My main use case of One Identity Password Manager is to simplify and secure password management for users. It helps with self-service password reset and account unlock, which reduces dependency on IT support and saves time for both users and administrators. When employees forget their password or get locked out of their accounts, they previously had to raise a ticket and wait for IT support, which would take time, especially during busy hours. Now they can reset their password themselves using the self-service features in minutes. It saves a lot of time for both users and the IT team, and operations are much smoother because of it.
One Identity Password Manager has been used in our organization for approximately one to 1.5 years in an expertise environment. My primary focus has been on self-service password resets, account unlocks, and enforcing password policies. The main use case for One Identity Password Manager is enabling self-service password reset and account unlocks for users. It helps reduce dependency on the IT help desk and improves overall efficiency. For example, in day-to-day work, when users forget their password or get locked out of their accounts, they can securely reset or unlock their accounts using predefined authentication methods such as security questions or OTP. This eliminates the need for manual intervention and significantly reduces ticket volume. Beyond the core use case, One Identity Password Manager plays an important role in improving security and compliance by enforcing strong password policies and enabling secure self-service. It reduces the risk associated with weak or compromised credentials. It also improves user experience since employees do not have to wait for IT support, which ultimately increases productivity across the organization.
Senior Cyber Security Manager at Business Integration Partners
Reseller
Aug 10, 2023
In my company, we use the solution's dictionary rule to see the availability of passwords or for the integration to other external systems with two-factor authentication.
The primary use case for One Identity Password Manager is for a user to reset the password himself. For example, if the end-user goes on vacation or emergency leave, after some time when that user returns to work, he could forget his password. That end-user can ask the system administrator or Active Directory administrator to reset the password because there's a way for the administrator to crack the password for the user. Still, if the user has One Identity Password Manager, he can reset the password by answering a few questions correctly. He'll be able to answer the questions if he sets the questions on One Identity Password Manager before the password reset. Implementing One Identity Password Manager is better because it can provide better security. For example, the administrator could reset the password without knowing whether the person requesting the password reset was the actual user and not a scammer.
Learn what your peers think about One Identity Password Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
I work for a company that implements products. We use One Identity Password Manager to reset passports after a vacation. People forget their passwords while on vacation.
* Allow end users to reset AD password by either answering security questions or by generating OTP * Reduce load on helpdesk * Allow end user self-service outside office hours by allowing access to self-service portal from outside corporate network
One Identity Password Manager offers a reliable self-service password reset and account unlock solution, enhancing security with strict password policies and multi-factor authentication. It integrates seamlessly with directory services, offering customization and language support for global users.Organizations employ One Identity Password Manager to streamline password management, reduce IT workloads, and elevate security through strong password enforcement and identity verification. The tool...
My main use case of One Identity Password Manager is to simplify and secure password management for users. It helps with self-service password reset and account unlock, which reduces dependency on IT support and saves time for both users and administrators. When employees forget their password or get locked out of their accounts, they previously had to raise a ticket and wait for IT support, which would take time, especially during busy hours. Now they can reset their password themselves using the self-service features in minutes. It saves a lot of time for both users and the IT team, and operations are much smoother because of it.
One Identity Password Manager has been used in our organization for approximately one to 1.5 years in an expertise environment. My primary focus has been on self-service password resets, account unlocks, and enforcing password policies. The main use case for One Identity Password Manager is enabling self-service password reset and account unlocks for users. It helps reduce dependency on the IT help desk and improves overall efficiency. For example, in day-to-day work, when users forget their password or get locked out of their accounts, they can securely reset or unlock their accounts using predefined authentication methods such as security questions or OTP. This eliminates the need for manual intervention and significantly reduces ticket volume. Beyond the core use case, One Identity Password Manager plays an important role in improving security and compliance by enforcing strong password policies and enabling secure self-service. It reduces the risk associated with weak or compromised credentials. It also improves user experience since employees do not have to wait for IT support, which ultimately increases productivity across the organization.
Users reset their passwords using Password Manager, helping to enforce compliance.
In my company, we use the solution's dictionary rule to see the availability of passwords or for the integration to other external systems with two-factor authentication.
My organization implemented this solution for clients. I was a developer on the reseller team. We used version 5.9.
The primary use case for One Identity Password Manager is for a user to reset the password himself. For example, if the end-user goes on vacation or emergency leave, after some time when that user returns to work, he could forget his password. That end-user can ask the system administrator or Active Directory administrator to reset the password because there's a way for the administrator to crack the password for the user. Still, if the user has One Identity Password Manager, he can reset the password by answering a few questions correctly. He'll be able to answer the questions if he sets the questions on One Identity Password Manager before the password reset. Implementing One Identity Password Manager is better because it can provide better security. For example, the administrator could reset the password without knowing whether the person requesting the password reset was the actual user and not a scammer.
I work for a company that implements products. We use One Identity Password Manager to reset passports after a vacation. People forget their passwords while on vacation.
I have been using One Identity Password Manager for approximately one year.
* Allow end users to reset AD password by either answering security questions or by generating OTP * Reduce load on helpdesk * Allow end user self-service outside office hours by allowing access to self-service portal from outside corporate network