Skip to main content

Implementing mass password reset

Once Bravura Security Fabric is installed, configure the Mass Password Reset feature so that administrators can initiate MPR actions through predefined workflows in the Bravura Pass web UI.

The setup steps are broken down into the following stages:

Install the Scenario.mass_password_reset component to create the user class, database tables, and other configuration required for mass password reset. 

  1. Log in as a product administrator.

  2. Click Manage components on the Home Dashboard to view components.

  3. Select the checkbox for Scenario.mass_password_reset.

  4. Click Install component(s) in the right panel, and confirm the action.

    The component management program installs the components along with any dependencies. This may take some time depending on configuration requirements and dependencies. You should see ”Completed install for component” messages for each selected component in the Task Status panel.

Note

To use this component, you must install aiohttp:

pip install aiohttp

When you install the component, the component management program creates the database tables, framework, and configurations required for the MPR feature to function.

See Installing components for more information on component installation.

Set up systems on which you want to reset passwords as target systems in Bravura Security Fabric. You must include at least one directory system as a source of profiles.

  1. Add at least one directory system (such as Active Directory) as a source of profiles.

    See Example: Adding an Active Directory target system as a source of profiles. You could also use Azure Active Directory, eDirectory, or LDAP Directories.

    Set the Account attribute to automatically attach accounts to user profiles to mail. Email addresses set in the Bravura Safe User Management target system must match the ones in the directory system; otherwise, they will not associate with the profile.

  2. Add any other target systems you want to reset passwords for.

    See Target systems for general information about adding target systems. See the Connector Pack documentation for details on target system types.

  3. Configure the MPR_BRAVURA_REST_API target system, which was added when you installed the mass password reset component:

    1. Configure the Address to point to the Bravura Security Fabric instance server.  

      This should be <BASE IDSYNCH URL>/<inst>.

    2. Configure the MPR administrator credentials.

    MPR_BRAVURA_REST_API.png

Define a product administrator who can configure other users and settings for Mass Password Reset.

Set up any number of product administrators with the required privileges to trigger Mass Password Resets. These users may be managers, IT or help desk staff, for example.  Review Defining product administrators from the web interface for more information about users and administrative permissions.

To set up administrative users for MPR:

  1. Create an MPR administrator with superuser privileges. 

    • Set Allowed privileges to All.

  2. Add the MPR administrator to the following built-in user classes:

    • _HELP_DESK_MANAGERS or _GLOBAL_HELP_DESK

    • _EXPLICIT_REST_API_USERS

    Important

    Recalculate user class membership caches. This can be done per user class or all user classes.

  3. Configure the MPR_Admin user class for users who should have access to mass password onboard and reset options:

    1. Add users to the MPR_ADMINS user class. 

    2. Recalculate the user class membership cache.

MPR_ADMINS.png

Once configured, the MPR_ADMINS will have the Mass password reset option:

mpr menu link

Configure Bravura Safe target systems

The Mass Password Reset feature requires integration with Bravura Safe for onboarding and to serve as a credentials vault.

The following are required for the mass password reset feature:

  • Bravura Safe Server configured

    Create a Bravura Safe team for users affected by MPR requests. Note the exact name of your team.

    See Create a Team via the web interface in the Bravura Safe documentation for more information on creating a team. We cover user onboarding and template definition in the next section.

  • Bravura Safe connectors installed

Create the following two target systems:

  • Bravura Safe User Management (2025+)

  • Bravura Safe (2025+)

Bravura Safe user target system

  1. Add a new manually defined target 

    • ID: <id> (for example, SAFE-USER)

    • Type: Bravura Safe User Management (2025+)

    • Description: <description>

    • Address:

      • Bravura Safe Server: <Bravura Safe server> (for example, https://internal.safe.test.bravurasecurityfabric.com)

      • Organization Name: <Bravura Safe team> (for example, MPR AWS Safe Team)

      • Default Access Level: Can view

    • Account attribute to automatically attach accounts to user profiles: email

  2. Under the Auto discovery section, enable group discovery:

    • Automatically manage groups: All groups, approval required

    • Automatically add group owners as authorizers: checked

    • Groups whose membership will be listed: All groups

  3. Configure the Administrator credentials:

    1. Bravura Safe team - Owner of <Bravura Safe team>.

      • Administrator ID: <email of Bravura Safe team owner>

      • Password: <Bravura Safe team owner's password>

      • System password?: <checked>

      In Bravura Safe, look in the team's Members tab:

      AWS MPR Safe team
    2. Bravura Safe team API key.

      • Administrator ID: <client_id>

      • Password: <client_secret>

      In Bravura Safe, look in the team's Settings tab:

      mpr aws safe team api key
  4. Configure an account attribute for the target system:

    1. Navigate to Resources > Account attributes > Target system.

    2. Select the Bravura Safe User Management 2025+ target system you just added (example SAFE-USER).

    3. Select Target system level overrides.

    4. Add a new target systems account attribute

      • ID: assocID

      • Load attribute values from target system: checked

Bravura Safe vault target system

  1. Add a new manually defined target system:

    • ID: <id> (for example, SAFE-VAULT)

    • Type: Bravura Safe (2025+)

    • Description: <description>

    • Address:

      • Server: <Bravura Safe server> (for example, https://internal.safe.test.bravurasecurityfabric.com)

      • Organization name: <Bravura Safe team> (for example, MPR AWS Safe Team)

    • Account attribute to automatically attach accounts to user profiles: assocID

  2. Under Auto discovery enable group discovery:

    • Automatically manage groups: All groups, approval required

    • Automatically add group owners as authorizers: checked

    • Groups whose membership will be listed: All groups

  3. Configure Administrator credentials:

    • Bravura Safe team - Owner of <Bravura Safe team>.

