Passwords are among the most common authentication mechanisms and it is important to ensure that they are secure. Administrators may use policy objects to securely configure passwords to require good password practices by end users. In this video, learn about password policies, including password complexity, expiration, history or reuse, and length requirements. Also, learn about the password recovery, lockout, and disablement processes.
- [Instructor] Passwords are among the most common…authentication mechanisms, and it's important…to ensure that they are secure.…Administrators may use Group Policy Objects…to securely configure passwords…to require good password practices by end users.…Some password requirements exist…to make sure that passwords are difficult to guess…and resistant to brute force guessing attacks.…The first of these requirements…is the password length requirement.…Best practice is that passwords should be…at least eight characters long,…although some organizations require even longer passwords.…
The second requirement that makes passwords difficult…to guess is the password complexity requirement…that requires passwords include different types…of characters such as uppercase letters,…lowercase letters, digits, and symbols.…Strong password management practices also realize…that sometimes passwords fall into the wrong hands,…and users should be protected against an attacker…retaining long-term access to their accounts.…Best practices in this area include…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Identity and access management
- Using access cards and biometrics
- Multifactor authentication
- Password authentication protocols
- Device authentication
- Identity management life cycle
- Access control lists
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover subject/object model. In addition, the following topics were updated: registration and identity proofing, SSO and federation, and advanced authorization concepts.