Microsoft Active Directory
Reset your forgotten password using Fortified ID Password Reset.

Overview
This use case describes how to configure password reset for accounts managed in Microsoft Active Directory. It covers both self-service password reset scenarios and delegated password reset scenarios, where an authorized administrator can reset another user’s password. A typical example is a teacher resetting a forgotten password for a student.
Prerequisites
Fortified ID Password Reset is installed and configured as a SAML Service Provider (SP) against an SAML Identity Provider (IdP), for example Fortified ID Access.
Configuration of the SAML IdP is outside the scope of this use case and is therefore not covered.
Overview
This use case provides an example configuration for resetting an Active Directory password after successful user authentication. The pre-configured SAML IdP must support an authentication method that does not rely on an Active Directory password, such as Swedish BankID, Freja, or username combined with a one-time password (OTP).
Configuration
Overview of the steps in this use case
Add a LDAPClient module
Add a ADResetClient module
Update the Password Self Reset pipe
1. Add a LDAPClient module
Login to Management Center for Access
Click Configuration tab
Expand Modules and click + to add new module
Click add LDAPClient
Click JSON button for the LDAPClient module
Copy data below and overwrite all existing data
Only change the three properties below to map your environment:
host
bind_dn
bind_password
We assume that your domain controller has a server certificate to use LDAPS.
Click Update and Deploy
You have now added an LDAP module that can be used by one or several objects like valves. To address this LDAP module you use the value active_directory. Note. The service account needs permissions to read and write to LDAP regarding password attribute.
2. Add a ADResetClient module
Login to Management Center for Access
Click Configuration tab
Expand Modules and click + to add new module
Click add ADResetClient
Click JSON button for the ADResetClient module
Copy data below and overwrite all existing data
Only change the three properties below to map your environment:
host
bind_dn
bind_password
We assume that your domain controller has a server certificate to use LDAPS.
Click Update and Deploy
You have now added an LDAP module that can be used by one or several objects like valves. To address this ADResetClient module you use the value active_directory_reset. Note. The service account needs permissions to read and write to LDAP regarding password attribute.
2. Update the Password Self Reset pipe
Default installation of Password Reset comes with two pipes, one for self service and one for delegated reset. Depending on your use case each pipe needs to be updated regarind the user store you are using. In this use case we use Active Directory.
Browse to Management Center for Password Reset
Click Configuration tab
Expand Password Reset
Expand Pipes
Click self_reset
Click JSON for JSON Edit
Copy data below and overwrite all existing data
Click Update and Deploy
Last updated