Este conteúdo não está disponível no idioma selecionado.
Chapter 5. Managing user passwords in IdM
5.1. Who can change IdM user passwords and how Copiar o linkLink copiado para a área de transferência!
Regular users without the permission to change other users' passwords can change only their own personal password. The new password must meet the IdM password policies applicable to the groups of which the user is a member. For details on configuring password policies, see Defining IdM password policies.
Administrators and users with password change rights can set initial passwords for new users and reset passwords for existing users. These passwords:
- Do not have to meet the IdM password policies.
- Expire after the first successful login. When this happens, IdM prompts the user to change the expired password immediately. To disable this behavior, see Enabling password reset in IdM without prompting the user for a password change at the next login.
Note that the LDAP Directory Manager (DM) user can change user passwords using LDAP tools. A new password can override any IdM password policies. Passwords set by DM do not expire after the first login.
5.2. Changing your user password in the IdM Web UI Copiar o linkLink copiado para a área de transferência!
As an Identity Management (IdM) user, you can change your user password in the IdM Web UI.
Prerequisites
- Your password has not expired.
Procedure
- Log in to the IdM Web UI.
- In the upper right corner, click the name of the user who is logged into the IdM Web UI.
- Select Change password.
- Enter the current password.
- Enter the new password in the New Password field.
- Confirm the new password by entering it in the Verify Password field.
- Click Reset Password.
Alternatively, you can go directly to https://<server.idm.example.com>/ipa/ui/reset_password.html, and change your password there.
5.3. Resetting another user’s password in the IdM Web UI Copiar o linkLink copiado para a área de transferência!
As an administrative user of Identity Management (IdM), you can change passwords for other users in the IdM Web UI.
Prerequisites
- You are logged in to the IdM Web UI as an administrative user.
Procedure
- Select Identity>Users.
- Click the name of the user to edit.
- Click Actions and select Reset password.
- Enter the new password in the New Password field.
- Confirm the new password by entering it in the Verify Password field.
- Click Reset Password.
5.4. Resetting the Directory Manager user password Copiar o linkLink copiado para a área de transferência!
If you lose the Identity Management (IdM) Directory Manager password, you can reset it.
Prerequisites
-
You have
rootaccess to an IdM server.
Procedure
Generate a new password hash by using the
pwdhashcommand. For example:pwdhash -D /etc/dirsrv/slapd-IDM-EXAMPLE-COM password
# pwdhash -D /etc/dirsrv/slapd-IDM-EXAMPLE-COM password {PBKDF2_SHA256}AAAgABU0bKhyjY53NcxY33ueoPjOUWtl4iyYN5uW...Copy to Clipboard Copied! Toggle word wrap Toggle overflow By specifying the path to the Directory Server configuration, you automatically use the password storage scheme set in the
nsslapd-rootpwstorageschemeattribute to encrypt the new password.On every IdM server in your topology, execute the following steps:
Stop all IdM services installed on the server:
ipactl stop
# ipactl stopCopy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/dirsrv/IDM-EXAMPLE-COM/dse.ldiffile and set thensslapd-rootpwattribute to the value generated by thepwdhashcommand:nsslapd-rootpw: {PBKDF2_SHA256}AAAgABU0bKhyjY53NcxY33ueoPjOUWtl4iyYN5uW...nsslapd-rootpw: {PBKDF2_SHA256}AAAgABU0bKhyjY53NcxY33ueoPjOUWtl4iyYN5uW...Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Start all IdM services installed on the server:
ipactl start
# ipactl startCopy to Clipboard Copied! Toggle word wrap Toggle overflow
5.5. Changing your user password or resetting another user’s password in IdM CLI Copiar o linkLink copiado para a área de transferência!
You can change your user password using the Identity Management (IdM) command-line interface (CLI). If you are an administrative user, you can use the CLI to reset another user’s password.
Prerequisites
- You have obtained a ticket-granting ticket (TGT) for an IdM user.
- If you are resetting another user’s password, you must have obtained a TGT for an administrative user in IdM.
Procedure
Enter the
ipa user-modcommand with the name of the user and the--passwordoption. The command will prompt you for the new password.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note that you can also use the
ipa passwd idm_usercommand instead ofipa user-mod.
5.6. Enabling password reset in IdM without prompting the user for a password change at the next login Copiar o linkLink copiado para a área de transferência!
By default, when an administrator resets another user’s password, the password expires after the first successful login.
As IdM Directory Manager, you can specify the following privileges for individual IdM administrators:
- They can perform password change operations without requiring users to change their passwords subsequently on their first login.
- They can bypass the password policy so that no strength or history enforcement is applied.
Bypassing the password policy can be a security threat. Exercise caution when selecting users to whom you grant these additional privileges.
