You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,19 +6,19 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 01/29/2023
9
+
ms.date: 03/06/2023
10
10
11
11
ms.author: justinha
12
-
author: sajiang
12
+
author: justinha
13
13
manager: amycolannino
14
-
ms.reviewer: sajiang
14
+
ms.reviewer: tilarso
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
# Combined password policy and check for weak passwords in Azure Active Directory
19
19
20
20
Beginning in October 2021, Azure Active Directory (Azure AD) validation for compliance with password policies also includes a check for [known weak passwords](concept-password-ban-bad.md) and their variants.
21
-
As the combined check for password policy and banned passwords gets rolled out to tenants, Azure AD and Office 365 admin center users may see differences when they create, change, or reset their passwords. This topic explains details about the password policy criteria checked by Azure AD.
21
+
This topic explains details about the password policy criteria checked by Azure AD.
22
22
23
23
## Azure AD password policies
24
24
@@ -34,12 +34,12 @@ The following Azure AD password policy requirements apply for all passwords that
34
34
| Characters not allowed | Unicode characters |
35
35
| Password length |Passwords require<br>- A minimum of eight characters<br>- A maximum of 256 characters</li> |
36
36
| Password complexity |Passwords require three out of four of the following categories:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check isn't required for Education tenants. |
37
-
| Password not recently used | When a user changes or resets their password, the new password can't be the same as the current or recently used passwords. |
37
+
| Password not recently used | When a user changes their password, the new password can't be the same as the current or recently used passwords. |
38
38
| Password isn't banned by [Azure AD Password Protection](concept-password-ban-bad.md)| The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
39
39
40
40
## Password expiration policies
41
41
42
-
Password expiration policies are unchanged but they're included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
42
+
Password expiration policies are unchanged but they're included in this topic for completeness. A *Global Administrator* or *User Administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
43
43
44
44
> [!NOTE]
45
45
> By default, only passwords for user accounts that aren't synchronized through Azure AD Connect can be configured to not expire. For more information about directory synchronization, see [Connect AD with Azure AD](../hybrid/how-to-connect-password-hash-synchronization.md#password-expiration-policy).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 01/29/2023
9
+
ms.date: 03/06/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -66,7 +66,7 @@ Combined registration supports the authentication methods and actions in the fol
66
66
> [!NOTE]
67
67
> <b>Alternate phone</b> can only be registered in *manage mode* on the [Security info](https://mysignins.microsoft.com/security-info) page and requires Voice calls to be enabled in the Authentication methods policy. <br />
68
68
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
69
-
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
69
+
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
70
70
> <b>FIDO2 security keys</b>, can only be added in *manage mode only* on the [Security info](https://mysignins.microsoft.com/security-info) page.
71
71
72
72
Users can set one of the following options as the default multifactor authentication method.
@@ -77,9 +77,9 @@ Users can set one of the following options as the default multifactor authentica
77
77
- Text message
78
78
79
79
>[!NOTE]
80
-
>Virtual phone numbers are not supported for Voice calls or SMS messages.
80
+
>Virtual phone numbers aren't supported for Voice calls or SMS messages.
81
81
82
-
Third party authenticator apps do not provide push notification. As we continue to add more authentication methods to Azure AD, those methods become available in combined registration.
82
+
Third party authenticator apps don't provide push notification. As we continue to add more authentication methods to Azure AD, those methods become available in combined registration.
83
83
84
84
## Combined registration modes
85
85
@@ -98,28 +98,32 @@ Combined registration adheres to both multifactor authentication and SSPR polici
98
98
99
99
The following are sample scenarios where users might be prompted to register or refresh their security info:
100
100
101
-
-*Multifactor Authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
102
-
-*Multifactor Authentication registration enforced through per-user multifactor authentication:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
103
-
-*Multifactor Authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
101
+
-*Multifactor authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
102
+
-*Multifactor authentication registration enforced through per-user multifactor authentication:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
103
+
-*Multifactor authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
104
104
-*SSPR registration enforced:* Users are asked to register during sign-in. They register only SSPR methods.
105
105
-*SSPR refresh enforced:* Users are required to review their security info at an interval set by the admin. Users are shown their info and can confirm the current info or make changes if needed.
106
106
107
-
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration is enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
107
+
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration are enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
108
108
109
109
Consider the following example scenario:
110
110
111
-
- A user is enabled for SSPR. The SSPR policy requires two methods to reset and has enabled Authenticator app, email, and phone.
111
+
- A user is enabled for SSPR. The SSPR policy requires two methods to reset and has enabled Microsoft Authenticator app, email, and phone.
112
112
- When the user chooses to register, two methods are required:
113
-
- The user is shown Authenticator app and phone by default.
113
+
- The user is shown Microsoft Authenticator app and phone by default.
114
114
- The user can choose to register email instead of Authenticator app or phone.
115
115
116
+
When they set up Microsoft Authenticator, the user can click **I want to setup a different method** to register other authentication methods. The list of available methods is determined by the Authentication methods policy for the tenant.
117
+
118
+
:::image type="content" border="true" source="media/concept-registration-mfa-sspr-combined/choose.png" alt-text="Screenshot of how to choose another method when you set up Microsoft Authenticator.":::
119
+
116
120
The following flowchart describes which methods are shown to a user when interrupted to register during sign-in:
117
121
118
122

119
123
120
124
If you have both multifactor authentication and SSPR enabled, we recommend that you enforce multifactor authentication registration.
121
125
122
-
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multi-factor authentication when accessing this page.
126
+
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multifactor authentication to access this page.
123
127
124
128
### Manage mode
125
129
@@ -135,7 +139,7 @@ A user has not set up all required security info and goes to the Azure portal. A
135
139
136
140
### Set up security info from My Account
137
141
138
-
An admin has not enforced registration.
142
+
An admin hasn't enforced registration.
139
143
140
144
A user who hasn't yet set up all required security info goes to [https://myaccount.microsoft.com](https://myaccount.microsoft.com). The user selects **Security info** in the left pane. From there, the user chooses to add a method, selects any of the methods available, and follows the steps to set up that method. When finished, the user sees the method that was set up on the Security info page.
0 commit comments