Skip to main content
Skip table of contents

Policies

Password policies

Memority provides extended capabilities to determine how passwords should be composed, and which rules apply to their lifecycle, depending on the identity type. Indeed, it’s possible to create one Password policy per Identity Type to ensure that the proper security level is enforced accordingly to their sensitivity. A frequently encountered use case is administrator identities and accounts which need to have a stronger password than regular ones.

Password policy configuration

Constraints

A Password Policy declares a set of constraints that an identity password must respect:

  • Contents type:  letter, number

  • Maximum, minimum length

  • Percentage of different character

  • Dictionary: to avoid special value ….

With this advanced set of constraints, Memority can adapt to any business password policy, whether it is simple or complex.

In this example, password must (or will be generated for user):

  • be composed of 10 characters, with a least 1 digit, 1 letter and 1 letter in uppercase

  • not contain the user's first name, last name or date of birth

  • And not contain twice the same character

Lifecycle & Notifications

Password policies are triggered automatically during the lifecycle of an identity’s password:

  • Activation strategy: which is used to configure what actions should be triggered when the password authentication method is activated for an identity

o   Example: When an identity is granted the password authentication method, a password will be automatically generated and sent to the identity. At the first connection, the identity will have to change its password.

  • Deactivation strategy: which is used to configure what actions should be triggered when the password authentication method is revoked for an identity

  • Grace period strategy

  • Expiration strategy: which is executed before the password of an identity expires

In addition, Memority functional administrator or Helpdesk can directly manage the password of end-users in their scope using the Memority User Portal. By doing so, they can activate, revoke, or reset the password of an end-user.

As for any other actions performed in Memority, password initialization and updates are automatically synchronized with target application that must be provisioned with this attribute.

During each stage of the password lifecycle, Memority allows to trigger actions like sending a notification. Therefore, we could have:

  • At creation, a password automatically generated for an identity and a notification sent to a manager or an Operational responsible.

  • At expiration, a notification sent 4 days before password expiration and another one at 1 day before expiration.

Memority can also be configured to send an activation link through email or SMS to the end-user requesting him to set up his initial password, avoiding any manipulation by a third-party.

Deduplication policies

A Deduplication Policy describes how duplicates should be searched for when creating (whether performed manually, in bulk or through an API call) or updating (if needed) a managed object. The first objective is to avoid the duplication of an object.

A deduplication policy allows to define:

  • A scope of population where the policy will apply

    • All Identities?

    • Internal only?

  • A deduplication scope:

    • The scope can be configured directly by GUI by configure a mapping between attributes

      • Example: An Identity with the same first Name, last Name, Organization would be considered as a duplicates

    • Or through a programmatic rule coded in Groovy if needed

      • Example: Execute transformation on attribute before comparison, …

    • A priority: if more than one deduplication policy for an identity type exists priority will be use to prioritize these rules against each other

Deduplication policy configuration

In this example, when creating or updating identities (of type internal) we will check that there is no other identity already existing with the same last name and the same first name and the same birth date.

Depending on configuration (in feature) it will be possible to adapt the behavior when a duplicate is found:

  • Block and forbid the creation with an explicit error message with duplicates account finds

  • Allows to directly update duplicate identity that has been found

  • Authorize and force the creation if the duplicate is legitimate

The second objective is to manage the correlation between an existing identity and a new one. This process is used during the synchronization process as explained in the Identity creation chapter.

For a given import, it is done by configuring a correlation rule aiming to define how mapped the new identity to an existing identity. This correlation will be executed during each import occurrence, and for all identities (or objects) managed by the import.

Correlation can be configured:

  • By a simple attribute mapping (same last name, first name or same HR identifier, …)

  • By using a groovy rule to configure a complex mapping if it’s needed (orchestrate different search to find the duplicate account)

Other policies

Memority can be configured with Policies triggering the execution of custom actions following the occurring of an event on identities.

Object policy configuration

Policies are configured through code snippets in Groovy languages.

GROOVY
if (OPERATION.operation == ObjectOperation.PATCH && OPERATION.originalAttributes?.subContractType && OPERATION.originalAttributes?.subContractType != OBJECT?.subContractType){  
  if(OPERATION.originalAttributes?.subContractType == "Regie" && OBJECT?.subContractType =="Forfait"){  
    ApiObject patched = MANAGE.newPatch().add("flags").values(Flag.F01).atEnd().patch(OBJECT)  
    return ActionOutcome.success()  
  }  
}  
return ActionOutcome.noop()  

In this example, the objective is to flag an identity (of a certain type) when the value of the attribute changes from “Regie” to “Forfait” to be able to trigger other actions afterward.

Uses cases for which policies are used are multiple allowing to answer to very diverse business needs:

  • Send notification

  • Trigger a specific workflow

    • When Identity reaches an End date

    • When Identity is X days before this end date

  • Compute an attribute depending on other attributes

  • Remove access rights upon transfer

To go further

  • Policies

    Scheduled or triggered automatic actions on objects.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.