Skip to content

Update concept-sspr-policy.md #1599

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

OusmaneDi
Copy link

We have tested few scenarios where the user that is created in the cloud with no on-prem footprint can always reset their password using their old password. No matter where they reset they can re-use the same password over and over even after expiration.

This is because Entra ID does not store user's password, therefore when a user tries to reset their password and use their immediate old password, they are still able to reset.

The table in this document indicates that it shouldn't be possible and customers are opening support cases on. But this only applies when the user is synced from on-prem and tries to do password writeback.

password change history The last password can't be used again when the user changes a password. Password reset history The last password can be used again when the user resets a forgotten password.

We have tested few scenarios where the user that is created in the cloud with no on-prem footprint can always reset their password using their old password. No matter where they reset they can re-use the same password over and over even after expiration.

This is because Entra ID does not store user's password, therefore when a user tries to reset their password and use their immediate old password, they are still able to reset.

The table in this document indicates that it shouldn't be possible and customers are opening support cases on. But this only applies when the user is synced from on-prem and tries to do password writeback.

password change history	The last password can't be used again when the user changes a password.
Password reset history	The last password can be used again when the user resets a forgotten password.
Copy link
Contributor

@OusmaneDi : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

Copy link
Contributor

Learn Build status updates of commit ba24bab:

✅ Validation status: passed

File Status Preview URL Details
docs/identity/authentication/concept-sspr-policy.md ✅Succeeded

For more details, please refer to the build report.

For any questions, please:

@@ -50,6 +50,7 @@ The following Microsoft Entra password policy options are defined. Unless noted,
| Password expiry (Let passwords never expire) |Default value: **false** (indicates that passwords have an expiration date).<br>The value can be configured for individual user accounts by using the [Update-MgUser](/powershell/module/microsoft.graph.users/update-mguser) cmdlet. |
| Password change history | The last password *can't* be used again when the user changes a password. |
| Password reset history | The last password *can* be used again when the user resets a forgotten password. |
**Important:** The password change history in the above table applies to passwrd writeback. For users in the cloud only, reset password or Entra ID does not have the user's old password and as such cannot check for the same and prevent password reuse.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
**Important:** The password change history in the above table applies to passwrd writeback. For users in the cloud only, reset password or Entra ID does not have the user's old password and as such cannot check for the same and prevent password reuse.
> [!IMPORTANT]
> The password change history applies to password writeback. For users in the cloud only, reset password for Entra ID doesn't have the user's old password and can't check for or prevent password reuse.

@v-regandowner
Copy link
Contributor

@Justinha - Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

@v-dirichards
Copy link
Contributor

@Justinha Could you review this proposed update to your article and enter #sign-off in a comment if it's ready to merge?

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants