Known Issues and Limitations
Consider the following scenario:
- In the Management Portal at Entitlement Catalog, you configured a service with service attributes that contained special characters in their name (&, <, >, etc.).
- In the service workflow, you configured a Provide Information action and add the attributes to a page.
In this scenario, when you requested the service, the attributes were not processed in the Provide Information wizard.
This is a known issue. Ivanti recommends NOT to use special characters in the names of attributes.
In rare scenarios, the validation of password service attributes in services fail:
Consider the following scenario:
- In the Management Portal at Entitlement Catalog, you configured a service that contained a Provide Information workflow action.
- In the Provide Information action, you added a password service attribute to a page.
- You applied user input validation to the attribute and configured a regular expression for this purpose.
- You added a Jump action to the service workflow, which jumped back to the Provide Information action.
- You requested the service from the Identity Director Web Portal.
- When prompted, you provided a password that matched the configured regular expression.
- When the service workflow jumped back to the Provide Information action and you were prompted again to provide a password, you did not provide a new password, but proceeded with the workflow.
In this scenario, validation of the password service attribute failed. This issue also occurred if the workflow contained two Provide Information actions with the same regular expression validation for the same password service attribute.
This is a known issue. Because of security reasons, Identity Director does not pass unencrypted password values from the server to the client side for validation. As a result, the same password cannot be validated twice. Ivanti recommends not to use scenarios like these. This functionality will not be changed in future releases.
Consider the following scenario:
- In the Management Portal at Entitlement Catalog, you deleted a service that could be restored.
- Several versions of the service had been saved.
- In the Management Portal at Audit Trail, you used Restore on one of the versions of the service, that was not the latest version.
- In the Management Portal at Entitlement Catalog, on the restored service, you restored to the latest version of the service.
In this scenario, if you deleted the service again, restore was not available for the service in the Audit Trail.
This is a known issue.
Consider the following scenario:
- In the Management Portal at Entitlement Catalog, you deleted multiple services with identical names, that could be restored.
- In the Management Portal at Audit Trail, you used Restore on one of the deleted services, that was not the last one that was deleted (service 'x').
A list of versions that could be restored was displayed.
In this scenario, the versions that were displayed were for the service that was the last one that was deleted (service 'y').
Using Restore on a version from the list resulted in service 'y' being restored.
This is a known issue.
Consider the following scenario:
- The Datastore to which your Identity Director environment connects is hosted on a MySQL database server.
- In the Setup and Sync Tool, at Data Model > Data Sources, you created a new data source for a CSV file. The CSV file contains at least 40,000 users.
- At Data Model > Data Connections, you created a new data connection of type People.
- On the Mappings tab of the data connection, you configured the mappings for Person Name, Windows user account and Primary e-mail address.
In this scenario, after synchronizing the data connection, the following was shown on the Diagnostics tab of the data connection:
Synchronization completed (0 errors, 0 warnings).
Changes: 39999 added, 0 updated, 0 deleted.
Duration: 0 hours, 24 minutes, 20 seconds.
ERROR: The connection has been disabled.
In the Management Portal at People, all users were added, despite of the message shown that the connection was disabled.
Cause
The actual error that MySQL gives is: MySQL Error 1153 - Got a packet bigger than 'max_allowed_packet' bytes.
The default GLOBAL setting for max_allowed_packet is 16MB. However, according to the MySQL documentation, you can change this to up to 1GB (provided the server has enough memory).
The problem is actually caused with low memory on the MySQL server and the default setting for the net_buffer_length GLOBAL MySQL variable, which is 16KB. The reason for this low setting is that MySQL wants to make sure that no packets are broken. Although you can change this to up to 1MB according to the MySQL documentation, this is not the default value. Per SESSION, this value is read only, you cannot change it and is 16KB.
The sync log that Identity Director generates and tries to upload in the OR_DataLinks table can be much larger (for example almost 1MB when synchronizing a data connection for 40,000 users).
Solution
Change the default GLOBAL settings on the MySQL database server with the following commands:
Get GLOBAL variables values |
|
Set GLOBAL variables values |
|
In the Setup and Sync Tool, if your administrative role has read-only permissions to the data connections node, the node will not be available. This is a known issue.
In the Setup and Sync Tool, when you configure an ODBC-based data source with MySQL ODBC Connector 5.2, the following error may occur in the Setup and Sync Tool:
'AccessViolationException' - corrupted memory
To solve this issue, update the driver to the latest version.
Consider the following scenario:
You want to add the same Person Attribute two times to include in the qualification all people related to a job role.
- You add the people attribute called ROLE
- You click on the Add People Attribute button next to add it again and nothing happens.
This is because to be able to add an attribute multiple times, you must add another item (either a person, a person attribute or an organization) after the attribute first and then add the necessary attribute.
Example:
- Add the ROLE attribute
- Add a person or an organization
- Click on the attribute
- Add another item
- Add OR
- Add the ROLE attribute
This limitation will be removed in a next release.
In environments that (also) allow access to the Management and/or Web Portals over HTTP, these connections will fail after installing Identity Director 2020.0 or higher.
This is by design. For enhanced security, as of Identity Director 2020.0, the Management and Web Portals can only function when accessed over HTTPS.
Reconfigure the portals in Microsoft IIS to only be accessible over HTTPS.
In the Management Portal at People, if more than 2000 people have been selected (for example using Preload all and Select all), using the Services actions Request, Return, Assign or Unassign will return an error and the action will not be executed.
