ADSelfService Plus provides password
expiration notifications to alert users before their passwords expire and help prevent account lockouts.
However, in certain scenarios, these password expiry notifications may not be delivered effectively to end users.
Listed below are the possible causes for this issue.
Possible causes
SMTP server error: The SMTP server may encounter errors such as connectivity issues or reaching
the maximum limit for sending emails, which can prevent notifications from being delivered.
Corresponding attribute not found: The required attribute configured for notifications may be
empty in the AD user account. Even if the user is included in the notification policy, missing or invalid
attribute values can prevent password expiration notifications from being delivered.
User not included in the specified OU or group: Password expiry notifications may be configured
for specific domains, organizational units (OUs), or groups, and the affected user may not be part of the
defined scope.
PSO retrieval permission issue: This issue can occur if the service account configured in
Domain Settings does not have sufficient permissions to read Password Settings Objects (PSOs) in Active
Directory when fine-grained password policies (FGPPs) are configured.
Advanced settings misconfiguration: Exclusions enabled in the Advanced settings (such as
non-enrolled users, disabled accounts, or smart-card-enabled users) may unintentionally exclude eligible users
from receiving password expiry notifications.
MSSQL-dump-related issue: Password expiration notifications may be affected if the service
account used to access the MSSQL database does not have the required bulkadmin server role in Microsoft SQL
Server, which can cause bulk database operations to fail. Without successful database access, ADSelfService Plus
cannot read the password data needed to calculate expiry dates, which can prevent password expiration
notifications from being delivered.
Retry option not enabled for failed notifications: If notifications are scheduled as one-time
alerts for specific days and the retry option is not enabled, any initial delivery failure will result in the
notification not being resent.
Resolution
Case 1: SMTP server error
Log in to the ADSelfService Plus admin portal.
Navigate to the Configuration tab. Under Self-Service, select Password
Expiration
Notification and locate the configured scheduler.
Check Last Run Report to view the most recent execution details.
Review the reported SMTP error and troubleshoot the issue based on the error message, such as configuration
issues, authentication failures, or email-sending limit restrictions. Figure. 1: Details for reviewing SMTP error details in the password expiration notification
scheduler.
Case 2: Corresponding attribute not found
Password expiration notifications depend on specific Active Directory attributes:
mail attribute: Used for email notifications.
mobile attribute: Used for SMS notifications.
mail attribute: Used for identity verification during ADSelfService Plus mobile app enrollment,
which enables push notifications.
If these attributes are empty, invalid, or improperly formatted in the user’s Active Directory account,
notification delivery will fail.
Navigate to the Configuration tab.
Under Self-Service, select Password Expiration Notification and locate the configured
scheduler.
Click Last Run Report to view the most recent execution details.
Check whether the report indicates a delivery failure due to an invalid or missing attribute. If so, verify that
the required attribute (mail or mobile) is updated in the affected user’s Active Directory account.
Note: The administrator can manually update the required attribute in Active
Directory.Alternatively, users can update their contact details using the Directory
Self-Update feature in ADSelfService Plus.
Case 3: User not included in the configured scope
If the user is not part of the configured domains, OUs, or groups, password expiration notifications will not be
applied to that user.
Step 1: Identify the user’s OU and group membership
Before modifying the scheduler scope, verify where the user is located in Active Directory.
Option A: Using Active Directory Users and Computers
Open Active Directory Users and Computers.
Search for the affected user
Check the following:
The OU location
The Member Of tab to view group memberships.
Option B: Using ADSelfService Plus Employee Search
Log in to ADSelfService Plus.
Use the Employee Search option to locate the user.
Verify the user’s domain, OU, and group membership details.
Once the correct OU and groups are identified, ensure they are included in the notification scheduler scope.
Step 2: Update the notification scope
Navigate to the Configuration tab.
Under Self-Service, select Password Expiration Notification.
Locate the configured scheduler and click Edit.
Under the Select Domain section, choose the required domain.
Select the appropriate OUs and groups that include the affected user.
Save the changes to update the notification policy Figure. 2: Details for configuring the notification scope in the password expiration
notification scheduler.
Case 4: PSO retrieval permission issue
Navigate to the Configuration tab. Under Self-Service, select Password
Expiration
Notification and locate the configured scheduler.
Click Last Run Report to view the most recent execution details.
Review the report to check whether there are errors related to retrieving PSOs.
If such errors are reported, verify that the service account configured in Domain Settings has
sufficient permissions to read PSO objects in Active Directory.
