Skip to main content

Editing password strength rules

You can edit the system password strength policy enforced by Bravura Security Fabric to include or exclude certain rules, and change values on some rules.

To edit a password strength policy enforced by Bravura Security Fabric :

  1. Click Manage the system > Policies > Password policies .

    or

    Click Manage the system > Privileged access > Managed system policies. .

  2. Select the policy that you want to edit.

  3. Click the Password policy tab.

  4. Select an appropriate status from the drop-down list next to each rule.

    If applicable, type a value in the text field next to each enabled rule.

    Depending on the rule some status may not apply. The available status include:

    • Required The rule is enabled, and is strictly enforced.

      If a password supplied by a user does not satisfy the rule, Bravura Security Fabric rejects it.

    • Warning The rule is enabled, but is not enforced.

      If a password supplied by a user does not satisfy the rule, Bravura Security Fabric warns that the password is weak, but still accepts it.

      The built-in random password generator only generates passwords that satisfy the rule.

    • Disabled The rule is not applied to new passwords.

    • Enabled The rule is applied to new passwords.

      This status is available where enforcement does not apply.

    See Table 1, “Password strength rules below for definitions of the password strength rules supplied with Bravura Security Fabric .

  5. Select Hide description if you want to hide the rule from users in the web interface. If their chosen password violates the rule, an error message detailing the rule will be displayed.

    You can create a custom message to add to or replace the displayed rules.

  6. Click Update.

Table 1. Password strength rules

Rule name

Type

Description

have at least N characters

Req

The smallest number of characters that a legal password must have.

have at most N characters

Req / Warn

The largest number of characters that a legal password can have.

include both uppercase and lowercase characters

Req / Warn

Enable if passwords should have both uppercase and lowercase characters.

have at least N lowercase letters

Req / Warn

The smallest number of lowercase letters that a legal password can contain.

have at most N lowercase letters

Req / Warn

The largest number of lowercase letters that a legal password can contain.

have at least N uppercase letters

Req / Warn

The smallest number of uppercase letters that a legal password can contain.

have at most N uppercase letters

Req / Warn

The largest number of uppercase letters that a legal password can contain.

have at least N special characters (not letters or digits)

Req / Warn

The smallest number of non-alphanumeric characters that a legal password must contain. Spaces are treated as non-alphanumeric characters. Leading and trailing spaces are trimmed in Bravura Security Fabric .

Have at most N special characters (not letters or digits)

Req / Warn

The largest number of non-alphanumeric characters that a legal password can contain. Spaces are treated as non-alphanumeric characters. Leading and trailing spaces are trimmed in Bravura Security Fabric .

have at least N special characters (not letters or digits) not at the beginning and end

Req / Warn

Same as minimum non-alphanumeric characters, but not counting the first or last character of the password. Spaces are treated as non-alphanumeric characters. Leading and trailing spaces are trimmed in Bravura Security Fabric .

have at least N letters

Req / Warn

The smallest number of letters that a password must contain.

begin with a letter

Req / Warn

Enable to require all passwords to start with a letter. Useful for compatibility with some systems.

have at least N digits

Req / Warn

The smallest number of digits that a legal password must contain.

have at least N digits not at the beginning and end

Req / Warn

Same as minimum digits, but not counting the first or last character of the password.

have up to 8 characters, only @,#,$ special characters allowed (mainframe compatible)

Req / Warn

Intended for mainframe compatibility (can have up to 8 chars; alpha/num or @$#).

have password rules apply to the first N characters

Disabled / Enabled

This forces the first N characters of the password to comply with the password rules, and only the first N characters are used to validate the password. The number of characters must be set.

not be a dictionary word

Req / Warn

The password, stripped of non-letter characters, may not match a word (consisting of two or more letters) from the dictionary . For example, the passwords word123 and pa9sswor*d are not valid. The dictionary search is case-insensitive.

not be an exact dictionary word match (e.g. word)

Req / Warn

A password may not exactly match a dictionary word consisting of four or more letters. For example, the passwords w1o2r3d or word123 are valid. The password word is not valid. The dictionary search is case-insensitive.

not contain an exact dictionary word match (e.g. xyzword123)

Req / Warn

A password may not contain a dictionary word. For example, the password xyzword123 is not valid. The dictionary search is case-insensitive.

not contain a dictionary word (e.g. xyzw1o2r3d)

