O365 password complexity

Copper Contributor


We have 10 small business premium licenses and wish to setup the following password complexity requirements but it isn't obvious where I set this in the Office 365 admin portal.


    • be a minimum of 10 characters in length.
    • contain both capital and lower case letter.
    • contain numbers or other special characters.
    • Not allowed to reuse historic passwords
    • Enforce password change every 6 months, with a 30 day nag countdown popup to change password


This is just a cloud account, there is no AD Sync with any of our offices servers. Is this possible as it is with regular Small Business Premium licenses? Where and how would I set the following for ALL users/system wide on Office 365?

Thank you.


18 Replies

Thanks Adam.

Ok - I see the expiration option now thank you.


But im a little stuck on complexity. Is there a webpage in O365 or Azure backend to set these options?


Also is there a way to enforce a password change across all users, so they must change passwords on next login to office.com ? This would be useful once I set the complexity.

So it looks like by default it has Strong password enabled, but it only enforces 8 characters, we simply want to change it to 10-16, how best to do that?


Thanks again,



Check the first link about azure B2b in the link!
I’m not sure about this one though! It seems to be in preview and don’t know about license requirements etc! Try it out


I've just tried to go over this and it seems incredibly long winded, why on earth do Microsoft make it so complicated to adjust password policies?


Unfortunately the documentation did not work/the steps were broken, and I don't really understand the whole B2C concept or what it is exactly. This should be much simpler and built into t he Exchange admin area along with the password expiration options. I really don't understand the thought process behind this.


Thanks anyway, we will just stick with the 8-16 (16 is also an incredibly short limit??) they claim as 'strong'.




This is a common ask, but Microsoft hasn't communicated any plans to change it. The usual recommendation is to redirect the auth process on-premises by either AD FS or PTA so that the on-premises policies are honored.

Yup, but there are for sure millions of customers who don't have on-prem servers and just use O365.

Hopefully they make the system more comprehensive soon.

@vasil , do you know more about the azure policies?
Hi @NetzenRob,

Agree with everyone here that there is some limitations on the passwords.

If you want to up the strength of the front door, as 100% cloud users you should be able to enforce Multi-Factor Authentication (MFA) and then combined with the Microsoft Authenticator app this will give you much stronger protection even with 'weak' 16 character passwords.

Just a recommendation.

Best, Chris
Very good point Chris!! No password will ever be better than having MFA , no matter policy
Yea - FIDO 2 Security Key with Windows Hello on Azure AD Joined machines.
Thanks guys but we really just want to alter the minimum password length in o365 at the moment to 10chrs.
Should be easy but isn’t.

Thanks @NetzenRob

Yes, it should. If MFA or Azure AD Connect via Local AD (As Vasil suggested) is not an option then the only possible course of action will be to add your name to the uservoice here


Unfortunately, this has been asked for a very long time and its unlikely that they will change the default Azure AD Password Policy any time soon. Wish I could help more.

Hope that answers your question.

Best, Chris

@Christopher Hoard It is awesome that Microsoft shuts down User Voice after pushing everyone to use that for feedback on features and behaviors that are lacking in the product.  It was bad enough that many important behaviors were not included, and often took years through the User Voice channel.  Now it seems they just don't want to hear it and there is no viable avenue to get these features or behaviors improved in M365.

@NetzenRob The passwords that O365 auto-creates are 8 characters, upper AND lower case, numerals, no symbols.

@Doug_Matsuoka808 the issue we have is that to meet some Government requirements for government contractors they need to meet a minimum requirement of more than 8 characters. So there are times when it's important to set it higher than 8 characters. 

As it stands we have it as a company policy but there is no technical way to enforce it on M365.



If I remember correctly, there used to be a setting at tenant level in AAD that allowed changing the default minimum password length, but Microsoft removed it. We want to see this setting restored. We use a company managed password manager, along with MFA, so a longer password length would be a benefit (as we can monitor password strength).


We are using AAD only, with AAD joined devices managed by InTune MDM. Currently there is the option to set conditional access policy for password length at device level, but not the configuration. If we set the CA policy to 14 characters, then a user resets their password in a browser, which is governed by Microsoft's 365 setting of 8 characters, then the device gets marked as non-compliant and the user must reset their password again.


Microsoft's own recommendations in the security center recommend a minimum password length of 14 characters. The security center recommendation gives the remediation guidance of using a GPO, which we cannot do as we are AAD only.


Microsoft need to look at this urgently. It is a ridiculous situation for cloud only AAD joined and MDM device managed 365 users.


2 years later, NO change