
{"id":625,"date":"2011-10-06T00:06:51","date_gmt":"2011-10-06T00:06:51","guid":{"rendered":"http:\/\/tech-no.104.210.61.21.xip.io\/?p=625"},"modified":"2011-10-06T00:08:33","modified_gmt":"2011-10-06T00:08:33","slug":"fine-grained-password-policies-in-ad-2008","status":"publish","type":"post","link":"https:\/\/tech-no.org\/?p=625","title":{"rendered":"Fine Grained Password Policies in AD 2008"},"content":{"rendered":"<p>With the new fine-grained password policies feature in Windows Server 2008, we can finally create multiple password policies and account lockout policies for users in the same domain. The fact that the fine-grained password policies feature in Windows Server 2008 maps password policies to users and\/or groups means that we have virtually unlimited flexibility when it comes to password policy and account lockout policy requirements. This also eliminates the need to buy 3rd party software such as specops to accomplish this need.<\/p>\n<p>This\u00a0new fine-grained password policy feature in the Windows Server 2008 operating system provides organizations with a way to define different password and account lockout policies for different sets of users in a domain. You can use fine-grained password policies to specify multiple password policies within a single domain. You can use fine-grained password policies to apply different restrictions for password and account lockout policies to different sets of users in a domain. For example, you can apply more stringent settings to\u00a0trusted accounts and less strict settings to the accounts of end users. In other cases, you might want to apply a special password policy for accounts whose passwords are synchronized with other data sources. Such as users of Groupwise that you want to have a longer password age.<\/p>\n<p>Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they are used instead of user objects) and global security groups. Fine-grained password policy cannot be applied to an organizational unit (OU) directly. To apply fine-grained password policy to users of an OU, you can use a shadow group.<\/p>\n<p><strong>Note: <\/strong>As per Microsoft, <strong><em>\u201ca shadow group is a global security group that is logically mapped to an OU to enforce a fine-grained password policy. You add users of the OU as members of the newly created shadow group and then apply the fine-grained password policy to this shadow group. You can create additional shadow groups for other OUs as needed. If you move a user from one OU to another, you must update the membership of the corresponding shadow groups.\u201d <\/em><\/strong><\/p>\n<p>The concept of a shadow group has already introduced some confusion. It is important to understand that a shadow group is not a new type of group in AD DS. Also, AD DS does not have any means to handle group membership of a shadow group any differently than a regular AD DS group. Effectively, you must come up with a way to populate the membership of shadow groups. You can do this manually, or you can create a script and schedule it to run on an ongoing basis.<\/p>\n<p>To store fine-grained password policies, Windows Server 2008 includes two new object classes in the Active Directory Domain Services (AD DS) schema:<\/p>\n<ul>\n<li>\n<div><strong>Password Settings Container<\/strong><\/div>\n<\/li>\n<\/ul>\n<blockquote><p><strong><\/strong>A Password Settings Container (PSC) is created by default under the System container in the domain. You can view it by using the Active Directory Users and Computers snap-in with Advanced features enabled. It stores the Password Settings objects (PSOs) for that domain.<\/p><\/blockquote>\n<ul>\n<li>\n<div><strong>Password Settings Object<\/strong><\/div>\n<\/li>\n<\/ul>\n<blockquote><p><strong><\/strong>A Password Settings Object (PSO) has attributes for all the settings that can be defined in the Default Domain Policy (except Kerberos settings). In addition, a PSO has the following two new attributes:<\/p>\n<ul>\n<li>\n<div><strong>PSO link \u2013 <\/strong>This is a multivalued attribute that is linked to users and\/or group objects.<\/div>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<div><strong>Precedence \u2013 <\/strong>This is an integer value that is used to resolve conflicts if multiple PSOs are applied to a user or group object.<\/div>\n<\/li>\n<\/ul>\n<\/blockquote>\n<p>Keep in mind that fine-grained password policies are intended for cases where there are unique password and account lockout requirements. As such, only use fine-grained password policies when you have unique requirements and try to minimize the number of PSOs you create. If you have unique password and\/or account lockout requirements for a large number of users, consider deploying a dedicated domain for these users and using the domain policy to define the password and account lockout policies.<\/p>\n<p><strong>Example step-by-step guide to configuring fine-grained password policies in Windows Server 2008<\/strong><\/p>\n<h1><\/h1>\n<p>In the following steps, you will configure a fine-grained password policy in Windows Server 2008 that has the following settings:<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Option <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\"><strong>Setting <\/strong><strong><\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Enforce password history <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">24 passwords remembered<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Maximum password age <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">30 days<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Minimum password age <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">1 day<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Minimum password length <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">12 characters<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Passwords must meet complexity requirements<\/strong><\/td>\n<td valign=\"top\" width=\"319\">Disabled<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Option <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\"><strong>Setting <\/strong><strong><\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Account lockout duration <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Account lockout threshold <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">3<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"319\"><strong>Reset account lockout counter after <\/strong><strong><\/strong><\/td>\n<td valign=\"top\" width=\"319\">30 minutes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Note<\/strong>: <strong><em>domainname<\/em><\/strong><em> <\/em>in the following steps should be replaced with the NETBIOS name of your domain.