4.2 Configuring LDAP Settings

Self Service Password Reset enables you to configure settings to control interactions of Self Service Password Reset with the LDAP directory that contains your users. You can select a template to configure the settings. Self Service Password Reset provides templates to set default settings for your back-end directories. Changing the template only affects default values. You can change the template at any time. Changing a template does not affect the modified settings.

Self Service Password Reset provides the following templates for supported directories:

  • eDirectory

  • Active Directory

  • Oracle Directory Server

  • Identity Manager/ OAuth Integration

To configure Identity Manager/ OAuth Integration see, Identity Manager and Section 11.0, Integrating Self Service Password Reset with NetIQ Identity Manager and Section 9.0, Integrating Self Service Password Reset with NetIQ Access Manager.

Use the following information to configure the settings for the other LDAP directory templates.

4.2.1 Configuring the Global LDAP Settings

The Global settings control the interaction with an LDAP directory. These settings are not applicable for the user's LDAP profile. For more information about configuring LDAP for a profile see, Configuring LDAP Directory Profile.

To configure the Global LDAP settings:

  1. Log in to Self Service Password Reset at https://dns-name/sspr as an administrator.

  2. In the toolbar, click your name.

  3. Click Configuration Editor.

  4. Select the LDAP directory template for your LDAP directory.

    1. Click Default Settings > LDAP Vendor Default Settings, then select the LDAP directory you are using.

      NOTE:If you select NetIQ eDirectory, you can configure NMAS settings. See, Configuring NetIQ eDirectory Settings.

    2. In the toolbar, click Save changes.

  5. In the toolbar, click your name.

  6. Click Configuration Editor.

  7. Click LDAP > LDAP Settings > Global.

  8. Configure the following settings:

    LDAP Idle Timeout

    Specify the amount of time an LDAP session can remain inactive before the session times out and the user must authenticate again. If you specify 0 (the number), the LDAP connection does not time out in the HTTP session unless you close it.

    User Object Class

    Specify object classes of user entries in your LDAP directory.

    Follow LDAP Referrals

    Select this option if you want Self Service Password Reset to follow the LDAP referrals.

    LDAP Duplicate Mode

    Select the appropriate mode that provides a solution for searching the appropriate user from the list of multiple users. For multiple user matches found, you can control the user authentication. Select any of the following options from the list:

    • No duplicates permitted: Select this option if you want the application to fail whenever duplicate users are found in any context or profile.

    • Match first LDAP profile: Select this option if you want the application to use the first user that the system discovers in the first profile that has only a single match.

    • Match first user: Select this option if you want the application to authenticate the first user that the system discovers in any context or profile. This option ignores any duplicate user in the search result.

    User Selectable LDAP Context/Profile

    Select appropriate option from the following list to control the use of LDAP profiles and LDAP contexts during identification such as login, the Forgotten Password process, and so on:

    • Show the LDAP profile

    • Show the LDAP profile and LDAP contexts

    • Do not show

    Ignore Unreachable LDAP Profiles

    Select this option if you want to ignore the profiles that are unreachable. The system uses this option when there are multiple LDAP profiles.

    The system displays a directory unavailable error message for the user when there is only a single configured LDAP Profile or all LDAP Profiles are unreachable.

    Enable LDAP Wire Trace

    Select this option to log all LDAP events to the TRACE logging level.

    WARNING:Enabling this option might allow user passwords and other sensitive data to be written to the log files.

  9. In the toolbar, click Save changes.

4.2.2 Configuring NetIQ eDirectory Settings

You can use either eDirectory or eDirectory with NMAS as the back-end directory. These settings allow you to change the eDirectory setting configuring during the Configuration Guide.

Configuring eDirectory Challenge Set Options

When the back-end directory is eDirectory, you can configure NMAS. All NMAS operations require an SSL connection to the directory. Benefits of this configuration include:

  • Validation of passwords against the NMAS password policy.

  • Email notifications for failed password operations, such as when a password coming from a connected system does not comply with the password policies.

  • Better error messages when using universal password policies

  • Better error handling during the change password process

If you must apply the policy settings for the challenge sets that you configured in NMAS, perform the following:

To change the policy settings for the challenge sets:

  1. Log in to Self Service Password Reset at https://dns-name/sspr as an administrator.

  2. In the toolbar, click your name.

  3. Click Configuration Editor.

  4. Click LDAP > LDAP Settings > NetIQ eDirectory > eDirectory Challenge Sets.

  5. Configure the following settings:

    Read eDirectory Challenge Sets

    Select this option if you want Self Service Password Reset to read the challenge set configuration from the eDirectory universal password policy and apply it to users.

