How is the temporary password generated for Enforce mode password resets?

    Applies to:
  • Legacy SecureAuth IdP
Deployment model:
  • On Premises
  • SecureAuth IdP Version affected: All


    What logic does the IdP follow when creating the temporary passwords used during password resets when Enforce mode is enabled?



    When a password is reset using "Enforce Password Change Requirements"  AND "Require Current Password" is set to "False", the IdP will not know the existing password for a user, so first it performs an administrative password reset to an automatically generated temporary password known only to the IdP. 

    The IdP will then use that temporary password to change the users password to one of the user's choice, thereby maintaining compliance with the domain password change policy.



    The IdP uses a randomizer that selects from upper case letters, lower case letters, numbers, and the following special characters !@#$%^&*()_+/

    The minimum length is defined in the IdP settings for the password complexity settings on the password reset settings page.


    The randomizer will randomly select a group of characters, then randomly choose a character from that group. it will continue to iterate in this fashion until all the groups have been used and then it will repeat until the length is met.



    SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.

    Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products.

    0 out of 0 found this helpful



    Please sign in to leave a comment.