This is a known limitation.
Consider the following scenario:
- In the Management Portal, Login Type is set to Identity Broker (at Setup > Administrative Roles).
- A user logs on to the Management Portal
- After logon, the user clicks the Back button of the web browser.
In this scenario, an Identity Broker error is displayed.
This is a known issue.
Although technically possible, due to technical implications we do not recommend installing the Management Portal on a domain controller.
Although tags are defined in the Management Portal, currently you can only use them as a search argument in the Web Portal.
Consider the following scenario:
- Your Identity Director environment version 2020.1 or higher is configured to work with identities provided by both Microsoft Active Directory and Okta, through integration via the SSO component – Identity Broker.
- User M (for 'Microsoft') is resetting the password via one of the Identity Director clients and is using Microsoft Active Directory as their identity provider.
This user is reusing their old password. - User O (for 'Okta') is resetting the password via one of the Identity Director clients and is using Okta as their identity provider.
This user is also reusing their old password. - The password reset process fails for user O and user M, but without any further details.
The expectations of IT here would be that the process should inform the user about the old password being reused in both cases. Because of integration and connector development complexities, Identity Director does not implement password history through integration, but holds its own history. This is a known limitation.
After installing version 2020.1 (or higher), Identity Director looks at both the password being changed through its clients and the passwords being used by users to log in. If the provided password does not match any of the stored, previously used passwords, it will be added to the history. This covers the case when a password is changed for users by IT directly from the identity provider.
Once the 2020.1 (or higher) release is rolled out, users can reuse their old password only once, by default. The second time this operation would be impossible. However, if IT wants to keep the same password for a longer time (which is highly unlikely, but exceptions do occur), they can do that by using Automation tasks to reset to the same password or simply change the policy in the identity provider.
Consider the following scenario:
- In the Management Portal, at Password Reset > Complexity, you configure several profiles which contain organizations 'Engineering' and 'Management'.
- You go to Organizations and rename 'Engineering' to 'Engineering Internal'.
- You delete Management.
- Coming back to Password Reset > Complexity, you go back and see that the changes have not propagated to this area.
If you delete or modify an organization in Identity Director, that modification does not propagate within the structures defined in the Password Complexity profiles. As such, any organizational change that is done once the Complexity Hints are in place, should be accompanied with a check over this area.
In the Management Portal at Setup > Password Reset, if you enable verification code validation, you can specify a service that generates this code via a Provide Verification code action. In this action, we recommend specifying a verification code of up to a maximum of 20 characters. Because the code is encrypted, longer codes may exceed the maximum value. This will result in an error and leave the transaction in a Pending state.
Consider the following scenario:
- In the Management Portal, at Setup > Login Page Services > Password Reset > Security Questions, you configure the number of attempts to try to answer the security questions before the account gets locked out.
For example: you have 3 failed attempts and 3 questions - In the Web Portal, you answer all 3 questions incorrectly.
Currently, a workaround is in place that allows the Windows Client to check the locked status of a user, but the whole lockout experience is missing from the mobile apps, both Android and iOS.
This is a known issue and the follow-up implementation is expected to be released in Identity Director 2020.2, or sooner in an intermediary release.
Consider the following scenario:
- In the Management Portal, at Setup > Login Page Services > Password Reset > Security Questions, you configure the number of attempts to try to answer the security questions before the account gets locked out.
For example: you have 3 failed attempts and 3 questions - In the Web Portal, you answer all 3 questions incorrectly.
In this scenario, when you click Next and try to get to the next step of the Password Reset process in the Web Portal, your account will be locked out for the configured amount of time as specified in the Management Portal. That is because the number of failed attempts counts the total number and not the number per question.
This is a known issue. Ivanti recommends that the whole set of questions be subject to the limitation so that a brute-force attack will be even less successful than being able to try X times per question.
Consider the following scenario:
- In the Management Portal, at Setup > Login Page Services > Password Reset > Security Questions, you configure the number of attempts to try to answer the security questions before the account gets locked out.
For example: you have 3 failed attempts and 3 questions - In the Web Portal, you answer one of the questions incorrectly (answer the other questions correctly) and click Next.
-
After each attempt, the user will be notified about the current status with the message “You have X attempts left to answer the security questions before account lockout.”
This message is not configurable.
This is a known limitation, that should not result in much inconvenience in any typical scenario.
When you install the Setup and Sync Tool on a device running Microsoft Windows Server 2012 Essentials, the Setup and Sync Tool needs to be started with Run as administrator. This prevents issues in which advanced Active Directory user properties cannot be retrieved by the Setup and Sync Tool.
Consider the following scenario:
- You perform a clean install of the Identity DirectorWeb Portal on a non-default installation location.
- You customize the web.config file of the Web Portal to your situation.
- After installation, you run the same installer again and choose to perform a repair.
In this scenario, the settings that were configured in the web.config file are not preserved.
As a workaround for this issue, please copy the settings from the backup file of the original web.config file and replace them in the new one.
After installing Identity Director 2020.0, if you have configured the Web Portal to be displayed in an iframe using the allowInFrame attribute, this
The security enhancements in this version will ignore the allowInFrame attribute.
For instructions on how to restore the display, please refer to the Identity Director Help.
Identity Director 2020.0.1 and higher contain additional changes related to this functionality (compared to version 2020.0).