Fine Grained Password policy does not work for AD User

Gokhan Cil 1 Reputation point
2022-12-22T22:47:25.36+00:00

Hi Guys,

I am applying FGPP for a domain user with a less restrictive settings than the Default Domain Policy...

RunspaceId : 4de3d0c4-0065-4db3-b8d9-18358169e995
ComplexityEnabled : True
DistinguishedName : DC=internal,DC=xxxx,DC=xx,DC=xx
LockoutDuration : 00:30:00
LockoutObservationWindow : 00:30:00
LockoutThreshold : 7
MaxPasswordAge : 60.00:00:00
MinPasswordAge : 1.00:00:00
MinPasswordLength : 8
objectClass : {domainDNS}
objectGuid : 8d55a069-0d8a-457d-8f5d-1ef515fdb41b
PasswordHistoryCount : 24
ReversibleEncryptionEnabled : False

Upper settings are from Default Domain Policy.

And the PSO I applied for min 6 char complexity disabled...

When I try set a new password for that user which I applied the PSO directly to the user I still get the password complexity warning...

Also, Just for a test, I changed the PSO settings to MAX lockout threshold to 3 and account end it up locking but still cannot set 6 char password without complexity...

Whats going on here any idea guys??

Regards,,

Windows for business | Windows Client for IT Pros | Directory services | Active Directory
Windows for business | Windows Server | User experience | Other
Windows for business | Windows Client for IT Pros | User experience | Other
0 comments No comments
{count} votes

5 answers

Sort by: Most helpful
  1. Gary Reynolds 9,621 Reputation points
    2022-12-23T01:06:43.487+00:00

    Hi,

    Have a look at this article which can be used to confirm that the policy is being applied correctly.

    https://nettools.net/how-to-display-which-fine-grain-password-policy-is-applied/

    Gary.

    0 comments No comments

  2. Gokhan Cil 1 Reputation point
    2022-12-23T01:31:50.63+00:00

    Policy applying but not totally because you can confirm this by powershelll command with this:

    Get-ADUserResultantPasswordPolicy

    And Also you can check the AD User Attribute in AD which is two of them:

    msDS-PSOApplied

    msDS-ResultantPSO

    They both showing my PSO object is applying but not able to pass complex password setting defined on Default Domain Policy...

    Even though FGP should override Default Domain Policy....

    AD Version is Server 2016..

    0 comments No comments

  3. Anonymous
    2022-12-27T07:50:42.833+00:00

    Hello GokhanCil,

    Thank you for posting in our Q&A forum.

    Please check the password policy for this user that with FGPP.

    Open Powershell and run the command below.

    Get-ADUserResultantPasswordPolicy useraccount

    For example:
    274213-1351107.png

    Also, please ensure AD replication is working fine.

    Hope the information above is helpful.

    Best Regards,
    Daisy Zhou

    ===============================================

    If the Answer is helpful, please click "Accept Answer" and upvote it.

    0 comments No comments

  4. Gokhan Cil 1 Reputation point
    2023-01-02T22:18:54.793+00:00

    PS C:\Users\admin_xxx> Get-ADUserResultantPasswordPolicy bne_kiosk

    RunspaceId : 3b289949-5e71-4d6a-8056-300035d90300
    AppliesTo : {CN=BNE_KIOSK,OU=Shared Login Kiosk,OU=Shared
    Accounts,OU=_STAFF,DC=internal,DC=com,DC=au}
    ComplexityEnabled : False
    DistinguishedName : CN=PIN-CODE,CN=Password Settings
    Container,CN=System,DC=internal,DC=com,DC=au
    LockoutDuration : 00:30:00
    LockoutObservationWindow : 00:30:00
    LockoutThreshold : 0
    MaxPasswordAge : 00:00:00
    MinPasswordAge : 00:00:00
    MinPasswordLength : 6
    Name : PIN-CODE
    ObjectClass : msDS-PasswordSettings
    ObjectGUID : 1320a3ed-1b0d-4a7e-b4fe-79320dc4276b
    PasswordHistoryCount : 1
    Precedence : 2
    ReversibleEncryptionEnabled : False


  5. Gokhan Cil 1 Reputation point
    2023-01-03T00:09:52.74+00:00

    I wonder does it have anything to do with the DA account since I am using my delegated account??


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.