Skip to content

Commit 7d53b94

Browse files
authored
Merge pull request #88941 from jay98014/bplfixes_20190918
Add content around user-visible password rejection messages.
2 parents 3c9f514 + a767b87 commit 7d53b94

File tree

2 files changed

+8
-1
lines changed

2 files changed

+8
-1
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,10 @@ No.
134134

135135
Audit mode is only supported in the on-premises Active Directory environment. Azure AD is implicitly always in "enforce" mode when it evaluates passwords.
136136

137+
**Q: My users see the traditional Windows error message when a password is rejected by Azure AD Password Protection. Is it possible to customize this error message so that users know what really happened?**
138+
139+
No. The error message seen by users when a password is rejected by a domain controller is controlled by the client machine, not by the domain controller. This behavior happens whether a password is rejected by the default Active Directory password policies or by a password-filter-based solution such as Azure AD Password Protection.
140+
137141
## Additional content
138142

139143
The following links are not part of the core Azure AD Password Protection documentation but may be a useful source of additional information on the feature.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,12 @@ This message is only one example of several possible outcomes. The specific erro
5252

5353
Affected end users may need to work with their IT staff to understand the new requirements and be more able to choose secure passwords.
5454

55+
> [!NOTE]
56+
> Azure AD Password Protection has no control over the specific error message displayed by the client machine when a weak password is rejected.
57+
5558
## Enable Mode
5659

57-
This setting should normally be left in its default enabled (Yes) state. Configuring this setting to disabled (No) will cause all deployed Azure AD Password Protection DC agents to go into a quiescent mode where all passwords are accepted as-is, and no validation activities will be executed whatsoever (for example, not even audit events will be emitted).
60+
This setting should be left in its default enabled (Yes) state. Configuring this setting to disabled (No) will cause all deployed Azure AD Password Protection DC agents to go into a quiescent mode where all passwords are accepted as-is, and no validation activities will be executed whatsoever (for example, not even audit events will be emitted).
5861

5962
## Next steps
6063

0 commit comments

Comments
 (0)