      • Administrator ID: <email of Bravura Safe team owner>

      • Password: <Bravura Safe team owner's password>

  4. Configure attributes for the target system:

    1. Navigate to Resources > Account attributes > Target system.

    2. Select the Bravura Safe vault system you just added (example SAFE-VAULT).

    3. Select Target system level overrides.

    4. Add new target systems account attributes:

      • AccountLink

        • ID: AccountLink

        • Load attribute values from target system: <checked>

      • assocID

        • ID: assocID

        • Load attribute values from target system: <checked>

      • collectionsIds

        • ID: collectionsIds

        • Load attribute values from target system: <checked>

      • username

        • ID: username

        • Load attribute values from target system: <checked>

  5. Map account attributes to user profiles:

    1. Navigate to Resources > Target systems > Manually defined.

    2. Select the Bravura Safe vault system (example SAFE-VAULT).

    3. Set Account attribute to automatically attach accounts to user profiles to assocID.

    4. Click Update.

Bravura Safe Configuration

Add users and define a template account in Bravura Safe:

  1. Log in to Bravura Safe as a team owner.

  2. Add users to your team in Bravura Safe for discovery and loading into the Bravura Safe User Management target system.

    See Add users to your Team in Bravura Safe documentation.

  3. Create a template account for your Bravura Safe team.

    It should be part of your default collection (for example, Default collection - MPR AWS Safe Team).

    • Name: template

    • Custom fields:

      • Name: assocID

      • Name: AccountLink

Safe edit item
Bravura Pass Configuration

Load users from Bravura Safe, and create a template account in Bravura Pass:

  1. Log in to Bravura Pass as a product administrator.

  2. Run auto discovery to load Bravura Safe users into Bravura Pass.

  3. Confirm that the accounts have been associated with user profiles by viewing a user's profile information and entitlements.

    User test
  4. Create a template account called SAFE_TEMPLATE, based on an existing Bravura SAFE template user.

    • ID: SAFE-TEMPLATE

    • Description: <description> (example: Template to create Safe Secrets for MPR)

    • Target system: <SAFE-VAULT>

    • Account to clone when creating accounts: <template account>

    • Password required: <checked>

    • Used as profile comparison template: <checked>

    • Override implementation configuration: Add to inherited configuration

Configure external data store parameters to store configuration values necessary for mass password reset.

  1. Log in to Bravura Pass as a product administrator.

  2. Click Manage external data store.

  3. Navigate to the hid_global_configuration data table.

  4. Add the rules listed in the tables below.

Table 1. Mass Password Onboard Settings

Namespace

Setting

Value

MASS_PASSWORD_ONBOARD

VAULT_USER_TARGET

SAFE-USER

MASS_PASSWORD_ONBOARD

VAULT_TARGET_ASSOCIATION_ATTRIBUTE

assocID

MASS_PASSWORD_ONBOARD

VAULT_TARGET_GROUP_ATTRIBUTE

collectionIds

MASS_PASSWORD_ONBOARD

VAULT_TARGET_TEMPLATE_ID

SAFE_TEMPLATE

MASS_PASSWORD_ONBOARD

BATCH_SIZE

10

MASS_PASSWORD_ONBOARD

REPORT

[True|False]

MASS_PASSWORD_ONBOARD

VAULT_TARGET_USERNAME_ATTRIBUTE

username



Table 2. Mass Password Reset Settings

Namespace

Setting

Value

MASS_PASSWORD_RESET

TARGETS

AD

MASS_PASSWORD_RESET

TARGETS

NT

MASS_PASSWORD_RESET

VAULT_TARGET

SAFE-VAULT

MASS_PASSWORD_RESET

VAULT_LINK_ATTRIBUTE

AccountLink

MASS_PASSWORD_RESET

BATCH_SIZE

10

MASS_PASSWORD_RESET

REPORT

[True|False] 



MPR_extdb.png

Test onboarding for mass password reset

To test onboarding for mass password reset:

  1. Log in as a user in the MPR_ADMINS user class.

  2. Verify that the user can see the Mass password reset option.

  3. Click the link to view the Mass Password Onboard pre-defined request.

    MPR_PDR_menu.png
  4. Click Mass Password Onboard .

    confirm-mass-password-onboard.png
  5. Select Confirm to continue and submit the request.

  6. Wait for the mass password onboard completion. The process will take several minutes, depending on the number of users.

  7. Verify that Bravura Safe secrets are associated with target accounts.

Test mass password reset

To test mass password reset:

  1. Log in as a user in the MPR_ADMINS user class.

  2. Verify that the user can see the Mass password reset option.

  3. Click the link to view the Mass Password Reset pre-defined request.

  4. Click Mass Password Reset.

    confirm-mass-password-reset.png
  5. Select Confirm to continue.

  6. Wait for the mass password reset completion.

  7. As an end user, access the Bravura Safe vault and view the secret to an account that should have been reset.

  8. Confirm that the password change time has been updated.

  9. Attempt to log into the target system with the updated secret.

  10. Verify that the user successfully authenticates,

See also

See end-user instructions on how to onboard users and trigger a mass password reset.