Cloud Directory Feature: Password Complexity Management

Cloud Directory Feature Password Complexity Management

The move to the cloud directory is underway en masse, with IT organizations shifting just about everything they can to the cloud. The common goal now is to get the company completely off-prem and into a full cloud environment. In many cases, the identity management platforms have been one of the last IT resources to make the leap. As IT admins look at various cloud identity management solutions, one of the most important criteria that they are interested in are the specific capabilities and features the platform can offer. In this blog post, we’ll discuss the cloud directory feature: password complexity management.

Passwords Are Here to Stay

Passwords are here to stay so Cloud Directory Feature: Password Complexity Management is important

As much as we have tried to get rid of passwords, it appears that they aren’t going anywhere anytime soon. In fact, the average business user has 191 passwords, according to LastPass. Passwords themselves aren’t the main challenge though. The major pain with passwords is the way that end users use them. IT organizations have learned over the years that the dramatic increase in the number of accounts an end user needs has resulted in them choosing weaker passwords. Passwords to accounts can be hard to remember, and with so many accounts being used it can create the desire to just have easy to remember passwords.

The research on this topic has varied over the years (Medium), but there is no doubt that long passwords can create some of the most difficult to crack passwords. Often, organizations will prefer to include special characters and numbers as well. In fact, according to security experts on NPR, the recommended password policy is that a user’s password be a long phrase. Full length sentences with punctuation and numbers are also popular. If that wasn’t enough, companies need to consider their specific compliance guidelines for passwords as well.

Ultimately, it is up to the organization to decide what password policies they want their end users to follow. Their choices include length, password reuse, alphanumeric characters, lockout attempts, and much more. The key is having an effective way to enforce their password policies.  IT admins know that end (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 83 posts and counting.See all posts by jon-griffin