The Password Synchronization functionality provided in Identity Manager allows you to implement several different scenarios. This section outlines some basic scenarios, to help you understand how the settings in Password Synchronization and Password Policies affect the way passwords are synchronized. You can use one or more of the scenarios to meet the needs of your environment.
In this section:
In this section:
The latest utilities such as iManager and the Novell Client communicate with NMAS rather than directly updating a specific password, and NMAS is the entity that determines which passwords are updated.
NMAS synchronizes passwords within eDirectory, based on your settings in Password Policies.
Legacy utilities that are not Universal Password-enabled update the NDS password directly, instead of communicating with NMAS and letting NMAS determine which passwords are updated. Be aware of how legacy utilities are used in your environment by users and help desk administrators; they can cause "password drift" (Universal Password and NDS password getting out of sync) if you are using Universal Password and NMAS 2.3, because legacy utilities update the NDS password directly instead of going through NMAS. For example, you should make sure users upgrade the Novell Client, and make sure that help desk users use ConsoleOne only with the latest Novell Client or NetWare release to ensure support of Universal Password.
Identity Manager controls the "entry point" (updating either Universal or Distribution Password directly). NMAS controls the flow of synchronizing passwords inside eDirectory.
In Scenario 1, the DirXML Driver for eDirectory can be used to update the NDS password directly. This scenario is basically the same as the one provided in DirXML 1.x.
In Scenario 2, Scenario 3, and Scenario 4, described later in the section, Identity Manager is used to update either Universal Password or Distribution Password, and Identity Manager goes through NMAS to make password changes. This allows NMAS to update other eDirectory passwords as determined by Password Policy settings, and allows NMAS to enforce Advanced Password Rules from Password Policies for passwords being synchronized with connected systems. In these scenarios, the password that Identity Manager distributes to connected systems is always the Distribution Password. The difference between the scenarios lies in the different combinations of NMAS Password Policy settings, and Identity Manager Password Synchronization settings for each connected system driver.
As in Password Synchronization 1.0, you can synchronize NDS Password between two eDirectory trees using the eDirectory driver. This scenario does not require Universal Password to be implemented, and can be used with eDirectory 8.6.2 or later. Another name for this kind of password synchronization is synchronizing the public/private key pair.
This method should only be used to synchronize passwords from eDirectory to eDirectory. It does not use NMAS and therefore cannot be used to synchronize passwords to connected applications.
In this section:
The diagram shows that, as in DirXML 1.x, the DirXML Driver for eDirectory can be used to synchronize the NDS password between two eDirectory trees. This scenario does not go through NMAS.
To set up this kind of password synchronization:
None. The settings on the Password Synchronization page for a driver have no effect on this method of synchronizing NDS Password.
Remove the Password Synchronization policies listed in Policies Required in the Driver Configuration. Those policies are intended to support Universal Password and Distribution Password. NDS Password is synchronized using Public Key and Private Key attributes instead of these policies.
Make sure that the Filter for both eDirectory drivers is synchronizing the Public Key and Private Key attributes for all object classes for which passwords should be synchronized. The following figure shows an example.
With Identity Manager, you can synchronize a connected system password with the Universal Password in eDirectory.
When Universal Password is updated, the NDS Password, Distribution Password, or Simple Password can also be updated, depending on your settings in the Password Policy.
Any connected system can publish passwords to Identity Manager, though not all connected systems can provide the user's actual password. For example, Active Directory can publish a user's actual password to Identity Manager. Although PeopleSoft does not provide a password from the PeopleSoft system itself, it can provide an initial password created in a policy in the driver configuration, such as a password based on the user's employee ID or last name. Not all drivers can subscribe to password changes from Identity Manager. See Connected System Support for Password Synchronization.
In this section:
The digram shows that in this scenario, passwords come in through Identity Manager, which goes through NMAS to directly update Universal Password. Then, NMAS synchronizes the Universal Password with the Distribution Password and other passwords according to the Password Policy settings. Finally, Identity Manager retrieves the Distribution Password to distribute to connected systems that are set to accept passwords.
Although multiple connected systems are shown as connecting to Identity Manager in this digram, keep in mind that you individually create the settings for each connected system driver.
To set up this kind of password synchronization:
Make sure your environment is ready to use Universal Password. See Preparing to Use Identity Manager Password Synchronization and Universal Password.
In Password Management > Manage Password Policies, do the following:
Make sure a Password Policy is assigned to the parts of the eDirectory tree that you want to have this kind of password synchronization. You can assign it to the whole tree (using Login Policy object), a partition root container, a container, or a specific user. We recommend that you assign Password Policies as high in the tree as possible to simplify management.
