Password Policy Enforcer configuration

Password Policy Enforcer configuration

ADSelfService Plus' Password Policy Enforcer enables admins to utilize advanced password policy controls like banning weak passwords and keyboard sequences for users' on-premises AD accounts and cloud accounts, including Microsoft 365 and Google Workspace. Moreover, admins can enforce different sets of password policy controls for different users based on their OU and group membership.

What is the Password Sync Agent?   

ADSelfService Plus' Password Sync Agent, when installed on the domain controllers in your domain, tracks native password changes via the Ctrl+Alt+Del screen and password resets by admins in the ADUC console, encrypts the new passwords, and automatically synchronizes them with multiple systems and applications.

This document outlines the steps to enforce a custom password policy via ADSelfService Plus for password changes made through the Ctrl+Alt+Del screen and the ADUC console, ensuring the creation of strong passwords

Configuring the Password Sync Agent 

  1. Install the Password Sync Agent (location: <installation_folder>\bin\) using the Command Prompt with admin credentials. In the installation wizard that appears, click Next.
  2. Select the Protocol (HTTP or HTTPS) used in ADSelfService Plus.
how-to-configure-password-policy-enforcer-1
Fig. 1: ADSelfService Plus Password Sync Agent installation wizard
  1. Enter the IP address and port number of the server on which ADSelfService Plus is installed, then click Next.
  2. In the Access key field, paste the access key provided in the ADSelfService Plus portal. You can obtain the access key from Configuration > Administrative tools > GINA/Mac/Linux (Ctrl+Alt+Del) > Password Sync Agent Installation. Click Next.
Fig. 2: Entering configuration details in the ADSelfService Plus Password Sync Agent wizard
  1. Once the installation is complete, you must restart the domain controller for the Password Sync Agent to start working.
Notes
Note: By default, the password sync agent will be installed in the following location: 
 In 64-bit systems: C:\Program Files (x86)\ZOHO Corp\Password Sync Agent 
 In 32-bit systems: C:\Program Files\ZOHO Corp\Password Sync Agent 

Making changes to the Password Sync Agent   

In the event that you have given incorrect details during installation, moved ADSelfService Plus to a new server, regenerated the access key, or updated any Password Policy Enforcer settings, then the changes must be reflected in the Password Sync Agent for it to work properly. The details can be changed by following the steps given below:
  1. Right-click the Password Sync Agent icon on the System tray and select Edit Settings. The Edit Settings dialog box will open.

Fig. 3: Editing configuration settings in the ADSelfService Plus Password Sync Agent wizard
  1. Enter the Server Name/IP Address, Port, Protocol (HTTPS/HTTP), and Access key used by ADSelfService Plus.
  2. Click Save.
The new details will now be updated in the Password Sync Agent.
 

Upgrading or reinstalling the password sync agent   

To upgrade the Password Sync Agent to a newer version or to reinstall the agent on an existing machine, follow the steps listed below:
  • Uninstall the Password Sync Agent from the control panel.
  • Install the Password Sync Agent from the new MSI.
Notes Note: Do not repair the Password Sync Agent directly from the new MSI file. 

Steps for creating a custom password policy for native password changes and ADUC password resets   

  1. Go to Configuration > Self-Service > Password Policy Enforcer.
  2. From the Select the Policy drop-down menu, choose the policy to which you want to apply the password policy rules.
  3. Enable Enforce Custom Password Policy.
  4. In this section, you can manage:
    • Characters: Restrict the number of special characters, numbers, and Unicode characters used in passwords.
how-to-configure-password-policy-enforcer-5
Fig. 4: Restricting characters with the ADSelfService Plus Password Policy Enforcer
    • Repetition: Restrict the consecutive repetition of a specific character or use of specific characters from the username (e.g., aaaaa or user01).
how-to-configure-password-policy-enforcer-4
Fig. 5: Restricting character repetition with the ADSelfService Plus Password Policy Enforcer
    • Patterns: Restrict keyboard sequences, dictionary words, and palindromes.
how-to-configure-password-policy-enforcer-3
Fig. 6: Restricting patterns with the ADSelfService Plus Password Policy Enforcer
    • Length: Specify the minimum and maximum password length.
how-to-configure-password-policy-enforcer-6
Fig. 7: Configuring the password length with the ADSelfService Plus Password Policy Enforcer
  1. You can also enable users to bypass complexity requirements when the password length exceeds a predefined limit.
  2. Enter the number of policy settings the users' password must comply with during self-service password reset and password change operations.
  3. Enforce the configured password policy settings during password resets from the ADUC console and the change password screen.
  4. To help users create passwords that comply with the enforced policy settings, you can display the password policy requirement on the reset and change password pages.
 
You can now use ADSelfService Plus to enforce advanced password policy rules to create stronger, more secure passwords for major cloud-based and on-premises applications, including Salesforce, Zendesk, and ServiceNow.

                  New to ADSelfService Plus?

                    • Related Articles

                    • How to disallow palindrome passwords using ADSelfService Plus

                      Having a secure password is of paramount importance to ensure the safety of your network. A password's strength depends on the length of the password, the different types of characters used, the number of repeated characters, the sequence of ...
                    • How to prevent a brute force attack with ADSelfService Plus

                      What is a brute force attack? In a brute force attack, cybercriminals try to guess the password of a target user account, analyze the result, and try again until they succeed. This process could take anywhere from weeks to months. Though this method ...
                    • Implement granular password policies for users in the same AD domain

                      When sensitive information needs to be protected, complying with stringent password policies becomes essential. The default AD domain password policy lacks the flexibility to enforce different rules for different users and does not provide sufficient ...
                    • Advanced policy configuration: Password Sync tab

                      Password Sync tab Password Synchronizer Automate password synchronization with users' linked accounts after the performed self-service action (password reset or password change) is reflected in AD. Automate the unlocking of accounts for users' linked ...
                    • Enforcing password history during password reset

                      In a world reeling under a large number of applications to make our life easier, it is a daunting task to remember the usernames and passwords for each and every application being used. Though administrators force users to change the passwords ...