

Verifying that directory DSA 'impd-co' is available. Use Password Manager to re-establish repository password and check TLS/SSL settings. Review the etatrans log (by default it is located in c:\Program Files(x86)CA\Identity Manager\Provisioning Server\logs) and confirm the following lines presentingĪLERT: Repository password cannot be decrypted ANONYMOUS access used for repository communication.
WINDOWS SERVER PASSWORD REPOSITORY WINDOWS
Restart the Windows CA Identity Manager Provisioning Server serviceģ. HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\Identity Manager\Provisioning Server\Domains\im\eTPasswordDBĢ. HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\Identity Manager\Provisioning Server\Domains\eta\eTPasswordDB HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\Identity Manager\Provisioning Server\Domains\imġ. HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ComputerAssociates\Identity Manager\Provisioning Server\Domains\eta

Backup/export all registry entries under the following Ensure the Jxplorer (or similar LDAP Browser) can connect to the IM Provisioning Repository port 20391 with the new passwordĪdjust registry setting and allow IM Provisioning Server to access the Provisioning Repository anonymously, please perform the steps on ALL the machines hosting the Provisioning ServerĠ. If prompted set password algorithm to "SSHA"Ģ. Use Jxplorer or your preferred ldap browser, connect to the IM Provisioning Repository machine on port 20391 anonymously, and change userPassword value to a new password on the following 2 entries:ĮTDSAContainerName=DSAs,eTNamespaceName=CommonObjects,dc=etadbĮTDSAContainerName=DSAs,eTNamespaceName=CommonObjects,dc=im,dc=etadb Go to Windows Services and stop the CA Identity Manager Provisioning ServerĬhange the userPassword on eTDSAContainerName=DSAs,eTNamespaceName=CommonObjects,dc=im,dc=etadb entryġ. You can run the following command if there is no other DSAs.Ĭ:\Program Files\CA\Directory\dxserver\config\settings\impd.dxcĤ.edit all the Provisioning Repository DSA's knowledge files in $DXHOME/config/knowledge folderĬ:\Program Files\CA\Directory\dxserver\config\knowledgeĬhange the auth-levels setting of each DSA fromĥ.start IM Provisioning Repository DSAs (from a Windows command prompt Run As Administrator)Ħ. Go to Windows Services and stop the CA Identity Manager Provisioning ServerĢ.Open a Windows command prompt (Run As Administrator)ģ.Stop IM Provisioning Repository DSAs and router DSA.

WINDOWS SERVER PASSWORD REPOSITORY HOW TO
If Provisioning Server is running on Linux please refer How to reset the Provisioning Repository password for IMPS on Linux? article.Įnable anonymous access to the Provisioning Repository, please perform the steps on ALL Provisioning Repository machinesġ. The following are the steps when Provisioning Server is running on Windows. How do we reset the Provisioning Repository password for IM Provisioning Server running on Windows? ***** SHUTDOWN of Identity Manager Provisioning Server initiated ***** ***** STARTUP ERROR *****: Required directory DSA 'impd-main' is not available. Failed to connect: RC=LDAP_INVALID_CREDENTIALS (0x31) Retry=0 Connecting (busy=0, waiters=0, connecting=1) Verifying that directory DSA 'impd-main' is available. In such a case, the Identity Manager Provisioning Server service cannot start up and errors like the ones below appear in the etatrans log This Knowledge doc should be implemented only when there is a mismatch between the password in CA Identity Manager Provisioning Directory (IMPD) and the one in registry and which means the CA Identity Manager Provisioning Server (IMPS) is unable to start without authorizing anonymous access for IMPS/IMPD communication.
