7.4. Password Policies

When you have large groups of people, and confidential information to disseminate to them, then special precautions must be made to ensure that the information doesn't become available to those who may do harm with it. The most common access restriction utilized in IT today is the standard username plus password paradigm. Adoption of two factor and token-based authentication certainly is worth a look, but for this context I will discuss primarily how to best constrain global and per-user password policies to maximize the security that they can provide. When left to their own devices, end users will choose the shortest, easiest, and most guessable password as possible. Strong passwords to them are nothing more than an inconvenience, ...

Get Enterprise Mac Administrator's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.