I am currently facing an issue while testing the Password Interceptor (PWI) in our sandbox environment. After completing the installation, when I manually change a user’s password in Active Directory, the PWI logs return a 403 Forbidden error, indicating a permission problem.
The local service account hosting the PWI service has administrative access, and the API client being used has scope: all. The API is successfully retrieving an access token, but the synchronization does not proceed past that point.
Has anyone experienced this behavior before or can provide guidance on what might be missing?
Create a new Security Token in the tenant UI (Admin > Security Tokens) intended for Password Interceptor and replace the token configured in the PWI service with this one.
After generating a new credential in Admin > Global > Security Settings > API Management and updating it in the PWI, I was able to re-establish the communication successfully.
Just to complement, at first I had configured it using the PAT credential, but afterward I followed the cleanup steps: uninstalled the Password Interceptor, deleted the Organizational Unit (OU) created during the previous installation, removed the encryption keys in C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys, restarted the machine, performed a fresh installation of the Password Interceptor, and finally generated a new credential in API Management, which successfully restored the communication.