Ubisecure Password application is included in the Ubisecure SSO installation package. During a standard installation the software is partially installed. The application is not ready for use without explicit activation and further configuration.
Ubisecure Password Service Provider Activation
First install the UAS SAML metadata by selecting first Home → Server and then the [SAML 2.0] link on the Ubisecure Server Management front page. Save the metadata file in the directory
|Figure 1. Select SAML 2.0 to save IDP metadata file.|
Then generate the SP identity and metadata. Use your public visible hostname in the Generate command URL parameter.
Generate SAML SP identity and metadata (in Windows use '\' instead of '/')
In Ubisecure Server Management, select System → Password. If there are no applications under Password, select first New Application and enter name Password and select OK. After Password is visible in the list, then select it and by clicking Activate. Upload the generated
ubilogin-sso/password.xml file from the pop-up window. After setting everything, the window should look following:
|Figure 2. Select Activate to upload SAML Metadata of the Password application|
Configure Mail Settings
Ubisecure Password application uses email when performing the password reset functionality. Mail settings need to be configured to the
ubilogin-sso/ubilogin/webapps/password/WEB-INF/web.xml file. Uncomment the context-param elements that contain mail.smtp.host and mail.smtp.from param-names. Edit the param-values according to your environment.
If the SMTP server requires further values, such as authentication credentials, configure tomcat server mail/Session (
) like below. (In this case, the configuration instruction above can be ignored).
In both cases make sure that the following rows are uncommented in the
As an optional step, you can enable debug logging by adding a value in the
Let user define password during password reset
It is possible to let user enter an own password in accordance with password policy settings by supplying the argument
policy.password.resetWithUserDefinedPwd=true, to the authentication method's configuration string.
Hide information about user account status
Information related to account status, such as if it's invalid, can be hidden in password reset by setting configuration string parameter
policy.dontRevealAccountStatus=true, to the authentication method's configuration string.
Allow SSO session be created for user with successful password reset
By default users, who have reseted their password, are required to authenticate using the password credentials they just reset. This may seem like a mundane extra step, which could as well be skipped without compromising any security of the system, because the users must know their password already having set it a moment ago or have been given an automatically generated password in the user interface. To improve the user experience in this regard, it's possible to enable implicit authentication of the user in SSO Server after successful password reset, which is basically the same as if the user entered their password credentials explicitly in SSO Server's login screen. This functionality is called authentication injection, or AuthnInjection.
Authentication injection requires activation of SAML authentication method password.ap in SSO Server. The method should already exist, because it's created automatically during installation/update process, but following steps are required to activate it.
Activate the authentication provider for Password application
First install the service provider metadata of password.ap authentication method by selecting the [Download Metadata] link on the SAML management page of the password.ap method. To navigate there select Home → Global Method Settings → Password AP → SAML. Save the metadata file in the directory
Generate the IDP identity and metadata for password.ap by executing the commands in Listing 5 . Use your publicly visible hostname in the Generate command URL parameter.
In SSO Management, select Home → Global Method Settings → Password AP → SAML → Upload. Then upload the generated ubilogin-sso/password-ap.xml file.
Allow authentication injection on a password method for password.ap
With password.ap activated, password reset acts as an authentication provider to inject password authentication for the password method used in the password reset. However the injection fails unless it has been explicitly allowed for the password method in question. This is done by adding the following configuration string in the password method:
methodsAllowedForAuthnInjection = password.ap
Note that the configuration string above needs to be added to all password methods with whom this functionality needs to work.
Enable Access to Ubisecure Password
- In Ubisecure Server Management, navigate to the Password site: select System → Password
- Add the password.1 authentication method to the site: select Site Methods → Add… → password.1 → OK
- Add Ubilogin Directory users to the Password Users group by using the dynamic members functionality. (The following configuration is just an example. You will probably have a more detailed definition for the included users.)
Select Groups → Password Users→ Dynamic Members → Add → Service(Ubilogin Directory , Select Template(All users) → OK
|Figure 3. Password Users group controls access to the Password application|
Password reset with AD
The minimum length for the system generated password must be specified in the method's configuration string settings. The default length is 6 characters, which may be less than group policy defined minimum lengths.
|Figure 4. Method configuration for policy.password.length=8|
Future changes to password length policies in AD must be updated manually to this value.
Enable Password Web Application
The Password application is disabled by default. To enable it, edit
To complete the password application installation, run Tomcat update.
Accessing the Password Web Application
The application can now be accessed at the host address used in Listing 2.
The password reset by email application is found at the address:
The password change application is found at the address:
|Figure 5. Password reset|
Selecting the authentication method
The reset application takes an optional query string argument, method, which contains the password method to be changed. The same application can thus be used for resetting multiple methods.
Selecting the user interface template
The password application uses the same CSS style templates that are defined in SSO Server. If the user transfers to the password application during logon, the template selection will be handled by SSO, but if it's required to transfer the user from another application, it is necessary to provide the used template as a query string parameter, called template. Refer to Templates - SSO for details of how to define and create user interface templates.
Integration with Login UI or portal applications
By default, there are no links in the user interface of the login screens for the user to access this application. The reason for this is that many installations do not require password change or reset functionality. For example, if Ubisecure CustomerID is used in conjunction with Ubisecure SSO, password change and reset functionality is provided by the CustomerID application.
Use the above links within user applications, or include links to these activities from the login UI. Instructions for adding links to the login UI are found in Login screens - SSO .
|Figure 6. Example links added to login UI help box|
Ubisecure Password application uses email when performing the password reset functionality. Mail settings need to be configured to the ubilogin-sso/ubilogin/webapps/password/WEB-INF/web.xml file. Uncomment the context-param elements that contain mail.smtp.host and mail.smtp.from param-names. Edit the param-values according to your environment.