Password Policy Enforcer configuration

Password Policy Enforcer configuration

ADSelfService Plus' Password Policy Enforcer empowers administrators to implement advanced password policy controls, such as banning weak passwords and disallowing keyboard sequences, for users' on-premises AD accounts and cloud accounts, including Microsoft 365 (formerly Office 365) and Google Workspace. Additionally, administrators can define and enforce tailored password policy controls for different users based on their OU and group membership.

The following is an overview of how Password Policy Enforcer rules can be applied to native password changes and Active Directory Users and Computers (ADUC) password resets through the Password Sync Agent.

What is the Password Sync Agent?   

ADSelfService Plus' Password Sync Agent, when installed on the domain controllers in your domain, intercepts native password changes via the Ctrl+Alt+Del screen and password reset by admins in the ADUC console, encrypts the new passwords, and automatically synchronizes them with multiple systems and applications.

Below are the steps to enforce a custom password policy via ADSelfService Plus to ensure users use strong passwords.

Before you begin   

Configuring the password sync agent

  • Install the password sync agent (Location: <installation_folder>\bin\ ) using the command prompt with admin credentials. Click Next.

  • Select the Protocol (HTTP or HTTPS) used in ADSelfService Plus.

how-to-configure-password-policy-enforcer-1

  • Enter the IP address and Port Number of the server on which ADSelfService Plus is installed, then click Next.

how-to-configure-password-policy-enforcer-2

  • Once the installation is complete, you must restart the domain controller for the Password Sync Agent to start working.

Notes

Note: By default, the password sync agent will be installed in the following location:

  • In 64-bit systems - C:\Program Files (x86)\ZOHO Corp\Password Sync Agent

  • In 32-bit systems - C:\Program Files\ZOHO Corp\Password Sync Agent

 Making changes to the Password Sync Agent   

In the case the data you have provided during installation or when moving ADSelfService Plus to a new server is incorrect, then the changes must be reflected on the password sync agent for it to work properly. To do so, follow the steps given below:
  • Right-click the Password Sync Agent icon on the System tray and select Edit Settings. The Edit Settings dialog box will open.
  • Enter the Server Name/IP Address, Port Number, and the Protocol (HTTPS/HTTP) used by ADSelfService Plus.

  • Click Save.

The new details will now be updated in Password Sync Agent.

Upgrading or reinstalling the Password Sync Agent   

To upgrade the password sync agent to a newer version or to reinstall the agent on an existing machine, follow the steps listed below:

  • Uninstall the password sync agent from the control panel.

  • Install the password sync agent from the new MSI.

NotesNote: Do not repair the Password Sync Agent directly from the new MSI file.

Steps for creating a custom password policy for native password changes and ADUC password resets   

  1. Go to Configuration > Self-Service > Password Policy Enforcer.
  2. Enable Enforce Custom Password Policy.

  3. In this section, you can manage:

    • Characters: Restrict the number of special characters, numbers, and Unicode characters used in passwords.

how-to-configure-password-policy-enforcer-5

    • Repetition: Enforce a password history check during password reset, and restrict the consecutive repetition of a specific character from the username (e.g. “aaaaa” or “user01”).

how-to-configure-password-policy-enforcer-4

    • Patterns: Restrict keyboard sequences, dictionary words, and palindromes.

how-to-configure-password-policy-enforcer-3

    • Length: Specify the minimum and maximum password length.

how-to-configure-password-policy-enforcer-6

  1. You can also enable users to bypass complexity requirements when the password length exceeds a predefined limit.

  2. Enter the number of policy settings the users' password must comply with during self-service password reset and password change operations.

  3. Enforce the configured password policy settings during password resets from the ADUC console and the change password screen.

  4. To help users create passwords that comply with the enforced policy settings, you can display the password policy requirement on the reset and change password pages.

 


                  New to ADSelfService Plus?

                    • Related Articles

                    • How to disallow palindrome passwords using ADSelfService Plus

                      Having a secure password is of paramount importance to ensure the safety of your network. A password's strength depends on the length of the password, the different types of characters used, the number of repeated characters, the sequence of ...
                    • Implement granular password policies for users in the same AD domain

                      When sensitive information needs to be protected, complying with stringent password policies becomes essential. The default AD domain password policy lacks the flexibility to enforce different rules for different users and does not provide sufficient ...
                    • Advanced policy configuration: Password Sync tab

                      Password Sync tab Password Synchronizer Automate password synchronization with users' linked accounts after the performed self-service action (password reset or password change) is reflected in AD. Automate the unlocking of accounts for users' linked ...
                    • Encryption and data storage in ADSelfService Plus database

                      Encryption in the ADSelfService Plus database ADSelfService Plus' database uses the following encryption methods to store sensitive data: Database Encryption method PostgreSQL AES-256-CBC Microsoft SQL AES-256-CBC The following sensitive information ...
                    • How to reset passwords in Linux OS with ADSelfService Plus

                      IT admins are equipped to deal with much more than simple password reset calls from frustrated employees. However, when there's a huge spike in calls to unlock user accounts or reset passwords, the admin productivity is hindered and they're forced to ...