Configuring Self Service Password Reset 21 Configuring Basic Settings

Total Page:16

File Type:pdf, Size:1020Kb

Configuring Self Service Password Reset 21 Configuring Basic Settings Self Service Password Reset 4.4 Administration Guide April 2019 Legal Notice © Copyright 2018-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors ("Micro Focus") are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. For additional information, such as certification-related notices and trademarks, see http://www.microocus.com/about/ legal/. 2 Contents About this Book 9 1 Self Service Password Reset Overview 11 Self Service Password Reset Key Features. .11 Self Service Password Reset Architecture . .12 Understanding Challenge-Response Storage Methods . .13 2 Getting Started 15 Logging in to the Administration Console. .15 Working with Configuration Editor . .16 Working with the Configuration Manager . .17 Using the Dashboard . .18 Configuring Macros for Messages and Actions . .19 3 Configuring Self Service Password Reset 21 Configuring Basic Settings . .21 Configuring Application Settings . .21 Configuring Localization Settings . .22 Configuring Session Management Settings . .22 Configuring the Telemetry Options . .22 Configuring Profiles. .23 Creating a Profile . .23 Managing Profiles . .24 Configuring Security Settings . .25 Configuring Security for Self Service Password Reset. .25 Configuring Web Security . .25 Importing Certificates to Create an HTTPS Connection to Browsers . 26 Configuring Intruder Detection . .27 Configuring External Web Services with REST . .27 4 Configuring LDAP Profiles and Settings 29 Configuring LDAP Directory Profile . .29 Configuring LDAP Settings . .31 Configuring the Global LDAP Settings . .31 Configuring Microsoft Active Directory Settings. .32 Configuring NetIQ eDirectory Settings. .32 Configuring the Oracle Directory Server Settings . .33 Updating the LDAP Certificates . .34 Updating the LDAP Directory Certificate When It Is Not Expired . .34 Updating the LDAP Directory Certificate After It Expires . .34 Contents 3 5 Configuring Authenticated Modules for Self Service Password Reset 37 Configuring the Account Information Module . .37 Configuring the Administrators Module . .38 Configuring the Change Password Module. .39 Configuring the Delete Account Module. .39 Enabling the Delete Account Module . .39 Configuring the Delete Account Module to Delete Accounts from Integrated Products. .40 Configuring the Help Desk Module . .41 Enabling and Configuring the Help Desk Module . .42 Configuring the Advanced Search for the Help Desk Module . .42 Configuring the People Search Module. .43 Enabling and Configuring the People Search Module . .43 Configuring the Advanced Search Option in the People Search Module . .44 Configuring One-Time Password . .45 Configuring the Setup Security Questions Module . .45 Configuring the Shortcut Menu Module. .46 Configuring the Update Profile Module . .46 6 Configuring Public Modules for Self Service Password Reset 49 Configuring the Forgotten Password Module. .49 Configuring the Forgotten Password Profile . .50 Configuring the Forgotten Password Settings . .50 Understanding the Verification Methods . .51 Configuring the OAuth2 Verification Method for the Forgotten Password Module . .52 Configuring the Forgotten User Name Module . .53 Configuring the New User Registration Module. .53 Enabling the User Activation Module . .55 7 Configuring Policies 57 Configuring a Profile for a Challenge-Response Policy. .57 Configuring Password Policies . .58 Configuring a Profile for a Password Policy . .58 Configuring Password Settings . .59 Configuring the Word List Settings. .59 8 Configuring the User Experience 63 Customizing the Theme of Self Service Password Reset . .63 Creating the Self Service Password Reset Resource Bundle. .64 Implementing the Custom Resource Bundle. .64 Reference for Self Service Password Reset CSS Syntax. ..
Recommended publications
  • Passwordless Authentication: How Giving up Your Password Might Make You More Secure
    thalesgroup.com Passwordless Authentication: How Giving Up Your Password Might Make You More Secure White Paper Why Passwords Are Bad Passwords are one of the oldest security tools in the world of software and the internet. But in today’s environment, passwords cannot provide enough protection for businesses for several reasons. Password Fatigue Leads to Bad Hygiene Policy-driven password strengths and rotation leads to password fatigue, thereby contributing to poor password management. Verizon’s Data Breach Investigation Report1 indicates that over 70 percent of employees reuse passwords for work and personal accounts. A malicious actor could therefore abuse an employee’s credentials to access other applications and sensitive customer information. % out “123456” 81 ~40 4 of 5 “password” of breaches involve Average person People reuse same still among most use of weak or has roughly 40 passwords across popular password stolen credentials online accounts dierent accounts choices in 2018 People also tend to pick easy-to-hack passwords because of the trouble they have with remembering passwords. An analysis of over five million leaked passwords showed that 10 percent of people used one of the 25 worst passwords2. Seven percent of enterprise users had extremely weak passwords. Passwords Hurt User Experience Research by Carnegie Mellon University indicates that a properly written password policy can provide an organization with increased security. However, there is less accord over what should be in this policy to make it effective. To illustrate this fact, users commonly react to a policy rule that requires them to include numbers by picking the same number or by using the number in the same location in their passwords3.
