Improving Azure AD password security
Just like AD domain passwords, Azure AD passwords are sensitive and must be secured to prevent infiltration into the enterprise network. Exposure of Azure AD passwords can also let hackers access other integrated cloud applications. Enabling password policies and banning weak passwords can enable the creation of stronger Azure AD passwords. Azure AD is equipped with password policies and the Azure AD Password Protection feature to achieve this, but they come with their downsides.
For example, password policies cannot restrict dictionary words, patterns, or palindromes. They also cannot be applied to only specific groups or OUs. The Azure AD Password Protection feature uses a database that has not been made public and relies on algorithms instead of data from breaches to expand the banned passwords list.
A better solution to secure Azure AD passwords
ManageEngine ADSelfService Plus, an integrated self-service password management and MFA solution for AD and cloud applications, supports advanced password policy settings for Azure AD. Some of the advantages of using this solution over Azure AD's native tools are:
- Application of password policies for specific OUs and groups.
- Restriction of patterns, palindromes, dictionary words, and character repetition in passwords.
- Access to the default weak passwords list.
- Enforcement of all four character groups (lowercase and uppercase alphabets, numbers, and symbols) in the password.
- Simple configuration to apply the password policies to on-premises AD, Azure AD, and other enterprise applications.
How to enable advanced password policies for Azure AD
Step 1: Synchronize ADSelfService Plus with Azure AD
- Log in to the ADSelfService Plus admin console with admin credentials.
- Navigate to Configuration > Self-Service > Password Sync/Single Sign On.
- Select the Office 365/Azure accounts application.
- Enter the Application Name, Description, and Domain Name of your Azure account.
- In the Assign Policies field, select the policies for which password sync needs to be enabled.
Note: ADSelfService Plus allows you to create OU- and group-based policies for your AD domains. To create a policy, go to Configuration > Self-Service > Policy Configuration > Add New Policy.
- Select Enable Password Sync and enter the Username and Password of the Azure account.
- Click Add Application.
Step 2: Configure the Password Policy Enforcer
- Log in to ADSelfService Plus.
- Go to Configuration > Self-Service > Password Policy Enforcer. Enable Enforce Custom Password Policy.
- In this section, you can manage:
- Characters: Restrict the number of special characters, numbers, and Unicode characters used in passwords.
- Repetition: Enforce a password history check during password reset, and restrict the consecutive repetition of a specific character from the username.
- Patterns: Restrict keyboard sequences, dictionary words, and palindromes.
- Length: Specify the minimum and maximum password lengths.
- Click Save.
The following options can also be enabled if needed:
- Users can bypass the policy requirements when the password length exceeds a specific limit.
- Users must comply with at least a specific number of the configured password policy settings.
- The configured password policy requirements can be enforced during native password resets from the Active Directory Users and Computers console and the Change Password screen. This requires the Password Sync Agent.
- Display the password policy requirements on the Reset and Change Password pages.
Other features to ensure Azure AD password security include:
- Integration with Have I Been Pwned? uses the service to restrict users from employing previously exposed passwords.
- Password status reports display instances of password resets and changes, and their status with additional information including the time of the change and the device used.
- The Password Strength Analyzer graphically indicates how complex a password is to help users create strong and secure passwords.
In addition to features that promote password protection, ADSelfService Plus also offers MFA to secure Azure AD logins with support of up to 19 authenticators including biometrics, YubiKey Authenticator, and time-based one-time passcodes.
Secure Azure AD logins with a holistic self-service password management, MFA, and SSO solution.
Download a free trial now!
Need further assistance? Fill this form, and we'll contact you rightaway.
Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus!
Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.
Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more.
Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.
Portal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.