
Windows 10 Authentication Mechanisms
Introduction
Windows 10 offers several authentication mechanisms for users. This article will detail Windows 10 authentication methods and explore how to configure password policy, and how to configure picture passwords and PINs. We’ll also look at how to use Credential Manager, Credential Guard and Microsoft Password.
How to configure password policy in Windows 10
Windows 10 password policy is simple. To get there, type “run” into the Cortana search bar. When the run window pops up, type “secpol.msc” into the window and press enter. Click on “Account Policies” and then on “Password Policy.” At this point, you can configure Windows 10’s password policy.
You have several configurations available in Windows 10. They are:
- Enforce password history
- Maximum password age
- Minimum password age
- Minimum password length
- Password must meet complexity requirements
- Store passwords using reverse encryption
- Account lockouts
Configure passwords in Windows 10 to be as tight as possible, especially for organizations, in order to maintain a secure system.
How to configure picture passwords and PINs in Windows 10
Password authentication is just the beginning in Windows 10. You can also authenticate users with picture passwords and PINs.
Picture passwords
Picture passwords were introduced in Windows 8 to provide a novel method of signing in. Creating a picture password starts with a user-chosen picture; then the user draws a combination of straight lines, circles and taps that become a part of your password. To configure your picture password:
- Enter sign-in options in your Cortana search bar
- Scroll down to picture password and click Add
- You will be presented with a Windows security screen. Enter your password and click OK
- You will be presented with a “welcome to picture password” window. Click “Choose Picture” and follow the prompts to configure your picture password
PIN
Windows 10 users can choose to (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/BLTGrt3PThs/