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • The Tangled Web of Password Reuse
    The Tangled Web of Password Reuse Anupam Das∗, Joseph Bonneauy, Matthew Caesar∗, Nikita Borisov∗ and XiaoFeng Wangz ∗University of Illinois at Urbana-Champaign fdas17, caesar, [email protected] yPrinceton University [email protected] zIndiana University at Bloomington [email protected] Abstract—Today’s Internet services rely heavily on text-based password meters to help users understand the strength of their passwords for user authentication. The pervasiveness of these passwords. Studies have shown that password composition services coupled with the difficulty of remembering large numbers policies along with password meters (or verbal notifications) of secure passwords tempts users to reuse passwords at multiple do help users to choose stronger passwords [35], [44], [46]. sites. In this paper, we investigate for the first time how an However, they also increase user fatigue. attacker can leverage a known password from one site to more easily guess that user’s password at other sites. We study several Unfortunately, the number of passwords a user must re- hundred thousand leaked passwords from eleven web sites and member continues to increase, with typical Internet user es- conduct a user survey on password reuse; we estimate that 43- timated to have 25 distinct online accounts [10], [11], [32]. 51% of users reuse the same password across multiple sites. Because of this, users often reuse passwords across accounts We further identify a few simple tricks users often employ to on different online services. Password reuse introduces a secu- transform a basic password between sites which can be used by an attacker to make password guessing vastly easier. We develop the rity vulnerability as an attacker who is able to compromise one first cross-site password-guessing algorithm, which is able to guess service can compromise other services protected by the same 30% of transformed passwords within 100 attempts compared to password, reducing overall security to that of the weakest site.
    [Show full text]
  • Nfront Password Filter Documentation 2
    nFront Password Filter Multiple Policy Edition for Domain Controllers Single Policy Edition for Domain Controllers Single Policy Edition for Member Servers Multiple Policy Edition for Member Servers Desktop Edition Version 7.1.0 © 2000 – 2021 nFront Security. Documentation All Rights Reserved. nFront Security, the nFront Security logo and nFront Password Filter are trademarks of Altus Network Solutions, Inc. All other trademarks or registered trademarks are the property of their Copyright © 2021 nFront Security. All Rights Reserved. Contents 1.0 nFront Password Filter Overview ........................................................................... 2 1.1 Versions ................................................................................................................. 2 1.2 Compatibility and System Requirements ................................................................ 3 1.3 What’s New ............................................................................................................ 4 1.3 Notes to Evaluators ................................................................................................ 5 1.4 Overview of Features ............................................................................................. 7 1.4.1 The logic behind multiple policies (MPE version only) ................................................... 8 1.4.2 The Message Box for Rejected Passwords ...................................................................... 8 1.5 Information about your Evaluation Copy. ...............................................................
    [Show full text]
  • Security Controls and Best Practices for Financial Institutions Content I
    Security Controls and Best Practices for Financial Institutions Content I. Overview. 3 II. The Threat Landscape and Compliance . 4 III. Combating Compromised Credentials . 5 A. Password Security . 5 B. Enhanced MFA (EMFA). 6 C. Hardware Tokens (Business/Commercial Banking Only) . 6 IV. Combating Local Malicious Software and Phishing . 7 A. Trusteer’s Browser Security . 7 B. VeriSign Extended Validation Certificates . 7 C. RSA Fraud Shutdown . 7 D. Separation of Duty, Positive Pay, & Limits (Business/Commercial Banking Only). 7 E. Limits . 7 V. Alerting (Business Banking and Business Financial Services only) . 8 VI. Training & Best Practices . 8 VII. Action Plan . 10 VIII. Glossary . 11 Guidance Materials . 14 Additional Resources . 14 Overview The intent of this document is to inform Financial Institutions about the online fraud threats they currently face. For each threat we discuss, we will provide some basic guidance about an available control that could mitigate the threat. This guidance represents a starting point for improving security. Digital Insight strongly recommends that you review your current security plans and policies, make any updates necessary, and communicate improvements to your customers or members. The Threat Landscape and Compliance In order to commit online fraud, a fraudster simply needs to authenticate as the victim, using that victim’s online credentials. For environments that rely on Single Factor Authentication (something the user knows), the fraudster can coax this information from a real user through compelling On June 28, 2011, the phishing campaigns, key logging, or Man-in-the-Middle proxy attacks. FFIEC issued a Supplement to the Authentication in an Internet Banking For environments that have deployed Two Factor Authentication (something the user Environment guidance.
