 11th and 21st users are assigned the first question. The selected question is the only one that is displayed. If you want the user to answer a different question every time, use the Random policy and set the number of questions to 1. Users cannot define their own authentication questions. See Personalized Authentication Questions for more information about this feature. |
You can verify your authentication choices by logging in to the Identity Manager User interface, clicking the Forgot Your Password? button, and answering the presented question or questions.
Figure 3–8 shows an example of the User Account Authentication screen.
In the Identity Manager account policy, you can select an option to allow users to supply their own authentication questions in the User and Administrator interfaces. You can additionally set the minimum number of questions that the user must provide and answer to be able to log in successfully by using personalized authentication questions.
Users then can add and change questions from the Change Answers to Authentication Questions page. An example of this page is shown in Figure 3–9.
When a user successfully authenticates by answering one or more questions, by default he is challenged by the system to provide a new password. You can configure Identity Manager to bypass the change password challenge, however, by setting the bypassChangePassword system configuration property for one or more Identity Manager applications.
For instructions on editing the system configuration object, see Editing Identity Manager Configuration Objects.
To bypass the change password challenge for all applications following successful authentication, set the bypassChangePassword property as follows in the system configuration object.
<Attribute name="ui" <Object> <Attribute name="web"> <Object> <Attribute name=’questionLogin’> <Object> <Attribute name=’bypassChangePassword’> <Boolean>true</Boolean> </Attribute> </Object> </Attribute> ... </Object> ...
To disable this password challenge for a specific application, set it as follows.
<Attribute name="ui"> <Object> <Attribute name="web"> <Object> <Attribute name=’user’> <Object> <Attribute name=’questionLogin’> <Object> <Attribute name=’bypassChangePassword’> <Boolean>true</Boolean> </Attribute> </Object> </Attribute> </Object> </Attribute> ... </Object> ... |
You can assign Identity Manager administrative privileges, or capabilities, to users as follows:
Admin Roles. Users assigned an Admin Role inherit the capabilities and controlled organizations defined by the role. By default, all Identity Manager user accounts are assigned the User Admin Role when created. For detailed information about Admin Roles and creating an Admin Role, see Understanding and Managing Identity Manager Resources in Chapter 5, Roles and Resources.
Capabilities. Capabilities are defined by rules. Identity Manager provides sets of capabilities grouped into functional capabilities that you can select from. Assigning capabilities allows for more granularity in assigning administrative privileges. For information about capabilities and creating capabilities, seeUnderstanding and Managing Capabilities in Chapter 6, Administration.
Controlled organizations. Controlled organizations grant administrative control privileges over specified organizations. For more information, see Understanding Identity Manager Organizations in Chapter 6, Administration.
For more information about Identity Manager Administrators and administrative duties, see Chapter 6, Administration