Fine-grained password policy feature is available with schema 2012 level. It enables user level configuration of password policies.
You can use the fine-grained password policy feature to:
Set multiple password policies within a single domain for a particular user or global security object.
Apply password restrictions and account lockout policies to set of users in a domain.
Policy can be applied only to user objects (or inetOrgPerson objects if they are used instead of user objects) and global security groups.
By default, only members of the Domain Admins group can set fine-grained password policies.
Fine-grained password policy cannot be applied to an organizational unit (OU) directly.
Fine-grained password policies do not interfere with custom password filters that you might use in the same domain.
During the schema extension to AD 2012 level, the script creates the Password Setting Container under the System container in the domain. The fine-grained password policy or Password Setting Object (PSO) can be created in the Password Setting Container.
Log in to one of the domain controllers, click mmc.> , and enter
In themenu, select .
Selectfrom the list, click > .
Right-clickand click .
Expand the tree view, right-click, then select > .
In thedialog box, select the class and click .
Specify the name of the Password Setting Object in thefield and click .
Specify the value for each of the following attributes and clickafter setting the value for each attribute.
- represents the priority of the policy over other policies. The value of the precedence must be set between 1 and 10. When multiple policies are applied on a single user, then the policy with lower precedence value takes the highest priority. It is recommended to create policies with different precedence value. If there are two different policies with the same precedence value, then the GUID of the object validates the effectiveness of the policy. The smaller the GUID, higher the effectiveness.
- set the value to false, unless you want to save the eDirectory passwords in a reversible format.
- set the number of passwords to be remembered for the user account.
- set the value to True, if you want the password to be complex for the user account, else set it to False.
- set the minimum length of the password for the user account.
- set the duration (DD:HH:MM:SS) within which the password cannot be changed. For example, 1:00:00:00 for one day. If you want to allow changing of password soon after it is set, set the value of this attribute to its default value (none).
- set the duration (DD:HH:MM:SS) you want the password to be valid before expiring. For example, 14:00:00:00 for 14 days.
- set the number of trials a wrong password is allowed before the account gets locked. Setting this attribute to a low value may result to an account lockout storm. Any existing users with wrongly cached passwords might lockout quickly.
- set the duration to be passed before the locked user account gets automatically unlocked.
- set the duration that the account should be in locked state after it gets locked.
Right-click the fine-grained password policy or Password Setting Object (PSO) created in the console tree and click.
Select the attribute, then click .
To apply the PSO on users, specify the users and click> > .
You can verify that theattribute contains an SID value.