If the required permissions are not present, grant Read permissions for the following objects
using
Active Directory Users and Computers through the Delegate Control option:
Open Active Directory Users and Computers.
Right-click the domain or the container where the password settings objects are stored and select
Delegate Control.
Click Next, then click Add and select the service account
configured in ADSelfService Plus Domain Settings.
Click Next and select Create a custom task to delegate.
Select Only the following objects in the folder, and choose the following object types:
msDS-PasswordSettings
msDS-PasswordSettingsContainer
Click Next, select Read permissions, and complete the delegation.
Note: For detailed permission requirements, refer to the Display
fine-grained password policy section in the
permissions guide .
Case 5: Advanced settings misconfiguration
Follow the steps below to ensure that eligible users are not unintentionally excluded from receiving password
expiration notifications:
Navigate to the Configuration tab. Under Self-Service, select Password
Expiration
Notification
Locate the Advanced settings of the configured password expiration notification scheduler.
Review the exclusion settings and verify the following:
Non-enrolled users:
Check whether notifications are excluded for non-enrolled users.
If enabled, verify the user’s MFA enrollment status using the MFA Enrolled
Users report.
Enroll the user for MFA, if required, to ensure notification delivery.
Disabled users:
Verify whether notifications are excluded for disabled users.
Ensure that the affected user account is enabled in Active Directory so notifications can be
sent.
Smart card users:
Check whether the Exclude Smart Card users option is enabled.
If smart-card-enabled users need to be included, this option can be disabled
Click Save to apply the changes. Figure. 3: Details for modifying Advanced Settings in the password expiration notification
scheduler to include smart card users.
Case 6: MSSQL-dump-related issue
Navigate to the Configuration tab. Under Self-Service, select Password Expiration
Notification and locate the configured scheduler.
Normally, you would check the Last Run Report for errors. However, for an MSSQL dump issue, the
report may appear empty because the scheduler cannot write to the database due to insufficient permissions.
To troubleshoot:
Verify the database configuration by checking the database_params.conf file located in the
<installation_directory>\ conf directory
Determine the authentication mode:
SQL Authentication: The username specified in database_params.conf is used for
database
operations.
Windows Authentication: The user account running the ADSelfService Plus service is used
to access the database.
Ensure that the respective account has the bulkadmin server role in Microsoft SQL Server. Without this role,
bulk database operations may fail, preventing ADSelfService Plus from writing password expiration data, which in
turn causes notification failures.
If the required role is missing, grant the bulkadmin server role to the respective account in Microsoft SQL
Server.
Case 7: Retry option not enabled
If the retry option is not enabled, password expiration notifications that fail on the scheduled day will not be
resent. Notification delivery may temporarily fail due to:
Brief network interruptions between ADSelfService Plus and the mail or SMS server
Temporary mail server unavailability
Short-lived DNS resolution issues
Active Directory replication delays (recent attribute updates not yet replicated across domain controllers)
Mail server restrictions (bulk mailers)
To ensure notifications are not missed due to temporary failures:
Navigate to the Configurationtab. Under Self-Service, select Password
Expiration Notification.
Locate the configured scheduler and click Edit.
In the configured scheduler, click the Advanced option.
On the page that opens, locate the option Retry notification if scheduler fails to notify users on configured day .Enable this option by checking the box.
Click Save to apply the changes.
Enabling this option ensures that notifications that fail due to temporary environmental issues are retried
during the next configured schedule, reducing the risk of missed password expiry alerts.
Figure. 4: Enabling the retry notification under Advanced settings in the password expiration
notification scheduler.
Validation and confirmation
By following these steps, you can ensure the successful delivery of password expiration notifications. To validate
delivery, send a test notification and check the delivery status in the Password/Account
Expiry Notifications Delivery Report. To access the report, navigate to the Reports tab. Under Password
Self-Service Report, select Password/Account Expiry Notifications Delivery Report.
How to reach support
For further assistance, contact our support team here.
Request for Support
Need further assistance? Fill this form, and we'll contact you rightaway.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications using their Active Directory credentials.
Synchronize Windows Active Directory user passwords and account changes across multiple systems automatically, including Microsoft 365, Google Workspace, IBM iSeries, and more.
Strong passwords resist various hacking threats. Enforce Active Directory users to adhere to compliant passwords by displaying password complexity requirements.
Enable Active Directory users to update their latest information themselves. Quick search features help admins scout for information using search keys like contact numbers.