<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FAQs Archives - Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/blog/category/faqs/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/blog/category/faqs/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:15:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>FAQs Archives - Password RBL</title>
	<link>https://www.passwordrbl.com/blog/category/faqs/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Password Policy Recommendations for 2020</title>
		<link>https://www.passwordrbl.com/blog/password-policy-recommendations-for-2020/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 02 Feb 2020 18:31:46 +0000</pubDate>
				<category><![CDATA[FAQs]]></category>
		<category><![CDATA[HowTo]]></category>
		<category><![CDATA[Custom Blacklist]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Password Double Check]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Pwned Passwords]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79630</guid>

					<description><![CDATA[<p>We commonly receive a questions similar to what we recommend for a password policy or what our customers are currently [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-policy-recommendations-for-2020/">Password Policy Recommendations for 2020</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We commonly receive a questions similar to what we recommend for a password policy or what our customers are currently doing for their organization&#8217;s password policy after deploying password blacklisting.  Well, here&#8217;s Password RBL&#8217;s recommendation from 2019 (and still holds true today) and unsurprisingly, it&#8217;s also what many of our customers are doing, too.</p>
<p>While these recommendations are specific to Windows/Active Directory and Password Firewall, the same concepts can be applied to our API customers protecting a website or app.</p>
<h3>Password Policy settings:</h3>
<ul>
<li>Change the AD password policy to be a single, easy to understand, policy for the whole organization</li>
<li>Set a longer minimum length requirement (commonly 10 or 12 characters)</li>
<li>Enforce Password History of 24 (so people cannot use a previously chosen password)</li>
<li>Minimum Password Age (typically 1 day to avoid people continually changing passwords to defeat the history requirement)</li>
<li>Complexity requirements disabled (use a Password Firewall feature instead)</li>
<li>Maximum Password Age is increased (commonly 180 days or 1 year)  &lt;- end-users love this!</li>
</ul>
<p>&nbsp;</p>
<h3>Password Firewall settings:</h3>
<ul>
<li>Enable Required Character Sets option (commonly 2 or 3) &#8211; this replaces the AD password complexity requirement</li>
<li>Populate and use the custom blacklist feature (optional)</li>
<li>Optionally also query the Pwned Passwords blacklist (in addition to the Password RBL curated blacklist)</li>
<li>Enable Password Double-Check (eliminates end-users simply adding digits to the end of bad passwords)</li>
</ul>
<p>&nbsp;</p>
<p>After doing this, organizations can be confident that their employees are choosing strong passwords. Yes, users will need to update their password in 180 days or 1 year, but this is not very inconvenient and when they do, their password choice is scrutinized against blacklists again (to catch any passwords that have since been added to the blacklists).</p>
<p>Now, these organizations have an easy to understand password policy with a good length requirement (10+ characters), easy to meet complexity requirements, and they know that all the passwords in their Active Directory have already been scrutinized against up to 3 blacklists.  Therefore, even if the business is hit by a credential stuffing/password spray attack, which will probably happen, it will not be successful.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-policy-recommendations-for-2020/">Password Policy Recommendations for 2020</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAQ:  Why am I receiving Error EventID 3401 &#8220;Failed to connect to API&#8221;</title>
		<link>https://www.passwordrbl.com/blog/faq-why-am-i-receiving-error-eventid-3401-failed-to-connect-to-api/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 22 Apr 2018 05:12:44 +0000</pubDate>
				<category><![CDATA[FAQs]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79655</guid>

					<description><![CDATA[<p>API Connection error messages are typically seen for one of two reasons: 1.  We do not have the correct Public [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/faq-why-am-i-receiving-error-eventid-3401-failed-to-connect-to-api/">FAQ:  Why am I receiving Error EventID 3401 &#8220;Failed to connect to API&#8221;</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>API Connection error messages are typically seen for one of two reasons:</p>
<p>1.  We do not have the correct Public IP addresses authorized for you.  You need to inform Password RBL of the Public IP address(es) associated with any business sites where Password Firewall is running. The easiest way to do this, is to open a web browser on each domain controller and browse to: https://www.whatismypublicip.com/</p>
<p>2.  The other issue that can prevent Password Firewall from reaching our API is a company webfilter or proxy that is preventing access to &#8220;api.passwordrbl.com&#8221;.  This is the only URL that is needed by Password Firewall, so most customers choose to exempt this URL from their Proxy requirements, or whitelist it in their webfiltering solution.</p>
<p>(NOTE: By default, Password Firewall will continue to allow password changes to occur when there is a connectivity problem, so you are not impacting your users).</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/faq-why-am-i-receiving-error-eventid-3401-failed-to-connect-to-api/">FAQ:  Why am I receiving Error EventID 3401 &#8220;Failed to connect to API&#8221;</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAQ: Is Password Firewall Compatible with Office 365?</title>
		<link>https://www.passwordrbl.com/blog/faq-is-password-firewall-compatible-with-office-365/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 11 Mar 2018 03:15:54 +0000</pubDate>
				<category><![CDATA[FAQs]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79652</guid>