In the Password Policy, make sure the following are selected:
Because Identity Manager retrieves the Distribution Password to distribute passwords to connected systems, it's important that this option be checked to allow bidirectional password synchronization.
Complete your Password Policy as desired.
NMAS enforces the Advanced Password Rules in your Password Policies, if you have the rules enabled. If you don't want Password Policy rules enforced, deselect Enable Advanced Password Rules.
If you are using Advanced Password Rules, make sure they don't conflict with the password policies on any connected systems that are subscribing to passwords.
In Password Management > Password Synchronization, create these settings for the driver for the connected system:
Make sure the following are selected:
A message is displayed on the page if the driver manifest does not contain a "password-publish" capability. This is to inform users that passwords cannot be retrieved from the application and can only be published by creating a password in a the driver confguration using a policy.
If the connected system does not support accepting passwords, the option is dimmed.
These settings allow for bidirectional password synchronization if it is supported by the connected system.
You can adjust the settings to match your business policies for the authoritative source for passwords. For example, if a connected system should subscribe to passwords but not publish, select only Application Accepts Passwords (Subscriber Channel).
Make sure the following is not checked:
In this scenario, Identity Manager updates the Universal Password directly. The Distribution Password is still used to distribute passwords to connected systems, but is updated from the Universal Password by NMAS instead of by Identity Manager.
(Optional) Select the following if desired:
Keep in mind that e-mail notifications require the Internet EMail Address attribute on the eDirectory user object to be populated.
E-mail notifications are non-invasive. They do not affect the processing of the XML document that triggered the e-mail, and if they fail they are not retried unless the operation itself is retried.
However, debug messages for e-mail notifications are written to the trace file.
Make sure the required Identity Manager script password synchronization policies are included in the driver configurations for each driver that should participate in password synchronization. The policies must be in the correct location and the correct order in the driver configuration. For the list of policies, see Policies Required in the Driver Configuration.
The Identity Manager sample configurations already contain the policies. If you are upgrading an existing driver, you can add the policies using the instructions in Upgrading Existing Driver Configurations to Support Identity Manager Password Synchronization.
Set the filter correctly for nspmDistributionPassword attribute:
Ignore both the Public Key and Private Key attributes in the driver filter for all objects that have Notify set for the nspmDistributionPassword attribute.
To ensure password security, make sure you control who has rights to Identity Manager objects.
In this section:
See also the tips in Troubleshooting Password Synchronization.
The following flowchart shows how NMAS handles the password it receives from Identity Manager. The password is synchronized to Universal Password in this scenario, and NMAS decides how to handle the password based on whether Universal Password is enabled in the Password Policy, whether Advanced Password Rules are enabled that incoming passwords must comply with, and what the other settings are in the Password Policy for synchronizing Universal Password with the other passwords.
This section is for troubleshooting cases where this connected system is publishing passwords to Identity Manager, and another connected system that is subscribing to passwords does not appear to be receiving the changes from this system. Another name for this relationship is a secondary connected system, meaning that it receives passwords from the first connected system through Identity Manager.
The Check Password Status task in iManager causes the driver to be given a check object password action to perform. If you have problems, review the following:
In this method, Identity Manager updates the Distribution Password directly, and allows NMAS to determine how the other eDirectory passwords are synchronized.
Any connected system can publish passwords to Identity Manager, though not all connected systems can provide the user's actual password. For example, Active Directory can publish a user's actual password to Identity Manager. Although PeopleSoft does not provide a password from the PeopleSoft system itself, it can provide an initial password created in a policy in the driver configuration, such as a password based on the user's employee ID or last name. Not all drivers can subscribe to password changes from Identity Manager. See Connected System Support for Password Synchronization.
In this section:
The diagram shows that in this scenario, passwords come in through Identity Manager, which goes through NMAS to directly update Distribution Password. Identity Manager also uses the Distribution Password to distribute to connected systems that you have specified should accept passwords. NMAS synchronizes Universal Password with the Distribution Password, and with other passwords according to the Password Policy settings.
Although multiple connected systems are shown as connecting to Identity Manager in this diagram, keep in mind that you individually create the settings for each connected system driver.
To set up this kind of password synchronization:
Make sure your environment is ready to use Universal Password. See Preparing to Use Identity Manager Password Synchronization and Universal Password.
In Password Management > Manage Password Policies, do the following:
Make sure a Password Policy is assigned to the parts of the eDirectory tree that you want to have this kind of password synchronization. You can assign it to the whole tree, a partition root container, a container, or a specific user. We recommend that you assign Password Policies as high in the tree as possible to simplify management.
