Understanding AWS Managed Microsoft AD password policies - AWS Directory Service

Understanding AWS Managed Microsoft AD password policies

AWS Managed Microsoft AD enables you to define and assign different password and account lockout policies (also referred to as fine-grained password policies) for groups of users you manage in your AWS Managed Microsoft AD domain. When you create an AWS Managed Microsoft AD directory, a default domain policy is created and applied to the Active Directory. This policy includes the following settings:

Policy Setting
Enforce password history 24 passwords remembered
Maximum password age 42 days *
Minimum password age 1 day
Minimum password length 7 characters
Password must meet complexity requirements Enabled
Store passwords using reversible encryption Disabled
Note

* The 42 day maximum password age includes the admin password.

For example, you can assign a less strict policy setting for employees that have access to low sensitivity information only. For senior managers who regularly access confidential information you can apply more strict settings.

The following resources provide more information on Microsoft Active Directory fine-grained password policies and security policies:

AWS provides a set of fine-grained password policies in AWS Managed Microsoft AD that you can configure and assign to your groups. To configure the policies, you can use standard Microsoft policy tools such as Active Directory Administrative Center. To get started with the Microsoft policy tools, see Installing Active Directory Administration Tools for AWS Managed Microsoft AD.

How password policies are applied

There are differences in how the fine-grained password policies are applied depending on whether the password was reset or changed. Domain users can change their own password. An Active Directory administrator or user with the necessary permissions can reset users passwords. See the following chart for more information.

Policy Password Reset Password Change
Enforce password history No Yes
Maximum password age Yes Yes
Minimum password age No Yes
Minimum password length Yes Yes
Password must meet complexity requirements Yes Yes

These differences have security implications. For example, whenever a user's password is reset, the enforce password history and minimum password age policies are not enforced. For more information, see Microsoft documentation on the security considerations related to enforce password history and minimum password age policies.

Supported policy settings

AWS Managed Microsoft AD includes five fine-grained policies with a non-editable precedence value. The policies have a number of properties you can configure to enforce the strength of passwords, and account lock-out actions in the event of login failures. You can assign the policies to zero or more Active Directory groups. If an end-user is a member of multiple groups and receives more than one password policy, Active Directory enforces the policy with the lowest precedence value.

AWS pre-defined password policies

The following table lists the five policies included in your AWS Managed Microsoft AD directory and their assigned precedence value. For more information, see Precedence.

Policy name Precedence
CustomerPSO-01 10
CustomerPSO-02 20
CustomerPSO-03 30
CustomerPSO-04 40
CustomerPSO-05 50

Password policy properties

You may edit the following properties in your password policies to conform to the compliance standards that meet your business needs.

You cannot modify the precedence values for these policies. For more details about how these settings affect password enforcement, see AD DS: Fine-grained password policies on the Microsoft TechNet website. For general information about these policies, see Password policy on the Microsoft TechNet website.

Account lockout policies

You may also modify the following properties of your password policies to specify if and how Active Directory should lockout an account after login failures:

  • Number of failed logon attempts allowed

  • Account lockout duration

  • Reset failed logon attempts after some duration

For general information about these policies, see Account lockout policy on the Microsoft TechNet website.

Precedence

Policies with a lower precedence value have higher priority. You assign password policies to Active Directory security groups. While you should apply a single policy to a security group, a single user may receive more than one password policy. For example, suppose jsmith is a member of the HR group and also a member of the MANAGERS group. If you assign CustomerPSO-05 (which has a precedence of 50) to the HR group, and CustomerPSO-04 (which has a precedence of 40) to MANAGERS, CustomerPSO-04 has the higher priority and Active Directory applies that policy to jsmith.

If you assign multiple policies to a user or group, Active Directory determines the resultant policy as follows:

  1. A policy you assign directly to the user object applies.

  2. If no policy is assigned directly to the user object, the policy with the lowest precedence value of all policies received by the user as a result of group membership applies.

For additional details, see AD DS: Fine-grained password policies on the Microsoft TechNet website.

Related AWS Security blog article