    [Show full text]
  • Draft NIST SP 800-118, Guide to Enterprise Password Management
    RETIRED DRAFT April 1, 2016 The attached DRAFT document (provided here for historical purposes): Draft NIST Special Publication (SP) 800-118, Guide to Enterprise Password Management (posted for public comment on April 21, 2009) has been RETIRED. Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/. The following information was originally posted with the attached DRAFT document: Apr. 21, 2009 SP 800-118 DRAFT Guide to Enterprise Password Management NIST announces that Draft Special Publication (SP) 800-118, Guide to Enterprise Password Management, has been released for public comment. SP 800-118 is intended to help organizations understand and mitigate common threats against their character-based passwords. The guide focuses on topics such as defining password policy requirements and selecting centralized and local password management solutions. NIST requests comments on draft SP 800-118 by May 29, 2009. Please submit comments to 800-118comments @nist.gov with "Comments SP 800-118" in the subject line. Special Publication 800-118 (Draft) Guide to Enterprise Password Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya NIST Special Publication 800-118 Guide to Enterprise Password (Draft) Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 April 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr.
    [Show full text]
  • Protecting Passwords in the Event of a Password File Disclosure
    PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres New York University New York University [email protected] [email protected] Abstract—Over the years, we have witnessed various the plain-text passwords from disk. Salting inserts a random password-hash database breaches that have affected small and value that complicates the use of tables that allow hackers to large companies, with a diversity of users and budgets. The indus- immediately look up passwords to match most hashes. Storing try standard, salted hashing (and even key stretching), has proven passwords with a salted hash is widely considered to be the to be insufficient protection against attackers who now have access best practice because of the level of protection offered and to clusters of GPU-powered password crackers. Although there the ease of implementation (e.g., salted hashing requires no are various proposals for better securing password storage, most do not offer the same adoption model (software-only, server-side) additional hardware or client software). as salted hashing, which may impede adoption. However, storing passwords with a salted hash is not a In this paper, we present PolyPasswordHasher, a software- panacea. That is, when stored password data has been com- only, server-side password storage mechanism that requires min- promised, attackers have proven themselves adept at quickly imal additional work for the server, but exponentially increases cracking large numbers of passwords, even when salted- the attacker’s effort. PolyPasswordHasher uses a threshold cryp- password hashes comprise the stored data. For example, Troy tosystem to interrelate stored password data so that passwords Hunt, a security researcher, showed that cracking 60% of a cannot be individually cracked.
    [Show full text]
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling
    Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling Vijay Kothari Jim Blythe Sean W. Smith Department of Computer Information Sciences Institute Department of Computer Science University of Southern Science Dartmouth College California Dartmouth College [email protected] [email protected] [email protected] Ross Koppel Department of Sociology University of Pennsylvania [email protected] ABSTRACT dash [1, 2], an agent-based simulation framework that Agent-based modeling can serve as a valuable asset to secu- supports the dual-process model of cognition, reactive plan- rity personnel who wish to better understand the security ning, modeling of human deficiencies (e.g., fatigue, frustra- landscape within their organization, especially as it relates tion), and multi-agent interactions, enables us to create such to user behavior and circumvention. In this paper, we ar- tools. In dash, users are represented as agents with weighted gue in favor of cognitive behavioral agent-based modeling goals, plans to achieve those goals, attributes, knowledge, for usable security and report on our work on developing and abilities. These agents use mental models and have an agent-based model for a password management scenario. perceptions of the world that often depart from reality. In We perform a number of trials and a sensitivity analysis that accordance with their mental models, they take actions, ob- provide valuable insights into improving security (e.g., an or- serve and interpret events, and communicate. They dynam- ganization that wishes to suppress one form of circumvention ically compute and recompute goals and the plans they use may want to endorse another form of circumvention).