In the Password Policy, make sure the following are selected:
Because Identity Manager retrieves the Distribution Password to distribute passwords to connected systems, it's important that this option be selected to allow bidirectional password synchronization.
If you are using Advanced Password Rules, make sure they don't conflict with the password policies on any connected systems that are subscribing to passwords.
In Password Management > Password Synchronization, use these settings:
Make sure the following are selected:
A message is displayed on the page if the driver manifest does not contain a "password-publish" capability. This is to inform users that passwords cannot be retrieved from the application and can only be published by creating a password in the driver configuration using a policy.
These settings allow for bidirectional password synchronization if it is supported by the connected system.
You can adjust the settings to match your business policies for the authoritative source for password. For example, if a connected system should subscribe to passwords but not publish, select only Application Accepts Passwords (Subscriber Channel).
Specify whether you want Password Policies to be enforced or ignored, using the options under Use Distribution Password for password synchronization.
(Conditional) If you have specified that you want Password Policies to be enforced, also specify whether you want Identity Manager to reset the connected system password if it does not comply.
(Optional) Select the following if desired:
Keep in mind that e-mail notifications require the Internet EMail Address attribute on the eDirectory user object to be populated.
E-mail notifications are noninvasive. They do not affect the processing of the XML document that triggered the email and if they fail they are not retried unless the operation itself is retried.
However, debug messages for e-mail notifications are written to the trace file.
Make sure the required DirXML script password synchronization policies are included in the driver configurations for each driver that should participate in password synchronization. The policies must be in the correct location and the correct order in the driver configuration. For the list of policies, see Policies Required in the Driver Configuration.
The Identity Manager sample configurations already contain the policies. If you are upgrading an existing driver, you can add the policies using the instructions in Upgrading Existing Driver Configurations to Support Identity Manager Password Synchronization.
Set the filter correctly for nspmDistributionPassword attribute:
Ignore both the Public Key and Private Key attributes in the driver filter for all objects that have Notify set for the nspmDistributionPassword attribute.
To ensure password security, make sure you control who has rights to DirXML objects.
In this section:
See also the tips in Troubleshooting Password Synchronization.
The following flowchart shows how NMAS handles the password it receives from Identity Manager. The password is synchronized to the Distribution Password in this scenario, and NMAS decides how to handle the password based on whether you have specified that incoming passwords should be validated against Password Policy rules (if Universal Password and Advanced Password Rules are enabled), and what the other settings are in the Password Policy for synchronizing Universal Password with the other passwords.
Versions of the Novell Client and ConsoleOne are available that are aware of the Universal Password. See the NMAS 2.3 Administration Guide.
This section is for troubleshooting situations where this connected system is publishing passwords to Identity Manager, and another connected system that is subscribing to passwords does not appear to be receiving the changes from this system. Another name for this relationship is a secondary connected system, meaning that it receives passwords from the first connected system through Identity Manager.
Identity Manager uses the Distribution Password to synchronize passwords to connected systems. Universal Password must be synchronized with the Distribution Password for this synchronization method.
E-mail notifications are non-invasive. They do not affect the processing of the XML document that triggered the e-mail, and if they fail they are not retried unless the operation itself is retried.
However, debug messages for e-mail notifications are written to the trace file.
The Check Password Status task in iManager causes the driver to be given a check object password action to perform.
This operation is not available through iManager if the driver manifest does not indicate that the connected system supports password-check capability.
Identity Manager allows you to synchronize passwords among connected sytems while keeping the eDirectory password separate. In this documentation, this is referred to as "tunneling."
In this method, Identity Manager updates the Distribution Password directly. This method is almost the same as the previous one, Scenario 3: Synchronizing eDirectory and Connected Systems with Identity Manager Updating the Distribution Password. The difference is that you make sure the Universal Password and the Distribution Password are not being synchronized. You do this either by not using Password Policies, or by using Password Policies with the option disabled for Synchronize Distribution Password When Setting Universal Password.
In this section:
The diagram shows that in this scenario, passwords come in through Identity Manager, which goes through NMAS to directly update the Distribution Password. Identity Manager also uses the Distribution Password to distribute to connected systems that you have specified should accept passwords.
The key to this scenario is that in the Password Policy, the setting is disabled for Synchronize Universal Password with Distribution Password. Because the Distribution Password is not synchronized with the Universal Password, Identity Manager synchronizes passwords among connected systems without affecting passwords in eDirectory.
Although multiple connected systems are shown as connecting to Identity Manager in this figure, keep in mind that you individually create the settings for each connected system driver.
