We are working on an Active Directory (AD) integration project where we need to create new AD accounts with randomly generated, secure passwords. These passwords must then be delivered to the end-users for their initial login.
The specific requirements are:
AD Account Creation: New AD accounts are to be created via SailPoint Identity Security Cloud (ISC).
Random Password Generation: A strong, random password must be automatically generated during the account creation process.
Password Delivery: The generated password must be delivered to the end-user. This is necessary for their initial login and to facilitate subsequent actions like setting up multi-factor authentication or security questions for password resets.
No PowerShell Scripts: Due to explicit client requirements, we must avoid using PowerShell scripts for this process.
We are exploring the following approaches:
AfterCreate Rule:
1.1 Implement an AfterCreate rule that generates a random password, sets it on the AD account, and then sends an email to the user with the password.
1.2 Is this a viable approach? Are there any limitations or security considerations we should be aware of?
Password Interception:
2.1 Attempt to intercept the generated password during the account creation process and then send it to the user via email.
2.2 Is this technically possible? If so, what are the recommended methods and potential challenges?
If neither of these approaches is feasible, what are possible alternatives?
Create a random password during the AD CREATE, pull this back into ISC as an identity.attribute, then email it out to the line manager as part of the default account.create email template.
Hello Marco, there would be a password, it would be set on account creation. It would be random and unknown to anyone.
The user would set their own password through the âforgot my passwordâ flow. There would be no need to ever send the clear text password in any communication. The user would need to validate themselves through the MFA options configured before setting it.
@Markharoll , Let me go through a couple of flows to better explain some approaches you can consider.
Are you using passthru authentication for these identities with Active Directory as the authentication source?
If so, then the flow would look like this (with some assumptions called out)
HR aggregation - > new identity is created.
An active directory account is created for them with a randomized unknown password.
An invitation email would be sent to them, they would not be asked to set a password because ISC already has one for them, even though the user doesnât know it at this point.
On the ISC sign in page they would use the forgot my password option.
They would be presented with MFA options where they will receive a code. Assumption: these options, i.e. email, alternate email, mobile, ect. would already be populated on the identity from attributes in the HR source.
The user will set a new password for ISC which will be set on Active Directory since this is the authentication source.This is now their password for AD and ISC by virtue of the PassThru Auth.
If you are not using PassThru authentication. The you can use the password management feature. The flow be the same as the first scenario for steps 1-2.
The invitation link would allow them to register, set a password for ISC and add in KBA.
From their Home page, they would choose âmanaged passwordsâ > active directory application > change password. The assumption here is that you have set up Active directory as an application to allow users to use the password management feature.
They can then enter a new password without having to enter the old one.
ISC would update the password in Active Directory.
To answer your question though, yes, you can set the MFA attributes on the account create policy just as you noted.
âWhen the user first logins, he would find his MFA already configured and will be able to perform a password reset to loginâ - that is correct. Iâm assuming that you user is logging into Entra in this scenario.
This is great, thank you!
Since you mentioned PTA or Password Management addon, the client prefers the âService Providerâ functionality since it allows to automatically set the same login to all users. Moreover, the Password Management addon has not been purchased so itâs not available for us.
What about SSO with the Service Provider functionality for my previous scenario?
Let me add some important details:
We configure the SSO in ISC via âAdmin > Global > Security Settings > Service Providerâ. The login to ISC will now require users to authenticate with their EntraID credentials
When a new user joins the company and, as part of the onboarding process, a new EntraID account is created for him (i.e. with a dynamic Role)
ISC sets a random unknown password with a generator in the âSource of EntraID > Create Accountâ section.
ISC automatically sets the MFA based on some EntraID connector configurations. The configurations will be set according to user data aggregated from the Joiner process (i.e. primary email, secondary email, phone, âŚ)
When the user first logins, he would find the EntraID login page instead of SailPointâs.
Since the user does not know his password, he will have to follow the âForgot Passwordâ procedure.
At this point his MFA would already be configured and he will be able to perform a password reset to login
@Markharoll , thatâs my understanding yes. SailPointâs part ends at provisioning the MFA attributes, the rest is really EntraId native capabilities.
When you mentioned they prefered âthe âService Providerâ functionality since it allows to automatically set the same login to all usersâ, I assume you are just referring to the SSO experience.
Speaking of logins, you will want to make sure to communicate these instructions and their login id to the users in the welcome email or new account email since with a generator it may not be a straight forward first.last@domain but may have a counter incremented. Or I suppose, you can provide that information to their manager if they canât access their work email until they get onto the SSO.
That is a much more secure posture than emailing a password (even if the psswd is a temporary one). Good luck!