Adselfservice plus update
Author: e | 2025-04-25
PAM360 integrates with ManageEngine ADSelfService Plus to automatically update the password of the privileged domain account in ADSelfService Plus, when the password of the ADSelfService Plus's domain account mapped in PAM360 is updated
ADSelfService Plus Dashboard Updater Guide - ManageEngine
Integrating with ADSelfService PlusIntegrate ServiceDesk Plus MSP with ManageEngine ADSelfService Plus and allow your Active Directory users (both technicians and requesters) to self-service their Active Directory passwords and accounts easily. ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management program. This software helps domain users to perform password self-service, account self service and self service of their personal details (e.g telephone number, e-mail id, etc.,) in Microsoft Windows Active Directory. If you have installed both of these products, you just have to provide the details of the computer where ADSelfService Plus is installed, along with its Port Number.Steps to Install:Download and Install ADSelfService Plus.Configure ADSelfService Plus Settings in ServiceDesk Plus MSP.Steps to Configure:Go to Admin > Integrations > ADSelfService Plus.Decide to whom ADSelfService Plus menu should be displayed [technicians or requesters or both] by Enabling/Disabling ADSelfService menu checkboxes for technicians/requesters.Configure whom ADSelfService Plus should be applicable for from following options:All accountsSelected Account GroupsSelected AccountsSpecify Server Name and Port Number.Select the protocol (HTTP or HTTPs).Click Test Connection and Save. The connection will be established.Once the connection is established, use the "Jump To" link to switch over to ADSelfService Plus server.ADSelfService Plus tab will be displayed to the technicians when the same has been enabled irrespective of the integration status between ServiceDesk Plus MSP and ADSelfService Plus. ADSelfService Plus tab will be displayed to the requesters when the same has been enabled only if ServiceDesk Plus is integrated with ADSelfService Plus. PAM360 integrates with ManageEngine ADSelfService Plus to automatically update the password of the privileged domain account in ADSelfService Plus, when the password of the ADSelfService Plus's domain account mapped in PAM360 is updated Updating the ADSelfService Plus Login Agent in Windows. The ADSelfService Plus login agent can be installed on machines running Windowsmanually, through the ADSelfService Plus How ADSelfService Plus helps Trimark? ADSelfService Plus helps remote employees reset their passwords, and then it locally updates the credentials in users' machines ADSelfService Plus' Types of ADSelfService Plus editions; Types of ADSelfService Plus subscriptions; Steps to apply an ADSelfService Plus license; Types of ADSelfService Plus editions. ADSelfService Plus is You can contact ADSelfService Plus Support at any time for assistance in updating ADSelfService Plus to the latest version. Step2: Update the domain settings in ADSelfService Plus with a user account that has permission to access the Admin share. Update the credentials provided in ADSelfService Plus' Domain ADSelfService Plus in actionManually compiling and updating Active Directory information of employees can be a challenge for organizations of all sizes, as this can be a tedious and time-consuming task. A better option is to empower end users to update their own Active Directory information without compromising security.ADSelfService Plus, an integrated Active Directory self-service password management and single sign-on solution, provides a platform for your end users to update their Active Directory attributes such as photos, mobile numbers, email addresses, employee numbers, and more. They can also reset their passwords, and unlock their accounts.Follow the steps below to create a portal where end users can utilize self-update features: Log in to ADSelfService Plus using an admin account. Go to Configuration → Directory Self Service → Self Update Layout Click Create New Layout at the top-right corner to go to the Layout View. Drag and drop the required fields to set up the layout. Click Save.The end user's view:Highlights of directory self-update in ADSelfService PlusADSelfService Plus provides an easy-to-use interface that allows you to select the list of attributes for which you wish to provide the self-update access. Below are some of the solution's capabilities that will make directory self-update a breeze. 1 Custom attributes 2 Modification rules 3 Powerful customization options 4 Employee directory search Custom attributes:In addition to the attributes mentioned above, you can create new business-specific fields with custom attributes.Modification rules:ADSelfService Plus gives you the option to set modification rules for individual layouts, which auto-populate values for attributes based on the organizational policy.Powerful customization options:ADSelfService Plus allows you to define the name of the field; the type of field like single-line text, multi-line text, drop-down box, check box, or radio button; whether a field is mandatory or read only; the initial value for the field; and the HelpComments