    [Show full text]
  • Evidian Self-Service Password Reset
    Evidian Self-Service password reset Trusted partner for your Digital Journey Because one security measure doesn’t fit all situations One help desk call for a password reset costs around 15 euros and is time-consuming (about 20 minutes). Three to four password resets are performed per employee and year (According to the Gartner Research - Note T-15-6454). A self-service password reset reduces this cost and frees up your IT. Evidian Self-Service Password Reset offers several different authentication methods. From a web portal or from their workstation, users can securely reset their Windows passwords without having to contact the helpdesk. Evidian Self-Service Password Reset is also available in offline mode. Evidian Self-Service Password Reset (SSPR) identifies the user with different means: Questions and Answers, Scan of a QR Code, Confirmation code sent via email or SMS, Push notification on mobile and subsequently executes the reset of a new password or generates a temporary password (TPA). Evidian Self-Service Password Reset Strong password policy enforcement It fits perfectly into digital workplaces with features enable users to change their with Evidian Self Service Password Reset a large range of terminals as well as on Windows password securely (network Evidian SSPR can enforce a strong VDI infrastructure (Citrix XenApp, Windows login, Windows login), connected or not password policy for the network login. You RDS and VMware). connected to the network. The solution can define the network login password provides a large range of authentication format such as the type of characters as Identity proofing methods and full audit trails to well as their position, the minimum and Questions & Answers mechanism can also demonstrate the implementation of the maximum number of characters, etc… be used to identify the user.
    [Show full text]
  • Adselfservice Plus
    Solutions offered by ADSelfService Plus. Self-Service Password Endpoint Security One Identity Management Password policy enforcer and endpoint Enterprise single sign-on (SSO) and Self-service password reset and account multi-factor authentication (MFA). real-time password synchronizer. unlock. Password and account expiration notifier Download Now Highlights of self-service password management 1. Password self-service, anywhere, at any time: Enable users reset passwords and unlock accounts in office, at home, and on the move. 2. Password/account expiration notifer: Automate password and account expiration reminders to users via email, push, and SMS alerts. 3. Force password change: Force users to change their password at the next logon after a password reset by the help desk admin. Highlights of endpoint secuity 1. Endpoint MFA: Secure remote and local machine (Windows, macOS, and Linux), VPN, and OWA logons with advanced MFA techniques like biometrics or QR codes for local and remote access to network resources. 2. Custom password polices: Ensure strong user passwords across all their business accounts with advanced password policy settings. 3. Comply with regulatory mandates: Helps comply with NIST SP 800-63B, FFIEC, GDPR and HIPPA regulations. Highlights of one identity 1. Enterprise SSO: Allow users to access multiple enterprise applications with just one identity. 2. Real-time password sync: Synchronize Active Directory (AD) password resets and changes with connected enterprise applications in real time. Other highlights. 1. Directory Self-Update: Enable users to update their information like their phone number, email address, etc in AD. 2. Mail group subscription: Allow users to opt-in and opt-out of distribution groups.
    [Show full text]
  • Autopass: an Automatic Password Generator
    AutoPass: An Automatic Password Generator Fatma Al Maqbali and Chris J Mitchell Information Security Group, Royal Holloway, University of London [email protected], [email protected] March 9, 2017 Abstract Text password has long been the dominant user authentication technique and is used by large numbers of Internet services. If they fol- low recommended practice, users are faced with the almost insuperable problem of generating and managing a large number of site-unique and strong (i.e. non-guessable) passwords. One way of addressing this prob- lem is through the use of a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with the minimum of user input. This paper provides a detailed specification and analysis of AutoPass, a password genera- tor scheme previously outlined as part of a general analysis of such schemes. AutoPass has been designed to address issues identified in previously proposed password generators, and incorporates novel tech- niques to address these issues. Unlike almost all previously proposed schemes, AutoPass enables the generation of passwords that meet im- portant real-world requirements, including forced password changes, use of pre-specified passwords, and generation of passwords meeting site-specific requirements. 1 Introduction Despite its widely-discussed shortcomings, text password authentication is widely used to authenticate users to online services. Many attempts have been made to replace simple password authentication, e.g. using biometrics, arXiv:1703.01959v2 [cs.CR] 8 Mar 2017 tokens and multi-factor authentication [4]. However, single-factor password- based authentication remains very widely used.
    [Show full text]
  • Password Security Password Guide for IT Users, Developers, System Administrators, and Senior Management
    Guide Password security Password guide for IT users, developers, system administrators, and senior management. Table of contents Introduction ....................................................................................................... 3 Overall recommendations .................................................................................... 4 Hacker approaches ............................................................................................. 5 Password challenges ........................................................................................... 7 Tip #1 – What is a strong password? .................................................................... 9 Tip #2 – Multifactor authentication ..................................................................... 12 Tip #3 – How to deal with password overload ...................................................... 13 Tip #4 - Awareness and training ......................................................................... 17 Tip #5 - Changing all default passwords .............................................................. 18 Tip #6 - Focus on administrator, service and remote user accounts ........................ 19 Tip #7 – Account lockout and login monitoring ..................................................... 20 Tip #8 – Secure handling of passwords in systems ............................................... 22 Tip #9 - Organizational password policy .............................................................. 24 References......................................................................................................
    [Show full text]