					<description><![CDATA[<p>The Short Answer Yes, using a Azure AD Connect feature called &#8220;Password Writeback.&#8221; The Longer Answer The Microsoft Azure AD [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/faq-is-password-firewall-compatible-with-office-365/">FAQ: Is Password Firewall Compatible with Office 365?</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Short Answer</h2>
<p>Yes, using a Azure AD Connect feature called &#8220;Password Writeback.&#8221;</p>
<h2>The Longer Answer</h2>
<p>The Microsoft Azure AD Connect sync tool supports a feature called Password Writeback that requires password changes made in the cloud to be evaluated against your on-premise Active Directory.  Password Firewall for Windows operates as an extension to the built-in password policy engine in Windows. This means that whenever a password is changed in the cloud (or on-premise), Password Firewall will scrutinize the password choice against all configured blacklists, including your own custom blacklist if you use that feature.</p>
<p>The Password Writeback operation happens in real-time, so if a blacklisted password is chosen, the user receives a standard message prompt in the cloud portal reporting that their password choice did not meet the organization&#8217;s password policy.  If the end-user wishes to change their password, then they are required to make a new password choice.</p>
<p>You can read about the Password Writeback feature here:<br />
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-writeback</p>
<h3>The Final Answer</h3>
<p>Password Firewall for Windows prevents use of bad passwords and is a great way to protect your Office 365-enabled organization.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/faq-is-password-firewall-compatible-with-office-365/">FAQ: Is Password Firewall Compatible with Office 365?</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FAQ: Is Password Firewall Compatible with Okta?</title>
		<link>https://www.passwordrbl.com/blog/is-password-firewall-compatible-with-okta/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 18:25:43 +0000</pubDate>
				<category><![CDATA[FAQs]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79643</guid>

					<description><![CDATA[<p>The Short Answer Yes The Longer Answer Customers of Okta&#8217;s Identity and Access Management (IAM) platform that also have an [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/is-password-firewall-compatible-with-okta/">FAQ: Is Password Firewall Compatible with Okta?</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Short Answer</h2>
<p>Yes</p>
<h2>The Longer Answer</h2>
<p>Customers of Okta&#8217;s Identity and Access Management (IAM) platform that also have an on-premise Active Directory link the two directories using Okta&#8217;s DC Agent, which employs a technology Okta dubs Delegated Authentication. This means that when a user authenticates to Okta, either at their web portal or via a Federated authentication connection, the username and password they supply is not verified against the Okta directory. Instead, Okta takes the supplied username and password and immediately checks them against the on-premise Active Directory via the DC Agent connection registered in the Okta tenant. This means that there actually is not a permanently stored (and synchronized) password at Okta.  But rather, Okta temporarily remembers the password that the end-user supplied during the login process (after the on-premise Active Directory confirms the values are correct).  Then, Okta applications can utilize this remembered password in future third-party application authentications.</p>
<p>A similar process occurs when an Okta user changes their password. Since there is no permanently stored password for the end-user in Okta, the newly chosen password is pushed down to the on-premise active directory for storage. But, the new password must meet the on-premise active directory password policy in order for the password change to be successful. Since Password Firewall operates as an extension to the normal Active Directory password policy, any Password Firewall checks must also be successful.</p>
<p>So, this means that when end-users update their password in the Okta portal, those passwords are still scrutinized by Password Firewall. And this is a good thing, because Okta becomes the central authentication hub of all cloud services for companies. Successful logins to Okta provide significant access to other third-party applications. This means that passwords in use at Okta need to be strong and definitely not passwords that have already been leaked in a public data breach.</p>
<h3>The Final Answer</h3>
<p>Password Firewall for Windows prevents use of bad passwords and is a great way to protect your Okta-enabled end-users.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/is-password-firewall-compatible-with-okta/">FAQ: Is Password Firewall Compatible with Okta?</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