Prerequisites
- You know the Directory Manager password.
Procedure
Enter the
ldapmodifycommand to modify LDAP entries. Specify the name of the IdM server and the 389 port and press Enter:ldapmodify -x -D "cn=Directory Manager" -W -h server.idm.example.com -p 389
$ ldapmodify -x -D "cn=Directory Manager" -W -h server.idm.example.com -p 389 Enter LDAP Password: <password>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Enter the Directory Manager password.
Enter the distinguished name for the
ipa_pwd_extoppassword synchronization entry and press Enter:dn: cn=ipa_pwd_extop,cn=plugins,cn=config
dn: cn=ipa_pwd_extop,cn=plugins,cn=configCopy to Clipboard Copied! Toggle word wrap Toggle overflow Specify the
modifytype of change and press Enter:changetype: modify
changetype: modifyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Specify what type of modification you want LDAP to execute and to which attribute. Press Enter:
add: passSyncManagersDNs
add: passSyncManagersDNsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Specify the administrative user accounts in the
passSyncManagersDNsattribute. The attribute is multi-valued. For example, to grant theadminuser the password resetting powers of Directory Manager:passSyncManagersDNs: \ uid=admin,cn=users,cn=accounts,dc=example,dc=com
passSyncManagersDNs: \ uid=admin,cn=users,cn=accounts,dc=example,dc=comCopy to Clipboard Copied! Toggle word wrap Toggle overflow Press Enter twice to stop editing the entry.
The
adminuser, listed underpassSyncManagerDNs, now has the additional privileges. Repeat the steps on every Identity Management (IdM) server in the domain.
5.7. Checking if an IdM user’s account is locked Copiar o linkLink copiado para a área de transferência!
As an Identity Management (IdM) administrator, you can check if an IdM user’s account is locked. For that, you must compare a user’s maximum allowed number of failed login attempts with the number of the user’s actual failed logins.
Prerequisites
- You have obtained the ticket-granting ticket (TGT) of an administrative user in IdM.
Procedure
Display the status of the user account to see the number of failed logins:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Display the number of allowed login attempts for a particular user:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Compare the number of failed logins as displayed in the output of the
ipa user-statuscommand with the Max failures number displayed in the output of theipa pwpolicy-showcommand. If the number of failed logins equals that of maximum allowed login attempts, the user account is locked.
5.8. Unlocking user accounts after password failures in IdM Copiar o linkLink copiado para a área de transferência!
If a user attempts to log in using an incorrect password a certain number of times, Identity Management (IdM) locks the user account, which prevents the user from logging in. For security reasons, IdM does not display any warning message that the user account has been locked. Instead, the CLI prompt might continue asking the user for a password again and again.
IdM automatically unlocks the user account after a specified amount of time has passed. Alternatively, you can unlock the user account manually with the following procedure.
Prerequisites
- You have obtained the ticket-granting ticket of an IdM administrative user.
Procedure
To unlock a user account, use the
ipa user-unlockcommand.ipa user-unlock idm_user
$ ipa user-unlock idm_user ----------------------- Unlocked account "idm_user" -----------------------Copy to Clipboard Copied! Toggle word wrap Toggle overflow After this, the user can log in again.
5.9. Enabling the tracking of last successful Kerberos authentication for users in IdM Copiar o linkLink copiado para a área de transferência!
For performance reasons, Identity Management (IdM) running in Red Hat Enterprise Linux 8 does not store the time stamp of the last successful Kerberos authentication of a user. As a consequence, certain commands, such as ipa user-status, do not display the time stamp.
Prerequisites
- You have obtained the ticket-granting ticket (TGT) of an administrative user in IdM.
-
You have
rootaccess to the IdM server on which you are executing the procedure.
Procedure
Display the currently enabled password plug-in features:
ipa config-show | grep "Password plugin features"
# ipa config-show | grep "Password plugin features" Password plugin features: pass:quotes[AllowNThash], pass:quotes[KDC:Disable Last Success]Copy to Clipboard Copied! Toggle word wrap Toggle overflow The output shows that the
KDC:Disable Last Successplug-in is enabled. The plug-in hides the last successful Kerberos authentication attempt from being visible in the ipa user-status output.Add the
--ipaconfigstring=featureparameter for every feature to theipa config-modcommand that is currently enabled, except forKDC:Disable Last Success:ipa config-mod --ipaconfigstring='AllowNThash'
# ipa config-mod --ipaconfigstring='AllowNThash'Copy to Clipboard Copied! Toggle word wrap Toggle overflow This command enables only the
AllowNThashplug-in. To enable multiple features, specify the--ipaconfigstring=featureparameter separately for each feature.Restart IdM:
ipactl restart
# ipactl restartCopy to Clipboard Copied! Toggle word wrap Toggle overflow