Integrating with ADSelfService PlusIntegrate ServiceDesk Plus MSP with ManageEngine ADSelfService Plus and allow your Active Directory users (both technicians and requesters) to self-service their Active Directory passwords and accounts easily. ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management program. This software helps domain users to perform password self-service, account self service and self service of their personal details (e.g telephone number, e-mail id, etc.,) in Microsoft Windows Active Directory. If you have installed both of these products, you just have to provide the details of the computer where ADSelfService Plus is installed, along with its Port Number.Steps to Install:Download and Install ADSelfService Plus.Configure ADSelfService Plus Settings in ServiceDesk Plus MSP.Steps to Configure:Go to Admin > Integrations > ADSelfService Plus.Decide to whom ADSelfService Plus menu should be displayed [technicians or requesters or both] by Enabling/Disabling ADSelfService menu checkboxes for technicians/requesters.Configure whom ADSelfService Plus should be applicable for from following options:All accountsSelected Account GroupsSelected AccountsSpecify Server Name and Port Number.Select the protocol (HTTP or HTTPs).Click Test Connection and Save. The connection will be established.Once the connection is established, use the "Jump To" link to switch over to ADSelfService Plus server.ADSelfService Plus tab will be displayed to the technicians when the same has been enabled irrespective of the integration status between ServiceDesk Plus MSP and ADSelfService Plus. ADSelfService Plus tab will be displayed to the requesters when the same has been enabled only if ServiceDesk Plus is integrated with ADSelfService Plus
2025-03-29ADSelfService Plus in actionManually compiling and updating Active Directory information of employees can be a challenge for organizations of all sizes, as this can be a tedious and time-consuming task. A better option is to empower end users to update their own Active Directory information without compromising security.ADSelfService Plus, an integrated Active Directory self-service password management and single sign-on solution, provides a platform for your end users to update their Active Directory attributes such as photos, mobile numbers, email addresses, employee numbers, and more. They can also reset their passwords, and unlock their accounts.Follow the steps below to create a portal where end users can utilize self-update features: Log in to ADSelfService Plus using an admin account. Go to Configuration → Directory Self Service → Self Update Layout Click Create New Layout at the top-right corner to go to the Layout View. Drag and drop the required fields to set up the layout. Click Save.The end user's view:Highlights of directory self-update in ADSelfService PlusADSelfService Plus provides an easy-to-use interface that allows you to select the list of attributes for which you wish to provide the self-update access. Below are some of the solution's capabilities that will make directory self-update a breeze. 1 Custom attributes 2 Modification rules 3 Powerful customization options 4 Employee directory search Custom attributes:In addition to the attributes mentioned above, you can create new business-specific fields with custom attributes.Modification rules:ADSelfService Plus gives you the option to set modification rules for individual layouts, which auto-populate values for attributes based on the organizational policy.Powerful customization options:ADSelfService Plus allows you to define the name of the field; the type of field like single-line text, multi-line text, drop-down box, check box, or radio button; whether a field is mandatory or read only; the initial value for the field; and the Help
2025-04-25Note: SSO for applications is available only with the Endpoint MFA. The MFA for applications tab allows you to configure multiple authentication factors for ADSelfService Plus, and SSO-enabled application logins (SP-initiated). Follow these steps to configure MFA for applications: In the MFA for ADSelfService Plus Login section, check the box next to Enable authenticators, enter the number of authentication methods to be enforced and select the authentication methods from the drop-down. Note: The Professional edition of ADSelfService Plus is required to utilize advanced authenticators for MFA. Click on the asterisk (*) symbol next to the authentication method to set it as mandatory. You can also reorder the authenticators too. In the MFA for Cloud Applications Login section, check the box next to Enable authenticators, enter the number of authentication methods to be enforced and select the authentication methods from the drop-down. Note: This MFA process will be triggered when a user attempts to access an SSO-enabled application directly. Click Save Settings. You can further configure the idle time limit, trusted device, and other relevant settings in the Advanced Settings tab. Passwordless Login Note: Passwordless logins require the Professional edition of ADSelfService Plus with the Endpoint MFA. With ADSelfService Plus' Passwordless Login feature, users can finally be free from the trouble of managing passwords. This feature eliminates the need to remember, change, or reset passwords periodically for ADSelfService Plus portal and all enterprise application logins through single-sign-on(SSO). You can now deploy a much stronger and advanced authentication method than passwords, such as biometrics, YubiKey, Google Authenticator, and more. How Passwordless Login works A user attempts to login to ADSelfService Plus or SSO-enabled enterprise applications with their username in the ADSelfService Plus login page. ADSelfService Plus verifies the given username with Active Directory and redirects the user to the MFA page. Note: If the user is logging in to ADSelfService Plus for the first time, they will be required to complete password authentication. Here, the user's identity is verified through multiple authentication factors that do not involve passwords, such as Face ID, fingerprint, Google Authentication, and push notifications, as configured by the admin. If the identity verification is successful, the user is logged in to the application. Enabling Passwordless Login Passwordless Login for ADSelfService Plus login: Go to Configuration > Self-Service > Multi-Factor Authentication > Advanced > Applications MFA. Check the box next to Enable Passwordless Login under ADSelfService Plus login MFA. Click Save Settings. Passwordless Login for SAML SSO: Go to Configuration > Self-Service > Multi-Factor Authentication > Advanced > Applications MFA. Check the box next to Enable Passwordless Login under the Cloud Application Login MFA. Click Save Settings. Thanks! Your request has been submitted to the ADSelfService Plus technical support
