This procedure is required if synchronizing passwords from a PingDirectory Server to Active Directory, or if synchronizing clear text passwords. These steps are not required if synchronizing from Active Directory to a PingData PingDirectory Server, or if not synchronizing passwords.
  1. On the Ping Directory Server that will receive the password modifications, enable the Change Log Password Encryption component. The component intercepts password modifications, encrypts the password and adds an encrypted attribute, ds-changelog- encrypted-password, to the change log entry. The encryption key can be copied from the output if displayed, or accessed from the <serverroot>/bin/sync-pipe-cfg.txt file.
    $ bin/dsconfig set-plugin-prop --plugin-name "Changelog Password
    Encryption" \
      --set enabled:true \
      --set changelog-password-encryption-key:<key>
  2. On PingDataSync Server, set the decryption key used to decrypt the user password value in the change log entries. The key allows the user password to be synchronized to other servers that do not use the same password storage scheme.
    $ bin/dsconfig set-global-sync-configuration-prop \
      --set changelog-password-decryption-key:ej5u9e39pqo68
Test the configuration or populate data in the destination servers using bulk resync mode. See Using the resync Tool on the Identity Sync Server. Then, use realtime-sync to start synchronizing the data. See Using the realtime-sync Tool for more information. If synchronizing passwords, install the Password Sync Agent (PSA) on all of the domain controllers in the topology.