    If you want Self Service Password Reset to use challenge sets configured in NAMAS only, do not configure the required and forgotten questions in Self Service Password Reset, else Self Service Password Reset uses these if no eDirectory policy exists.

    eDirectory Challenge Set Minimum Randoms During Setup

    Specify the number of random questions that a user is required to answer from NMAS at the time of saving challenge/response answers.

    eDirectory Challenge Set Apply Word List

    Enable this option if you do not want the users to use any of the words mentioned in the word list dictionary for the challenge/response answers.

    eDirectory Challenge Set Maximum Question Chars in Answer

    Specify the maximum number of characters of the question text that are allowed in answers when saving challenge/response answers in NMAS.

  6. In the toolbar, click Save changes.

Configuring the LDAP eDirectory Settings

Apart from configuring the NMAS extension, you can configure some additional parameters for eDirectory.

To configure NetIQ eDirectory:

  1. Log in to Self Service Password Reset at https://dns-name/sspr as an administrator.

  2. In the toolbar, click your name.

  3. Click Configuration Editor.

  4. Click Default Settings > LDAP Vendor Default Settings, then select NetIQ eDirectory.

  5. Click LDAP > LDAP Settings > NetIQ eDirectory > eDirectory Settings.

  6. Configure the following settings:

    Save NMAS Responses

    Select this option if you want to save the user responses to the NMAS response storage container. This storage is in addition to any other configured response storage methods.

    Enable NMAS Responses for Forgotten Password

    Select this option to use NMAS stored responses during forgotten password recovery. Self Service Password Reset tries all other configured storage methods before evaluating.

    Read User Passwords

    Select this option if you want Self Service Password Reset to read the user's password from eDirectory before changing it.

    This prevents an extra password change from being set to a temporary random password during the forgotten password sequence. If the proxy user does not have rights to read the password, then Self Service Password Reset generates a temporary random password for the user.

  7. In the toolbar, click Save changes.

4.2.3 Configuring Microsoft Active Directory Settings

Self Service Password Reset allows you to change the settings for Microsoft Active Directory.

To change the Microsoft Active Directory settings:

  1. Log in to Self Service Password Reset at https://dns-name/sspr as an administrator.

  2. In the toolbar, click your name.

  3. Click Configuration Editor.

  4. Click Default Settings > LDAP Vendor Default Settings > Microsoft Active Directory.

  5. Select LDAP > LDAP Settings > Microsoft Active Directory.

  6. Configure the following settings:

    Use Proxy When Password Forgotten

    If you select this option, when users forget their passwords, the system uses the LDAP proxy account for LDAP to work. This is because an LDAP connection is not possible to Active Directory without the passwords for the users. When authenticated in this condition, the system forces the users to change their passwords immediately.

    Allow Authentication When “Must Change Password On Next Login” Is Set

    Active Directory fails an LDAP login attempt when the Must Change Password On Next Login flag is set. If you enabled this option, the system allows login even though the LDAP bind has failed. The user is only able to set a new password when this condition occurs. No other functions are available until the password has been set (and this flag is cleared).

    Allow Authentication When Password Expired

    Active Directory fails an LDAP login attempt when the current date is after the user's password expiration date. If you enabled this option, the system allows login even though the LDAP bind has failed. The user is only able to set a new password when this condition occurs. No other functions are available until the password has been set (and this flag is cleared).

    Enforce Password Policy During Forgotten Password

    Enforce password policy during forgotten password when the option Use Proxy When Password Forgotten is also set to true. This setting that the Active Directory servers support the LDAP_SERVER_POLICY_HINTS_OID (1.2.840.113556.1.4.2066) LDAP modification control.

  7. In the toolbar, click Save changes.

4.2.4 Configure the Oracle Directory Settings

Self Service Password Reset allows you to change settings for the Oracle Directory Server setting.

To change the Oracle Directory Server settings:

  1. Log in to Self Service Password Reset at https://dns-name/sspr as an administrator.

  2. In the toolbar, click your name.

  3. Click Configuration Editor.

  4. Click Default Settings > LDAP Vendor Default Settings > Oracle Directory Server.

  5. Select LDAP > LDAP Settings > Oracle DS.

  6. Configure the following settings:

    Allow Manipulation of PasswordAllowChangeTime

    If select this option, during the forgotten password recovery sequence, allow manipulation of the allowPasswordChangeTime attribute. This allows forgotten password functionality, with expected behavior, when the system enforces a policy of minimum time between password changes.

    Allow Authentication When “Require Password Change at First Login and After Reset” Is Set

    Oracle Directory Server normally fails an LDAP login attempt when the user's pwdReset attribute is set due to an administrator password set. If you enabled this option, the system allows login even though the LDAP bind has failed. The user can only set a new password when this condition occurs. No other functions are available until the password has been set (and this flag is cleared).

  7. In the toolbar, click Save changes.