Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • be the same as the username,
  • contain series of ascending or descending characters
  • contain strings known by hackers to be commonly used such as 'password' or 'letmein'

Passwords can:

  • use characters from this list:A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a b c d e f g h i j k l m n o p q r s t u v w x y z 1 2 3 4 5 6 7 8 9 0 ! " £ $ % ^ & * ( ) - =_+[ ] { } ; ' # : @ ~ , . / < > ? \ |there are some characters that cannot be in a password 

For the best security, your own passwords should be difficult to guess but easy for you to remember and as lengthy as you can comfortably manage within the constraints. 

...

The account becomes expired ON the expiry date - i.e. it does not allow the user to log in on the expiry date. The same is true of any other types of expiry date that may be in use by your organisation's schema such as eligibility expiry or permission set expiry.

Expiry reminder emails, if enabled, are sent 30 and 15 days before expiry.

...