To set up this kind of password synchronization:
Although you don't need to have Password Policies with Universal Password enabled, your environment must still must be using eDirectory 8.7.3, which supports Universal Password. See Preparing to Use Identity Manager Password Synchronization and Universal Password.
No Password Policy is required for eDirectory users for this method.
However, if you use a Password Policy, you must do the following:
Make sure the following is not checked:
This is the key to tunneling passwords without the eDirectory password being affected. By not synchronizing the Universal Password with the Distribution Password, you keep the Distribution Password separate, for use only by Identity Manager for connected systems. Identity Manager acts as a conduit, distributing passwords to and from other connected systems, without affecting the eDirectory password.
Complete the other Password Policy settings as desired.
The other password settings in the Password Policy are up to you.
Use the same settings as Password Synchronization Settings in Scenario 3: Synchronizing eDirectory and Connected Systems with Identity Manager Updating the Distribution Password.
Use the same settings as Driver Configuration in Scenario 3: Synchronizing eDirectory and Connected Systems with Identity Manager Updating the Distribution Password.
If password synchronization is set up for tunneling, the Distribution Password is different than the Universal Password and the NDS Password.
In this section:
See also the tips in Troubleshooting Password Synchronization.
This section is for troubleshooting situations where this connected system is publishing passwords to Identity Manager, and another connected system that is subscribing to passwords does not appear to be receiving the changes from this system. Another name for this relationship is a secondary connected system, meaning that it receives passwords from the first connected system through Identity Manager.
Identity Manager uses the Distribution Password to synchronize passwords to connected systems. The Universal Password must be synchronized with the Distribution Password for this synchronization method.
E-mail notifications are non-invasive. They do not affect the processing of the XML document that triggered the e-mail, and if they fail they will not be retried unless the operation itself is retried.
However, debug messages for e-mail notifications are written to the trace file.
The Check Password Status task in iManager causes the driver to be given a Check Object Password action to perform.
This operation is not available through iManager if the driver manifest does not indicate that the connected system supports password-check capability.
This scenario is a specialized use of password synchronization features. Using Identity Manager and NMAS, you can take a password from a connected system and synchronize it directly to the eDirectory Simple Password. If the connected system provides only hashed passwords, you can synchronize them to the Simple Password without reversing the hash. Then, other applications can authenticate to eDirectory using the same clear text or hashed password through LDAP or the Novell Client, with NMAS components configured to use the Simple Password as the login method.
If the password in the connected system is in clear text, it can be published as it is from the connected system into the eDirectory Simple Password store.
If the connected system provides only hashed passwords (MD5, SHA, or UNIX crypt are supported), you must publish them to the Simple Password with an indication of the kind of hash, such as {MD5}.
For another application to authenticate with the same password, you need to customize the other application to take the user's password and authenticate to the Simple Password using LDAP.
NMAS compares the password value from the application with the value in the Simple Password. If the password stored in the Simple Password is a hash value, NMAS first uses the password value from the application to create the correct type of hash value, before comparing. If the password from the application and the Simple Password are the same, NMAS authenticates the user.
In this scenario, Universal Password cannot be used.
In this section:
No Password Policy is required for users for this scenario. Universal Password cannot be used.
For this scenario, you use DirXML Script to directly modify the SAS:Login Configuration attribute. This means that the Password Synchronization global configuration values (GCVs), which are set using the Password Management > Password Synchronization task in iManager, have no effect.
Make sure the filter has the setting of Sync for both Publisher and Subscriber channels for the SAS:Login Configuration attribute.
Configure the driver policies to publish the password from the connected system.
For hashed passwords, configure the driver policies to prepend the type of hash (if it is not already provided by the application):
This password is Base 64 encoded.
This password is Base 64 encoded.
Clear text passwords and Unix Crypt password hashes are not Base64 encoded.
To place the password into the Simple Password, configure the driver policies to modify the SAS:Login Configuration attribute.
For example, this is how you would use a modify-attr element within a modify operation to change the Simple Password to an MD5 hashed password.
<modify-attr attr-name="SAS:Login Configuration>
<add-value>
<value>{MD5}2tEgXrIHtAnGHOzH3ENslg==</value>
</add-value>
</modify-attr>
For clear text passwords, follow this example.
<modify-attr attr-name="SAS:Login Configuration>
<add-value>
<value>clearpwd</value>
</add-value>
</modify-attr>
For add operations, the add-attr element would contain one of the following:
<add-attr attr-name="SAS:Login Configuration>
<value>{MD5}2tEgXrIHtAnGHOzH3ENslg==</value>
</add-attr>
or
<add-attr attr-name="SAS:Login Configuration>
<value>clearpwd</value>
</add-attr>