Skip to content

Commit 3b3779f

Browse files
authored
Merge pull request #107702 from hpsin/patch-55
BCN: long passwords
2 parents 3b7e0e0 + 4e553d8 commit 3b3779f

File tree

1 file changed

+23
-1
lines changed

1 file changed

+23
-1
lines changed

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 1/24/2020
17+
ms.date: 3/13/2020
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin
2020
ms.custom: aaddev
@@ -38,6 +38,28 @@ The authentication system alters and adds features on an ongoing basis to improv
3838

3939
None scheduled at this time. Please see below for the changes that are in or are coming to production.
4040

41+
## March 2020
42+
43+
### User passwords will be restricted to 256 characters.
44+
45+
**Effective date**: March 13, 2020
46+
47+
**Endpoints impacted**: Both v1.0 and v2.0
48+
49+
**Protocol impacted**: All user flows.
50+
51+
Users with passwords longer than 256 characters that sign in directly to Azure AD (as opposed to a federated IDP like ADFS) will be unable to sign in starting March 13, 2020, and be asked to reset their password instead. Admins may recieve requests to help reset the users password.
52+
53+
The error in the sign in logs will be AADSTS 50052: InvalidPasswordExceedsMaxLength
54+
55+
Message: `The password entered exceeds the maximum length of 256. Please reach out to your admin to reset the password.`
56+
57+
Remediation:
58+
59+
The user is unable to login because their password exceeds the permitted maximum length. They should contact their admin to reset the password. If SSPR is enabled for their tenant, they can reset their password by following the "Forgot your password" link.
60+
61+
62+
4163
## February 2020
4264

4365
### Empty fragments will be appended to every HTTP redirect from the login endpoint.

0 commit comments

Comments
 (0)