Password Rotation
Password Rotation matches and updates all the passwords including user, any kind of administrator and global administrator passwords in any or both of the following sources:
-
On-premise Active Directory
-
Microsoft Entra ID
-
Microsoft 365
NOTE If you experience issues adding Global Administrator or User Administrator roles to Microsoft tenants and don't have Microsoft P1/P2 licenses, proceed to this link to add those roles with the PowerShell module for free.
Password Rotation organizes the records based on criteria such as a username and domain and rotate passwords when a match is found. After rotation, the newly generated passwords will be updated in the Microsoft Entra ID, on-premise Active Directory, Microsoft 365 and IT Glue.
The network glue collector needs a domain administrator account to rotate Active Directory passwords. If your Network Glue collector uses the local system account, then on attempting to rotate a password you will receive "The server cannot handle directory requests" error.
IMPORTANT Write permissions are also required to rotate passwords.
Personal passwords can be rotated.
Prerequisites
For On-premise Active Directory Password Rotation
- An active Network Glue setup.
NOTE Active Directory settings should be filled. For more information, see Setting up Network Glue for an IT Glue organization.
- Enable the "Scan Active Directory" toggle setting found on this screen and save.
- Administrator access to IT Glue. The feature is available for custom roles with administrator rights.
Warning: The AD password must be updated to ensure sync can continue with Network Glue.
Admin passwords that are used to set up the Active Directory connection with Network Glue, can be rotated. To rotate this password, users need to match network to a corresponding password in the Network Settings/account/networks. Until the user matches the corresponding admin password in the settings, they will get the "Not Permitted" status when trying to rotate it.
For Microsoft Entra ID Password Rotation
-
An active Network Glue setup.
-
An active account in entra.microsoft.com to be able to generate Microsoft credentials in their Active Directory account for further integration with IT Glue.
-
Sync data settings in the "Edit Credentials" of your Microsoft integration. For more information see, Microsoft Integration.
-
If you have either new or an existing Microsoft integration, make sure that you have added required additional API Permissions when setting up Microsoft Integration on entra.microsoft.com.
To rotate passwords in the Microsoft Entra ID, you need to add the following permissions for the tenant.
-
User.ManageIdentities.All
-
User.EnableDisableAccount.All
-
User.ReadWrite.All
-
Directory.ReadWrite.All
-
Directory.AccessAsUser.All
For more information see, Microsoft Integration.
-
-
Ensure that both settings are activated in the "Microsoft Entra ID Sync" of your Microsoft Integration in IT Glue:
-
Enhance Contacts with Microsoft Entra ID
-
Enable Password Rotation for Microsoft Entra ID.
-
For Microsoft Entra ID And On-premise Active Directory Password Rotation
If you have both on-premises Active Directory and Microsoft Entra ID and have a requirement to rotate passwords for both, you will have the settings enabled for on-premise Active Directory, and for Microsoft Entra ID.
Moreover, if you manage and store users both in Microsoft Entra ID and on-premise Active Directory and want to rotate passwords for them, please note that for users who have the same usernames it is required to have Entra Connect configured on your side in your Microsoft account.
Procedure
- Log in to your IT Glue account and navigate to Admin > Password Rotation and enable the option Enable Password Rotation.
NOTE The Enable Password Rotation toggle activates both on-premises Active Directory and Microsoft Entra ID password rotation.
- You can configure the settings using any of the following options:
- Global Settings – To create global settings for password rotation.
- Create Organization Rule - To create separate password rotation rules for different organizations and override global settings. The created organization rule will be applied to all the individual passwords inside the specific organization.
- If you have selected Global Settings option, configure any of the following options to define the password policy:
Complex Passwords option:
The minimum character length of a password.
The character requirements for a password.
At least one uppercase character
At least one lowercase character
At least one number
At least one non-alphanumeric character
NOTE If any of these checkbox settings are disabled, the password rotation will occur according to the basic password policy.
NOTE Complex Passwords are selected by default for Global Settings and Organization rule settings. Organization rule settings will always override Global settings.
Passphrase option:
When this option is selected a new generated password will consist of 6 randomly generated words and will have at least one uppercase, lowercase letters, one digit and symbol to meet your on-premise AD and Entra ID password policies after a successful password rotation.
NOTE Enable the option Enable Scheduled Rotation to select the frequency at which to rotate your matched password. For more information, see Password Rotation Scheduler.
If you have selected Create Organization Rule option, configure any of the following options to define the password rotation policy:
Complex Passwords option:
The minimum character length of a password.
The character requirements for a password.
At least one uppercase character
At least one lowercase character
At least one number
At least one non-alphanumeric character
NOTE Complex Passwords are selected by default for Global Settings and Organization rule settings. Organization rule settings will always override Global settings.
- Passphrase option:
When this option is selected a new generated password will consist of 6 randomly generated words and will have at least one uppercase, lowercase letters, one digit and symbol to meet your on-premise AD and Entra ID password policies after a successful password rotation.
NOTE Enable the option Enable Scheduled Rotation to select the frequency at which to rotate your matched password. For more information, see Password Rotation Scheduler.