<\/p>\n<ol>\n<li>\n<div>Logon to a Windows Server 2008 domain controller using an account that has membership in the Domain Admins group, or equivalent permissions.<\/div>\n<\/li>\n<li>\n<div>Go to <strong>Start<\/strong>, <strong>Administrative Tools<\/strong>, and then select <strong>Active Directory Users and Computers<\/strong><\/div>\n<\/li>\n<li>\n<div>Expand <strong><em>domainname<\/em>.com<\/strong>, right-click on the <strong>Users<\/strong> container, select <strong>New<\/strong>, and then select <strong>Group<\/strong>.<\/div>\n<\/li>\n<li>\n<div>On the <strong>New Object \u2013 Group<\/strong> window, enter <strong>DBAs<\/strong> into the <strong>Group Name<\/strong> field, and then click <strong>OK<\/strong><\/div>\n<\/li>\n<li>\n<div>Close <strong>Active Directory Users and Computers<\/strong><\/div>\n<\/li>\n<li>\n<div>Click <strong>Start<\/strong>, click <strong>RUN<\/strong>, type <strong>ADSIEDIT.MSC<\/strong>, and then click <strong>OK<\/strong><\/div>\n<\/li>\n<li>\n<div>In the <strong>ADSI Edit<\/strong> snap-in, right-click <strong>ADSI Edit<\/strong>, and then click <strong>Connect to<\/strong><\/div>\n<\/li>\n<li>\n<div>In the <strong>Name<\/strong> field, enter <strong><em>domainname<\/em>.com<\/strong>, and then click <strong>OK<\/strong><\/div>\n<\/li>\n<li>\n<div>Double-click <strong><em>domainname<\/em>.com<\/strong> in the console tree, double-click <strong>DC=<em>domainname<\/em>,DC=com<\/strong>, double-click <strong>CN=System<\/strong>, and then click <strong>CN=Password Settings Container<\/strong><\/div>\n<\/li>\n<li>\n<div>Right-click <strong>CN=Password Settings Container <\/strong>in the console tree, click New, and then click <strong>Object<\/strong><\/div>\n<\/li>\n<li>\n<div>In the <strong>Create Object<\/strong> dialog box, under <strong>Select a class<\/strong>, click <strong>msDC-PasswordSettings<\/strong>, and then click <strong>Next<\/strong>.<\/div>\n<\/li>\n<li>\n<div>In the <strong>Create Object<\/strong> dialog box, enter <strong>DBAs<\/strong> in the <strong>Value<\/strong> field, and then click <strong>Next<\/strong>.<\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-PasswordSettingsPrecedence<\/strong> value, enter <strong>1<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-PasswordReversibleEncryptionEnabled<\/strong> value, enter <strong>FALSE<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-PasswordHistoryLength<\/strong> value, enter <strong>24<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-PasswordComplexityEnabled<\/strong> value, enter <strong>FALSE<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-MinimumPasswordLength<\/strong> value, enter <strong>12<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-MinimumPasswordAgevalue<\/strong>, enter <strong>1:00:00:00<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-MaximumPasswordAge<\/strong>, enter <strong>30:00:00:00<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-LockoutThreshold<\/strong>, enter <strong>3<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-LockoutObservationWindow<\/strong>, enter <strong>0:00:30:00<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>For the <strong>msDS-LockoutDuration<\/strong>, enter <strong>(never)<\/strong>, and then click <strong>Next<\/strong><\/div>\n<\/li>\n<li>\n<div>Right-click on <strong>CN=DBAs<\/strong> in the console tree, and then select <strong>Properties<\/strong><\/div>\n<\/li>\n<li>\n<div>On the <strong>CN=DBAs Properties<\/strong> window, select the <strong>msDS-PSOAppliesTo<\/strong> attribute, and then click the <strong>Edit<\/strong> button<\/div>\n<\/li>\n<li>\n<div>On the <strong>Multi-valued Distinguished Name With Security Principal Editor <\/strong>window, click on the <strong>Add Windows Account<\/strong> button<\/div>\n<\/li>\n<li>\n<div>On the <strong>Select Users, Computers, or Groups <\/strong>window, enter <strong>DBAs<\/strong> in the <strong>Enter the object names to select<\/strong> field, and then click <strong>OK<\/strong><\/div>\n<\/li>\n<li>\n<div>Click <strong>OK <\/strong>on the <strong>Multi-valued Distinguished Name With Security Principal Editor<\/strong> window<\/div>\n<\/li>\n<li>\n<div>Click <strong>OK<\/strong> on the <strong>CN=DBAs Properties<\/strong> window<\/div>\n<\/li>\n<\/ol>\n<p>here is another example:<\/p>\n<p><a href=\"http:\/\/blog.thesysadmins.co.uk\/active-directory-fine-grained-passwords-with-adsi-edit.html\">http:\/\/blog.thesysadmins.co.uk\/active-directory-fine-grained-passwords-with-adsi-edit.html<\/a><\/p>\n<p>and another post regarding this<\/p>\n<p><a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/4627.aspx\">http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/4627.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the new fine-grained password policies feature in Windows Server 2008, we can finally create multiple password policies and account lockout policies for users in the same domain. The fact that the fine-grained password policies feature in Windows Server 2008 maps password policies to users and\/or groups means that we have virtually unlimited flexibility when &hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/625"}],"collection":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=625"}],"version-history":[{"count":3,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/625\/revisions\/627"}],"wp:attachment":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}