My organization has some accounts with the 'Password Never Expires' flag set and some without that setting. Among...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
other settings, the Group Policy Object in Active Directory will set the maximum age of a password to 180 days. When the Group Policy Object is applied, what happens to these accounts? Will all accounts be asked to reset their passwords immediately at next login or in 180 days?
The Group Policy Object in Active Directory affects existing accounts only when users try to change or update their passwords earlier than the maximum password age of 180 days. Otherwise, they'll be asked to reset their passwords in 180 days, not at the next login.
The clock starts ticking whenever the maximum age is set in the Group Policy Object. However, if individual accounts are set in an organization -- whether to never expire or some other setting -- the Group Policy Object setting in Active Directory will take precedence for all registered accounts. The only exception is systems older than Windows 2000, which don't support Active Directory password management.
Policies can be set for individual workstations or the entire domain, but should be set at the domain level to keep security consistent throughout the network. Active Directory manages password age through the Group Policy Objects editor of its administrative GUI. It can also manage password history, length and complexity.
Password policies, including password age, should be based on a thorough risk assessment of corporate systems and applications. Those with high-risk data, such as customer data or proprietary company information, should have tighter access control policies, meaning more frequent password expirations.
Make sure to have a consistent policy across the organization for password age and expiration, and put it in writing in accordance with corporate IT security standards.
Dig Deeper on Password Management and Policy
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.