skip to main contentskip to footer

Quick links

  • Athletics
  • Make a gift
  • Newsroom
  • Job openings
  • Employee directory
  • Apply
  • Costs
  • Explore
Explore U of I
  • Visit and virtual tour
  • Student life
  • Find your degree
  • Get around campus
  • Meet Moscow
  • Join our email list
  • Events
  • Join ZeeMee
  • Athletics
Academics
  • Academic calendar
  • Find a major
  • Student support resources
  • Undergrad research opportunities
  • Meet the colleges
  • Online learning
  • Explore in-demand careers
Admissions
  • Meet your counselor
  • Deadlines
  • First-year students
  • Graduate students
  • Law students
  • Online students
  • Transfer students
  • International students
  • Admitted students
Financial aid
  • Cost of attendance
  • Steps for financial aid
  • FAFSA information
  • Financial aid FAQs
  • In-state scholarships
  • Out-of-state and international scholarships
  • Connect with financial aid
More
  • Student life
  • Research
  • Recreational offerings
  • Student resources
  • Alumni
  • Parents
  • Newsroom
  • Events
  • Sustainability initiatives
Find your passion - Explore majors Become a Vandal - Start an application
  • U of I news
  • Make a gift
  • Athletics
  • Directory
Events
Residence Hall Move-in
Welcome home! Move into your residence hall and start settling in for the 2025–26 academic year.
New Student Orientation
Orientation helps you navigate campus life, connect with your peers and prepare for your first semester at U of I.
Week of Welcome
Aug. 19-24, 2025 | Celebrate the start of a new academic year with a full week of fun, informative and community-building events for all Vandals.
Events
News
Student Dan Lauritzen working in the drone lab with Jason Karl for the College of Natural Resources
Drone lab supports aerial-based research
University of Idaho Fall 2023 Start up events.
Five reasons to join a U of I club or organization
News
Support a Vandal - Make a gift
  • Apply
  • Costs
  • Explore
  • Explore
  • Academics
  • Admissions
  • Financial Aid
  • Student life
  • Research
  • Recreational offerings
  • Student resources
  • Alumni
  • Parents
  • Newsroom
  • Events
  • Sustainability initiatives

Password standards

  • leadership
  • President's Office
  • Provost's Office
  • Finance and Administration
  • General Counsel
  • Information technology
  • leadership
  • President's Office
  • Provost's Office
  • Finance and Administration
  • General Counsel
  • Information technology
leadership
  • President's Office
  • Provost's Office
  • Finance and Administration
  • General Counsel
  • Information technology
  1. Home/
  2. leadership/
  3. Information technology/
  4. IT standards/
  5. Passwords

Overview

This standard addresses the authentication requirements for university accounts to ensure the confidentiality, integrity, and availability of university data and technology resources. Varying requirements reflect the current mitigation with multi factor authentication (MFA) as well as known risks.

What is in this document:

  • Zero trust requirements for high-risk data
  • Application of principle of least privilege from APM 30.10
  • Requirements of external/public systems
  • Session and timeout requirements
  • Remote and wireless access

What is NOT in this document:

  • Identity types and authentication (see: Identity and Authentication standard)
  • Auditing requirements for authentication (see:

    Audit and Accountability standard)

  • Full coverage of 3.1.* under NIST 800-171 for Controlled Unclassified Information 
     

Policy reference

  • APM 30.15 Password and Authentication Policy
  • APM 30.10 Identity and Access Management Policy
  • APM 30.11 University Data Classification and Standards

Purpose
This Access Control standard supports APM 30.11 University Data Classification and Standards and other relevant university policies.

Scope
These standards establish password requirements for all university faculty, staff, students, and affiliates accessing, storing, and processing UI data or using UI technology resources at any data classification level. Effective date: April 16, 2019.

Standards

U of I Office of Information Technology (OIT) is responsible for the content and management of these standards.

To request an exception to this standard contact: oit-security@uidaho.edu 

1. Individual accounts
  1. Length and expiration standards for individual accounts
    1. Low Risk (ex. Student) password requirements for length and expiration:

      Authentication factors Minimum characters Expiration
      With Duo Mobile or hardware factors only12 charactersindefinite
      With All MFA types12 characters400 days
    2. Moderate Risk (ex., most Faculty & Staff) password requirements for length and expiration:

      Authentication factors Minimum characters Expiration
      With Duo Mobile or hardware factors only12 charactersindefinite
      With All MFA types12 characters400 days
    3. High Risk password requirements for length and expiration:

      Authentication factors Minimum characters Expiration
      With Duo Mobile or hardware factors only12 characters1095 days
      With All MFA types12 characters90 days


       

2. Shared, functional and privilege accounts
  1. Length and expiration for shared, functional or privileged accounts
    1. Shared account password requirements for length and expiration:

      RiskAuthentication factors Minimum charactersExpiration
      LowWith Duo Mobile or hardware factors only12 charactersindefinite
      LowWith All MFA types12 characters400 days
      Moderate or HighWith Duo Mobile or hardware factors only12 characters1095 days
      Moderate or HighWith All MFA types12 characters90 days
    2. Functional account password requirements for length and expiration:

      RiskAuthentication factors Minimum characters Expiration
      AnyWith Duo Mobile or hardware factors only12 characters1825 days
      AnyWith All MFA types12 characters1825 days
    3. Privileged account password requirements for length and expiration:

      RiskAuthentication factors Minimum characters Expiration
      HighWith Duo Mobile or hardware factors only, or MFA Blocked12 characters400 days
3. Password aging, history and dictionary requirements
  1. New passwords may be immediately changed after previous change.
  2. Password history, or limits on reuse of previous passwords:
    Systems must be configured to prevent re-use of at least the last 24 passwords. Where systems do not support this, the system must be reviewed and approved by the ITS Security Office and any identified risks appropriately mitigated.
  3. Dictionary requirements:
    1. Standard dictionary checks on passwords are no longer required for individual UI passwords protected by MFA.
    2. Where systems support such use, dictionaries of known bad passwords must be checked to prevent use of susceptible passwords.
4. Multi-factor authentication requirements
System    Additional authentication factors required
High RiskYes
Moderate RiskYes, where password is Internet-exposed
Low RiskAt discretion of system owner
5. Hardware factors
  1. Hardware factors currently supported
    1. HOTP tokens provided and assigned by ITS, including those branded by Duo or Feitian
    2. Universal 2nd Factor (U2F) tokens supported by Duo, including Yubikeys
6. Mobile devices
  1. Mobile devices, including mobile phones and tablets accessing or processing UI data, or providing local authentication to UI data classified as Moderate or High risk, are required to enforce a PIN and/or biometric authenticator
    1. Mobile device password/PIN standards shall be:
      1. A minimum of 6 digits or characters
      2. No allowed repeating or sequential PINs (i.e., 123456, 999999, etc.)
      3. Automatically lock or erase after multiple bad authentication attempts
    2. ITS requires use of ITS-managed Application Protection, or Mobile Device Management to ensure security of UI data and meet this and other requirements, where data is processed at the Moderate or High classification level.
    3. Where laptop computers are configured with ITS-approved biometric authentication, they shall also be required to meet ITS mobile device standards for authentication with PIN.
    4. Approved biometrics include, but are not limited to:
      1. Apple Face ID or Fingerprint
      2. Microsoft Hello Face ID or Fingerprint, including the convenience PIN
      3. Android biometrics

Other references

  1. NIST SP800-171 (January 2016)
  2. NIST SP800-53r4 (April 2013)
  3. CIS Controls version 7

Definitions

  1. Privileged account

    Individual account utilized for elevated access to systems or data, which may include authority to make changes to access permissions, roles, security configuration, or non-public data of other users. (APM 30.10)

  2. Individual account

    Primary account assigned to a single individual for access to technology resources, including interactive logon to computers, email, VPN, Banner, or other U of I resources. (APM 30.10)

  3. Functional account

    Account used by applications and processes and not interactively by end users. (APM 30.10)

  4. Shared account

    Account used or shared where multiple users know the password or otherwise use the account for interactive logon. (APM 30.10)

  5. Remote access

    Access to an information system communicating through an external network (Internet)

  6. Local access

    Access to an information system directly and not through a network

  7. Multi-factor authentication

    Two or more factors to achieve authentication, including something you know (password); something you have (cryptographic device, hardware or software token); or something you are (biometric)

  8. Security functions

    Hardware and software of an information system responsible for enforcing system security controls or policy and supporting the isolation of code and data

*For further clarification, refer to APM or NIST SP800-171.

Revision history

3/6/2019 — Original document

  • M. Parks, D. Miller, D. Jacob

Footer

Ready to apply?

Start your application
Joe Vandal head illustration

Footer Navigation

Resources

  • Policies
  • Privacy statement
  • Web accessibility
  • Title IX

Campus

  • Directory
  • Map
  • Safety
  • Events

Information For

  • Prospective students
  • Current students
  • Parents
  • Employees
Logo

University of Idaho

875 Perimeter Drive, Moscow, ID 83844

208-885-6111

info@uidaho.edu

Engage with U of I on Facebook. Get the latest U of I updates on X. Catch up with U of I on Instagram. Grow your professional network by connecting with U of I on LinkedIn. Interact with University of Idaho's video content on YouTube. Join the University of Idaho ZeeMee conversation.
Support a Vandal - Make a gift
  • Athletics
  • Jobs
  • News

© 2025 University of Idaho