Enable strong password settings for password policies
Password policies allow you to define authentication policies and associated rules to enforce password settings for your end users.
HealthInsight task recommendation
Enable strong password settings to enforce strict password policies that define settings for password lockout, history, minimum age, and minimum length.
|Lock out||Specify the maximum number of invalid password attempts before locking the user's account. This provides protection against brute-force password attacks.|
|Minimum length||Specify a minimum password length of at least eight characters. Longer passwords provide greater protection against brute force attacks.|
|History||Specify the number of distinct passwords users must create before reusing a password. This prevents users from reusing a previous password when resetting their password. If there's a compromise that requires a password reset, you want to ensure users can't reuse compromised credentials.|
|Password age||Specify the minimum time interval required between password changes. This setting prevents users from bypassing the enforce password history requirement.|
|Common Password Check||Restrict the use of common passwords.|
The following information provides information about how end users are impacted when password settings are configured.
Users will be unable to access their accounts after multiple failed sign-ins.
When users are locked out, the account unlock options available to the users are specified by password policy lockout settings and policy rules defined by the admin. If no self-service or auto-unlock settings are enabled, users are required to contact the admin to unlock the account. The number of attempts should take into account both typical user sign-in patterns and security.
A lockout policy allowing only a low number of attempts may cause more lockout incidents. For example, users may mistype passwords when signing in from a mobile device or when they've recently changed their passwords. Some applications may auto-retry cached passwords when they're changed, resulting in user lockouts. However, a lockout policy with too high allowed attempts increases the risk of credential attacks.
Longer passwords are more difficult for users to remember, especially when combined with other complexity requirements (for example, require uppercase, lowercase, symbols, and so on).
NIST recommends longer passwords that are easy to remember (“phrase-like”) but more difficult to obtain from brute force attacks.
|History||Requires users to use a different password when resetting their password. This may result in an increased number of lockouts or password resets due to users forgetting their password.|
Prevent users from resetting their passwords before the password has reached the password age, and immediately after a previous password reset.
Consider, for example, configuring a shorter password age with a longer password history to prevent password reuse.
|Common Password Check||If a user chooses a password that matches one found on a list of commonly used passwords, they can't use that password.|
- In the Admin Console menu, navigate to Security > Authentication.
- In the Password tab, review each policy. To edit the policy, click Edit.
- Edit the password settings based on the recommendations.
- To enable each setting, select the checkboxes for Password History, Password Age, Lock out, and Common Password Check.
Sign-on policies and rules