Password and account lockout policies on Azure Active Directory Domain Services managed domains

To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.

This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.


Password policies are only available for managed domains created using the Resource Manager deployment model. For older managed domains created using Classic, migrate from the Classic virtual network model to Resource Manager.

Before you begin

To complete this article, you need the following resources and privileges:

Default password policy settings

Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter account lockout settings than regular non-privileged accounts. You can create multiple FGPPs within a managed domain and specify the order of priority to apply them to users.

For more information about password policies and using the Active Directory Administration Center, see the following articles:

Policies are distributed through group association in a managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.

Password policies behave a little differently depending on how the user account they're applied to was created. There are two ways a user account can be created in Azure AD DS:

  • The user account can be synchronized in from Azure AD. This includes cloud-only user accounts created directly in Azure, and hybrid user accounts synchronized from an on-premises AD DS environment using Azure AD Connect.
    • The majority of user accounts in Azure AD DS are created through the synchronization process from Azure AD.
  • The user account can be manually created in a managed domain, and doesn't exist in Azure AD.

All users, regardless of how they're created, have the following account lockout policies applied by the default password policy in Azure AD DS:

  • Account lockout duration: 30
  • Number of failed logon attempts allowed: 5
  • Reset failed logon attempts count after: 2 minutes
  • Maximum password age (lifetime): 90 days

With these default settings, user accounts are locked out for 30 minutes if five invalid passwords are used within 2 minutes. Accounts are automatically unlocked after 30 minutes.

Account lockouts only occur within the managed domain. User accounts are only locked out in Azure AD DS, and only due to failed sign-in attempts against the managed domain. User accounts that were synchronized in from Azure AD or on-premises aren't locked out in their source directories, only in Azure AD DS.

If you have an Azure AD password policy that specifies a maximum password age greater than 90 days, that password age is applied to the default policy in Azure AD DS. You can configure a custom password policy to define a different maximum password age in Azure AD DS. Take care if you have a shorter maximum password age configured in an Azure AD DS password policy than in Azure AD or an on-premises AD DS environment. In that scenario, a user's password may expire in Azure AD DS before they're prompted to change in Azure AD or an on-premises AD DS environment.

For user accounts created manually in a managed domain, the following additional password settings are also applied from the default policy. These settings don't apply to user accounts synchronized in from Azure AD, as a user can't update their password directly in Azure AD DS.

  • Minimum password length (characters): 7
  • Passwords must meet complexity requirements

You can't modify the account lockout or password settings in the default password policy. Instead, members of the AAD DC Administrators group can create custom password policies and configure it to override (take precedence over) the default built-in policy, as shown in the next section.

Create a custom password policy

As you build and run applications in Azure, you may want to configure a custom password policy. For example, you could create a policy to set different account lockout policy settings.

Custom password policies are applied to groups in a managed domain. This configuration effectively overrides the default policy.

To create a custom password policy, you use the Active Directory Administrative Tools from a domain-joined VM. The Active Directory Administrative Center lets you view, edit, and create resources in a managed domain, including OUs.


To create a custom password policy in a managed domain, you must be signed in to a user account that's a member of the AAD DC Administrators group.

  1. From the Start screen, select Administrative Tools. A list of available management tools is shown that were installed in the tutorial to create a management VM.

  2. To create and manage OUs, select Active Directory Administrative Center from the list of administrative tools.

  3. In the left pane, choose your managed domain, such as

  4. Open the System container, then the Password Settings Container.

    A built-in password policy for the managed domain is shown. You can't modify this built-in policy. Instead, create a custom password policy to override the default policy.

    Create a password policy in the Active Directory Administrative Center

  5. In the Tasks panel on the right, select New > Password Settings.

  6. In the Create Password Settings dialog, enter a name for the policy, such as MyCustomFGPP.

  7. When multiple password policies exist, the policy with the highest precedence, or priority, is applied to a user. The lower the number, the higher the priority. The default password policy has a priority of 200.

    Set the precedence for your custom password policy to override the default, such as 1.

  8. Edit other password policy settings as desired. Account lockout settings apply to all users, but only take effect within the managed domain and not in Azure AD itself.

    Create a custom fine-grained password policy

  9. Uncheck Protect from accidental deletion. If this option is selected, you can't save the FGPP.

  10. In the Directly Applies To section, select the Add button. In the Select Users or Groups dialog, select the Locations button.

    Select the users and groups to apply the password policy to

  11. Password policies can only be applied to groups. In the Locations dialog, expand the domain name, such as, then select an OU, such as AADDC Users. If you have a custom OU that contains a group of users you wish to apply, select that OU.

    Select the OU that the group belongs to

  12. Type the name of the group you wish to apply the policy to, then select Check Names to validate that the group exists.

    Search for and select the group to apply FGPP

  13. With the name of the group you selected now displayed in Directly Applies To section, select OK to save your custom password policy.

Next steps

For more information about password policies and using the Active Directory Administration Center, see the following articles: