Although we provide recommendations, each client is ultimately able to configure the following password requirements:
- Complexity
- Length
- Reset Duration
- Reuse Duration
- Password Token Availability
- Vendor Password Token Availability
- Number of Bad Passwords
- Amount of Time for Logins
- Amount of Time User is Locked Out of System