The Organization rules that are created are listed in the Organization Rules tab. To edit or delete an organization rule, click on the respective icons under the Actions column.
NOTE If you delete an organization rule, the Global Settings rule are applied to the passwords belonging to that organization.
NOTE To receive email notification when passwords are rotated for specific organization in terms of the set organization rule, navigate to My Settings from the drop-down menu and select the option Active Directory Password Rotation by Organization Rule under the Email Notification section. You will stop receiving notification if you disable this option.
- Passphrase option:
- If you have selected Global Settings option, configure any of the following options to define the password policy:
- Click Match Passwords to filter and approve the password matches.
- Matching passwords on this tab will not change password in Active Directory.
- Matching is required to ensure that the password rotation is correctly applied between your users in Active Directory and IT Glue.
- After the rotation is performed, the newly created password will match between IT Glue and Active Directory.
- If you change passwords manually in IT Glue, the change will not return to Active Directory directly unless you click rotate and the rotation is successful.
- Confirming matched passwords also serves as your approval for us to rotate a password
- IT Glue will present your password from Active Directory and suggest matches for you. Under Unmatched tab in the Match Passwords window, select the preset filter Suggested to sort the list by suggested matches.
- Suggested matches are based on exact username.
- A green checkmark will appear under Actions, when an individual match is found.
- A grey checkmark will appear when no match or multiple matches are found. You must then search and select a password.
- The X option will move the password to the Ignored tab.
- For bulk matching, select the checkbox for the password records you want to match and click Approve or Ignore. The approved records will be displayed in the Matched tab.
Note: For an unwanted password match, click Ignore. These passwords will be displayed in the Ignored tab.
On the Matched page, you will see user passwords that are approved for rotation.
If a password was approved by mistake, then select X or Ignore. The password will be moved back to the unmatched or Ignored tab.
You can edit the suggested Password Name value if the suggested match is incorrect.- Click on the value and choose the correct name from the drop-down as shown in the screenshot below.
- Click Done to confirm your choice.
- Click on the value and choose the correct name from the drop-down as shown in the screenshot below.
- The Ignored tab will contain Passwords not approved for rotation, they won't count as unmatched items in subsequent syncs.
To be able to rotate them again, click Match button for a single or multiple user passwords. - Click Done. You can view the password-matched status on the Password Rotation page. To rotate a password, click Rotate under the Actions column.
To rotate passwords in bulk, select multiple password checkboxes and click rotate.
You can also view the auto-rotation status by navigating to the organization to which the password belongs. To rotate a password from the Passwords page, click on the Rotate button.
NOTE When a password is rotated by a user, the Revisions to core and flexible assets on the right sidebar will display a new version. By restoring to a previous version, the change will not be automatically updated in the Active Directory.
Set rules in Cooper Bots to rotate AD password in IT Glue
Cooper Bots is a Business Process Automation (BPA) Engine that combines the power of workflow automation with an AI assistant to execute work on our customers’ behalf, across the IT Complete platform. With Cooper Bots, you can set up a rule, that will automatically rotate AD password in IT Glue whenever you get a corresponding ticket in Autotask.
When the scenario is active,
-
Cooper Bot will automatically identify Autotask tickets that request a password reset.
-
This password will be found and rotated in Network Glue.
-
When completed, Cooper Bot will update the ticket with a link to the password that was reset.
Statuses and Error Messages
The following is the description possible statuses displayed after initiating a password rotation:
-
API Error - an error happened prior the password rotation.
-
Admin Not Permitted - a required admin role is not added for admin password rotation. Network Glue Admin Passwords cannot be rotated in bulk. You can still rotate individual Network Glue admin passwords. Additional API Permissions are Required for Microsoft Entra ID Password Rotation.
-
Not Permitted Admin - The following are the three scenarios where you might receive this error:
-
When the Network Glue Admin passwords cannot be rotated in bulk.
-
When Network Glue Admin Entra ID passwords cannot be rotated in bulk.
-
When additional API Permissions are required for Microsoft Entra ID Password Rotation.
-
-
Multi Tenant not Permitted - the required role is not added for password rotation. The following are the possible scenarios where you might receive this error.
-
app has been removed from the all admin roles for side tenant.
-
app has been removed from Global Admin and User Admin roles for the main tenant.
-
the key API permission is turned off for the side tenant app in Microsoft.
-
-
Not Permitted - vaulted passwords are not permitted for password rotation.
-
Successful - the passwords have been successfully rotated.
-
In progress - the password rotation is in progress.
-
Failed - the password rotation has failed.
NOTE If a user set up a minimum password age in the on-premise Active Directory and / or Microsoft Entra ID, and rotates the password in IT Glue, the next successful attempt to rotate this same password will accrue only after the completion of the period that is set up as the minimum password age.
The server cannot handle errors related to LDAP over SSL (LDAPS) connectivity issues. The following are the tips given below to troubleshoot these issues.
-
Verify that the LDAP server has a valid SSL certificate and port 636 (LDAP + SSL) is open on the web server.
-
Access the Microsoft's official article to troubleshoot LDAP over SSL connection connection issues. This might help you in resolving the issues.