Implementing Strong Password

Posted on 2005-04-12
Medium Priority
Last Modified: 2010-03-18
We are in the process of implementing strong passwords which include punctuation.  The problem is we keep running into applications, even AD enabled ones, that don't like certain characters.  So far the ones that have caused problems are <,>,/ and \.  Is there a list of characters that are concidered acceptable for passwords?
Question by:rkanter
1 Comment
LVL 21

Accepted Solution

JBlond earned 500 total points
ID: 13770788
That depends on every single application which can't handle these characters...

Windows is (as far as I know) able to handle all this characters within passwords but that does not mean that third-party-apps can do the same. (http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/ServerHelp/d406b824-857c-4c2a-8de2-9b7ecbfa6e51.mspx)

Further, if the developers of these problematic applications don't fix this, I don't think there is (in combination with really strong passwords) a 'perfect' solution which can bypass these problems. If you still want to implement strong passwords, I would recommend to advice all users that a password has to contain at least one dot or hyphen, but no other special character.

Dots or hyphens are very common in strong passwords and no application should have a problem with this...

Featured Post

Get quick recovery of individual SharePoint items

Free tool – Veeam Explorer for Microsoft SharePoint, enables fast, easy restores of SharePoint sites, documents, libraries and lists — all with no agents to manage and no additional licenses to buy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A brief overview to explain gateways, default gateways and static routes OR NO - you CANNOT have two default gateways on the same server, PC or other Windows-based network device. In simple terms a gateway is formed when a computer such as a serv…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Loops Section Overview
Suggested Courses

750 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question