Req / Warn

A password, stripped of non-letter characters, may not contain a dictionary word. For example, the password xyzw1o2r3d is not valid. The dictionary search is case-insensitive.

not be a dictionary word rearranged (e.g. rdow123)

Req / Warn

A password, stripped of non-letter characters, may not be a dictionary word rearranged. For example, the password w1o2r3d4xyz is valid. The password rdow123 is not valid.

not be the profile ID or name

Req / Warn

The user’s profile ID or name may not be used as the new password. This applies to both the full name and each word in the name.

not be the profile ID or name reversed

Req / Warn

Same as above but with the letters in the name reversed. This applies to both the full name and each word in the name.

not contain the profile ID or name

Req / Warn

The user’s profile ID or name may not form part of the new password. This applies to both the full name and each word in the name.

not contain the profile ID or name reversed

Req / Warn

Same as above but with the letters in the name reversed.

not be the profile ID or name rearranged

Req / Warn

Same as above but with the letters in the name rearranged in any way. This applies to both the full name and each word in the name.

not contain rearranged profile ID or name

Req / Warn

The password cannot contain the user’s profile ID or name rearranged in any permutation and mixed with any number of other characters, numbers, or special characters. This is a more restrictive form than “Not a rearranged user name?”. It applies to both the full name and each word in the name. The length checked against the full name and each word in the name is decided by the MIN DICTWORD LENGTH setting in the Manage the system > Policies > Options menu. , and the punctuation marks like ’.’ are also stripped For example, with user name = Bob Jones, profile ID = JonesB the following passwords will be rejected:

  • obbonjes 1 (with the space)

  • bsenoj2

  • obbonjes3

  • bbo sdfd4

  • sdf4 snoje

not begin with the first N characters of the profile ID or name

Req / Warn

The new password may not contain the specified number of characters that begin the profile ID name.

require the password to be approved by this plugin

Disabled / Enabled

An external program is called to verify that a password is acceptable. See Rewriting target system operations for details.

generate random passwords using this plugin

Disabled / Enabled

Specify a plugin to generate random passwords instead of the built-in password generator. Used with Offer the user N random passwords .

warn if the password is not approved by this plugin

Disabled / Enabled

A warning will be generated if the password does not pass the password policy of the specified plugin.

have at most N pairs of repeating characters

Req / Warn

The maximum number of pairs of the same character appearing consecutively in new, legal password values.

The total possible pairs are counted in a sequence; for example, annno includes two pairs of ’n’s (the first two and the last two), and annnno includes three pairs; however, Uuno contains zero pairs, since upper and lower case letters are treated as different.

be one of the N suggested passwords

Req / Warn

Display some randomly-selected passwords that the user may choose as a new password value. If disabled, no suggested passwords will be displayed. It is strongly recommended that this rule is set to ’Warning’. This should only be set to ’Required’ in cases where corporate policy disallows non-computer-generated passwords.

Setting this rule to ’Required’ is not compatible with transparent password synchronization. See Transparent synchronization and generated passwords for details.

contain only characters available on a standard English (US) keyboard

Req / Warn

The password is rejected or a warning is issued if the password contains non-printable ascii characters. Non-printable ascii characters can create problems with character encoding translation. The Password policy rules web form provides a link to a page that lists valid characters.

not have N occurrences of the same character

Req / Warn

The password is rejected or a warning is issued if it contains any character occurring N times. N must be data-filled.

not be an old password

Req / Warn

New passwords may not be the same as old passwords for the selected targets.

allow old passwords after N days

Disabled / Enabled

Change the history rule, so that new passwords can be the same as old ones (in the history file), if they are over N days old. Ensure that this value is greater than the value of password must be changed every N days, if set. See Prevent users from re-using old passwords for more information.

password must be changed every N days

Disabled / Enabled

Prompt the user to change passwords every N days. Ensure this value is less than the value for allow old passwords after N days , if set.

not be one of last N passwords

Req / Warn

New passwords may not be the same as one of the last N passwords.

be different by at least N characters from the previous password

Req / Warn

The password is rejected or a warning is issued if the password does not contain N characters that do not already exist in the previous password.

not have been changed by you in the last N hours

Req / Warn

The password is rejected or a warning is issued if the password was changed in the last N hours.

current password may be reused for password resets for N days after its first use

Disabled / Enabled

Allow password reuse within limited days when used in conjunction with not be an old password .