peshkov - stock.adobe.com
How to create fine-grained password policy in AD Fine-grained password policies are a simple and effective way of ensuring password settings meet business requirements.Standard Active Directory configurations include a single password policy for all domain members, enforced domain-wide via Group Policy through the application of the Default Domain Policy. While Group Policy has thousands of options and is powerful and flexible, it cannot apply the fine-grained password policies that many of today's organizations need to stay secure.
To meet organizations' needs, Microsoft began offering fine-grained password policy options of Password Settings Container and Password Settings Objects with Windows Server 2008.
Getting started: Why fine-grained password policies?Those of us who have evolved with Active Directory (AD) likely followed -- or still follow -- the mantra that one password policy rules the entire domain. Forget that assumption.
Today's environments have multiple different users and groups that may require different password policies. Maybe you want to separate user accounts and service accounts -- or standard users and privileged users. Or maybe you want to synchronize passwords with other authentication providers.
You can do this with fine-grained password policy options.
Fine-grained password optionsFine-grained password policies are deployed via Password Settings Objects (PSOs), which are stored in the Password Settings Container.
Standard, account lockout and fine-grained passwords settings in ADA PSO offers the same password settings from Default Domain Policy options, including standard settings -- for example, minimum password length, minimum password age and minimum password age -- and account lock settings, such as threshold, observation window and duration. It also includes the following fine-grained policy-specific settings:
Note, any account without a PSO applied is subject to the password requirements defined in the Default Domain Policy.
Precedence and protect from accidental deletion settings in ADIn older networks, ensure the domain functional level is at least Server 2008. This shouldn't be a problem for most modern AD environments.
Designing a fine-grained password policyBefore a PSO can be implemented, it must be created. First, identify the types of accounts that need specialized password requirements. For the sake of example, here, we look at the following four identities:
Next, document password settings for each type.
The precedence attribute enables admins to set which PSO wins if more than one PSO is applied to a user account. IT admin accountsCreate a global group for each account type, and add the accounts to the appropriate groups. It's almost always more efficient to link settings to groups than individual users. These are sometimes called shadow groups and contain the same members as an organizational unit in AD.
Learn how to configure and implement PSOs and apply them to users and global groups.
Next StepsTop 5 password hygiene tips and best practices
Use these 6 user authentication types to secure networks
How to secure passwords with PowerShell
Dig Deeper on Identity and access managementRetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4