Go to main content
1/10
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
Securing Logon Manager
1.1
Deploying Logon Manager in Directory Environments
1.1.1
How Logon Manager Extends Your Active Directory Schema
1.1.2
How Logon Manager Synchronizes with Active Directory
1.1.3
How Logon Manager Handles and Stores Application Credentials
1.1.4
Further Reading
1.2
Designing the Logon Manager Directory Sub-Tree
1.2.1
Guidelines for Structuring the Sub-Tree
1.3
Achieving a Secure Configuration of Logon Manager
1.3.1
Recommended Global Agent Settings
1.3.1.1
SSL Support
1.3.1.2
Use Configuration Objects (Active Directory Only)
1.3.1.3
Select the Credentials to Use when Authenticating to the Directory
1.3.1.4
Store User Credentials Under Respective User Objects (Active Directory Only)
1.3.2
Recommended Administrative Overrides
1.3.2.1
Store User Settings in a Secure Location (Active Directory Only)
1.3.2.2
Select the Primary Authenticator for End-Users
1.3.2.3
Use the Default Encryption Algorithm
1.3.2.4
Create and Set the Company Password Change Policy
1.3.2.5
Force Reauthentication when Revealing Masked Fields
1.4
Configuring Secondary Authentication for Logon Manager
1.4.1
Secondary Authentication via Interactive Passphrase Prompt
1.4.2
Secondary Authentication via Other Methods
1.4.3
Understanding the Network Provider Component
1.5
Ensuring Secure Response to Applications
1.5.1
Control IDs
1.5.2
"SendKeys"
1.5.3
Control IDs with "SendKeys"
1.5.4
Which Method to Use?
1.5.5
Configuring User Access at the Template Level
2
Securing Password Reset
2.1
Securing Password Reset on the Client Side
2.2
Securing Password Reset on the Server Side
3
Securing Kiosk Manager
4
Securing Provisioning Gateway
4.1
Securing Provisioning Gateway on the Client Side
4.2
Securing Provisioning Gateway on the Server Side
5
Securing Universal Authentication Manager
5.1
Repository Connection
5.2
Service Account (Enterprise Mode Only)
5.3
User Policies (Enterprise Mode Only)
5.4
Synchronization with Password Reset
6
Securing the Reporting Service
7
Securing Anywhere
Scripting on this page enhances content navigation, but does not change the content in any way.