Understanding AWS Managed Microsoft AD password policies
AWS Managed Microsoft AD enables you to define and assign different password and account lockout
policies (also referred to as fine-grained password policies
Policy | Setting |
---|---|
Enforce password history | 24 passwords remembered |
Maximum password age | 42 days * |
Minimum password age | 1 day |
Minimum password length | 7 characters |
Password must meet complexity requirements | Enabled |
Store passwords using reversible encryption | Disabled |
Note
* The 42 day maximum password age includes the admin password.
For example, you can assign a less strict policy setting for employees that have access to low sensitivity information only. For senior managers who regularly access confidential information you can apply more strict settings.
The following resources provide more information on Microsoft Active Directory fine-grained password policies and security policies:
AWS provides a set of fine-grained password policies in AWS Managed Microsoft AD that you can
configure and assign to your groups. To configure the policies, you can use standard
Microsoft policy tools such as Active Directory Administrative Center
How password policies are applied
There are differences in how the fine-grained password policies are applied depending on whether the password was reset or changed. Domain users can change their own password. An Active Directory administrator or user with the necessary permissions can reset users passwords. See the following chart for more information.
Policy | Password Reset | Password Change |
---|---|---|
Enforce password history | ||
Maximum password age | ||
Minimum password age | ||
Minimum password length | ||
Password must meet complexity requirements |
These differences have security implications. For example, whenever a user's password is
reset, the enforce password history and minimum password age policies are not enforced. For more
information, see Microsoft documentation on the security considerations related to enforce password history
Supported policy settings
AWS Managed Microsoft AD includes five fine-grained policies with a non-editable precedence value. The policies have a number of properties you can configure to enforce the strength of passwords, and account lock-out actions in the event of login failures. You can assign the policies to zero or more Active Directory groups. If an end-user is a member of multiple groups and receives more than one password policy, Active Directory enforces the policy with the lowest precedence value.
AWS pre-defined password policies
The following table lists the five policies included in your AWS Managed Microsoft AD directory and their assigned precedence value. For more information, see Precedence.
Policy name | Precedence |
---|---|
CustomerPSO-01 | 10 |
CustomerPSO-02 | 20 |
CustomerPSO-03 | 30 |
CustomerPSO-04 | 40 |
CustomerPSO-05 | 50 |
Password policy properties
You may edit the following properties in your password policies to conform to the compliance standards that meet your business needs.
You cannot modify the precedence values for these policies. For more details about how
these settings affect password enforcement, see AD DS:
Fine-grained password policies
Account lockout policies
You may also modify the following properties of your password policies to specify if and how Active Directory should lockout an account after login failures:
-
Number of failed logon attempts allowed
-
Account lockout duration
-
Reset failed logon attempts after some duration
For general information about these policies, see Account lockout
policy
Precedence
Policies with a lower precedence value have higher priority. You assign password
policies to Active Directory security groups. While you should apply a single policy to a
security group, a single user may receive more than one password policy. For example,
suppose jsmith
is a member of the HR group and also a member of the MANAGERS
group. If you assign CustomerPSO-05 (which has a precedence of 50) to
the HR group, and CustomerPSO-04 (which has a precedence of 40) to
MANAGERS, CustomerPSO-04 has the higher priority and Active Directory
applies that policy to jsmith
.
If you assign multiple policies to a user or group, Active Directory determines the resultant policy as follows:
-
A policy you assign directly to the user object applies.
-
If no policy is assigned directly to the user object, the policy with the lowest precedence value of all policies received by the user as a result of group membership applies.
For additional details, see AD DS:
Fine-grained password policies
Topics
Related AWS Security blog article