Password complexity is a key component in maintaining a robust security policy. The evolution of the microchip has improved every aspect of modern technology – including the hackers’ ability to crack passwords. Increased processing power has transformed life for a hacker in the modern age - what once would have taken days or weeks to accomplish, can now be done in minutes or hours. viii

Guessed and cracked passwords are still among the most common threats to corporate security (accounting for nearly 25% of all network attacks).With users having an average of 25 online accounts that require passwords to access– password strength and security is often sacrificed for an increase in convenience. ix This sacrifice opens the doors for simple password cracking and puts a wide array of sensitive data at risk of exposure. If the 2014 Year of Data Breaches has taught the world anything, it is that one thing remains the same between the 14th century and today: money and finances can be replaced, but your identity is much more difficult to recover.

In an effort to avoid these losses, and to increase protection against the more sophisticated attacker,there has been a strong transition towards a more secure and complex password in order to protect user information - a move that has been met with much trepidation. With the various password complexity and strength requirements set by the ever-increasing number of password policies that users must adhere to, the frustration and confusion surrounding what makes a password ‘strong’ is overwhelming. In the corporate setting, this requires educating end users on proper complexity and password policy adherence – a tremendous time sink for any organization.

With Active Directory integration, these password-related issues can be reduced to almost nothing. Use of various Single-sign on protocols that are compatible with Active Directory will reduce the strain of remembering and retaining a high multitude of strong passwords with varying complexities.

Active Directory Single Sign-on gives an organization and its users a strong level of security with a high level of convenience – one that is strictly and completely configurable within the confines of Active Directory.