2025-04-07Note: RSA SecurID is an Advanced Authenticator available as part of the Professional edition of ADSelfService Plus. RSA SecurID is a two-factor authentication (2FA) system from RSA Security LLC that enables users to securely connect to network resources. Users can securely access ADSelfService Plus using security codes from the RSA SecurID mobile application, physical tokens, or passcodes sent through email or SMS. Setting up RSA SecurID authentication You can set up RSA SecurID as an authenticator in ADSelfService Plus in two steps: Include the ADSelfService Plus server in the SecurID SECURITY CONSOLE as an authentication agent. Configure ADSelfService Plus for RSA SecurID. Prerequisites Ensure that you have installed a supported version of RSA Authentication Manager. For SDK integration: RSA Authentication Manager 8.0 or higher For REST API integration: RSA Authentication Manager 8.2 SP1 or higher Including ADSelfService Plus as an authentication agent in the RSA SecurID SECURITY CONSOLE Log in to your RSA admin console (e.g., ). Navigate to Access > Authentication Agents. Click Add New. Enter the hostname of the ADSelfService Plus server in the Hostname field and click Resolve IP to establish a connection between the SecurID SECURITY CONSOLE and the ADSelfService Plus server. Click Save to add the ADSelfService Plus server as an authentication agent. Configuring ADSelfService Plus for RSA SecurID RSA SecurID configuration can be done using either of these methods: REST API Integration SDK Integration Note: It is recommended to configure RSA authentication using REST API as RSA SecurID no longer supports SDK Integration. Steps to configure RSA SecurID with REST API integration Log into the RSA admin console and navigate to Setup > System Settings. Under Authentication Settings, click RSA SecurID Authentication API. Copy the Access ID, Access Key, and Communication Port details. Log into the ADSelfService Plus admin console and navigate to Admin > Configuration > Self-Service > Multi-factor Authentication > RSA SecurID. From the Choose the Policy drop-down, select a policy. Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, go to Configuration > Self-Service > Policy Configuration > Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy. Click RSA SecurID. For Integration Type, select REST API. Enter the hostname of RSA Authentication Manager in the API Host Name field. Paste the port number and access key obtained in Step 3 in the Port and Access Key fields, respectively. Enter the authentication agent's name (i.e., the hostname or access URL of the ADSelfService Plus server) in the Client Id field. Check the Secure API requests to RSA server with HMAC Authentication box to verify the integrity of the authentication requests. Please follow the steps mentioned under HMAC prerequisites before enabling HMAC authentication. Enter the access ID copied in Step 3, in the Access Id field. Select a Username Pattern that matches the User Account Format in the RSA admin console. Note: Users across different domains can have the
2025-04-08The courts in the Northern District of California. If you are a resident of any other country, you agree to submit to the personal jurisdiction of the courts in Chennai, India. This Agreement constitutes the entire agreement between the parties, and supersedes all prior communications, understandings or agreements between the parties. Any waiver or modification of this Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this Agreement is found invalid or unenforceable, the remainder shall be interpreted so as to reasonable effect the intention of the parties. You shall not export the Licensed Software or your application containing the Licensed Software except in compliance with United States export regulations and applicable laws and regulations.HighlightsPassword self-serviceFree Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console. One identity with Single sign-onGet seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus! Password SynchronizerSynchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more. Password Policy EnforcerEnsure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.Directory Self-Update & Corporate SearchPortal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.
2025-04-14Script and access their machine without completing the enrollment process. However, they will be prompted to enroll when they log in to ADSelfService Plus. Schedule the frequency to which force enrollment logon script automatically applies to newly added Active Directory usersClick SaveImportant:By default, the logon script file (located at \bin\ ADSelfService_Enroll.hta) will be placed in the SYSVOL folder when forced enrollment is enabled. ADSelfService Plus will stop showing the force enrollment alert during login for users who have finished the enrollment process. The user account configured in ADSelfService Plus' Domain Settings should have read/write permission over the script path and the permission to copy the script file to the SYSVOL folder in the domain controller. If the required permissions are not granted or there's an issue that prevents the script file from being copied to the SYSVOL folder, make sure you manually copy and paste the script file to the SYSVOL folder.Configuring forced enrollment of users with ADSelfService PlusADSelfService Plus allows you to enforce enrollment only for a particular set of users instead of enforcing it for all users in a self-service policy. All you need to do is manually add an entry in the ADSelfService_Enroll.hta file and then configure the logon script to a particular OU through Group Policy. This will enforce the enrollment only for those users who are within the specified OU.Steps to be followed in ADSelfService Plus Navigate to \bin folder (Default location: C:\ManageEngine\ADSelfService Plus\bin) and locate the ADSelfService_Enroll.hta script file. Open the file in a
2025-04-10