Jan 25 2019 02:04 AM
Hello,
We have 10 small business premium licenses and wish to setup the following password complexity requirements but it isn't obvious where I set this in the Office 365 admin portal.
This is just a cloud account, there is no AD Sync with any of our offices servers. Is this possible as it is with regular Small Business Premium licenses? Where and how would I set the following for ALL users/system wide on Office 365?
Thank you.
Rob
Jan 25 2019 02:30 AM
Jan 25 2019 02:41 AM
Thanks Adam.
Ok - I see the expiration option now thank you.
But im a little stuck on complexity. Is there a webpage in O365 or Azure backend to set these options?
Also is there a way to enforce a password change across all users, so they must change passwords on next login to office.com ? This would be useful once I set the complexity.
Jan 25 2019 02:57 AM
So it looks like by default it has Strong password enabled, but it only enforces 8 characters, we simply want to change it to 10-16, how best to do that?
Thanks again,
Rob
Jan 25 2019 03:08 AM
Jan 25 2019 03:33 AM
I've just tried to go over this and it seems incredibly long winded, why on earth do Microsoft make it so complicated to adjust password policies?
Unfortunately the documentation did not work/the steps were broken, and I don't really understand the whole B2C concept or what it is exactly. This should be much simpler and built into t he Exchange admin area along with the password expiration options. I really don't understand the thought process behind this.
Thanks anyway, we will just stick with the 8-16 (16 is also an incredibly short limit??) they claim as 'strong'.
Thanks
Rob
Jan 25 2019 12:31 PM
This is a common ask, but Microsoft hasn't communicated any plans to change it. The usual recommendation is to redirect the auth process on-premises by either AD FS or PTA so that the on-premises policies are honored.
Jan 25 2019 12:47 PM
Yup, but there are for sure millions of customers who don't have on-prem servers and just use O365.
Hopefully they make the system more comprehensive soon.
Jan 25 2019 12:54 PM
Jan 25 2019 01:21 PM
Jan 25 2019 01:38 PM
Jan 25 2019 01:43 PM
Jan 25 2019 02:28 PM
Jan 25 2019 03:44 PM
Aug 11 2021 10:47 AM
@Christopher Hoard It is awesome that Microsoft shuts down User Voice after pushing everyone to use that for feedback on features and behaviors that are lacking in the product. It was bad enough that many important behaviors were not included, and often took years through the User Voice channel. Now it seems they just don't want to hear it and there is no viable avenue to get these features or behaviors improved in M365.
Apr 25 2022 10:39 AM
@NetzenRob The passwords that O365 auto-creates are 8 characters, upper AND lower case, numerals, no symbols.
May 10 2022 08:25 AM
@Doug_Matsuoka808 the issue we have is that to meet some Government requirements for government contractors they need to meet a minimum requirement of more than 8 characters. So there are times when it's important to set it higher than 8 characters.
As it stands we have it as a company policy but there is no technical way to enforce it on M365.
May 20 2022 04:34 AM
If I remember correctly, there used to be a setting at tenant level in AAD that allowed changing the default minimum password length, but Microsoft removed it. We want to see this setting restored. We use a company managed password manager, along with MFA, so a longer password length would be a benefit (as we can monitor password strength).
We are using AAD only, with AAD joined devices managed by InTune MDM. Currently there is the option to set conditional access policy for password length at device level, but not the configuration. If we set the CA policy to 14 characters, then a user resets their password in a browser, which is governed by Microsoft's 365 setting of 8 characters, then the device gets marked as non-compliant and the user must reset their password again.
Microsoft's own recommendations in the security center recommend a minimum password length of 14 characters. The security center recommendation gives the remediation guidance of using a GPO, which we cannot do as we are AAD only.
Microsoft need to look at this urgently. It is a ridiculous situation for cloud only AAD joined and MDM device managed 365 users.