skip to main contentskip to footer

Quick links

  • Athletics
  • Make a gift
  • Current students
  • Job openings
  • Employee directory
  • Apply
  • Costs
  • Explore
Explore U of I
  • Visit and virtual tour
  • Student life
  • Find your degree
  • Get around campus
  • Meet Moscow
  • Join our email list
  • Events
  • Join ZeeMee
  • Athletics
Academics
  • Academic calendar
  • Find a major
  • Student support resources
  • Undergrad research opportunities
  • Meet the colleges
  • Online learning
  • Explore in-demand careers
Admissions
  • Meet your counselor
  • Deadlines
  • First-year students
  • Graduate students
  • Law students
  • Online students
  • Transfer students
  • International students
  • Admitted students
Financial aid
  • Cost of attendance
  • Steps for financial aid
  • FAFSA information
  • Financial aid FAQs
  • In-state scholarships
  • Out-of-state and international scholarships
  • Connect with financial aid
More
  • Student life
  • Research
  • Recreational offerings
  • Student resources
  • Alumni
  • Parents
  • Newsroom
  • Events
  • Sustainability initiatives
Find your passion - Explore majors Become a Vandal - Start an application
  • Current students
  • Make a gift
  • Athletics
  • Directory
Events
Attend U of I’s cornerstone lecture series
Hear presentations spanning the arts, sciences, humanities and social sciences at the weekly Malcom Renfrew Interdisciplinary Colloquium.
Catch a U of I Theatre Arts production
U of I’s fall season features the genre-defying musical “Pippen,” Oct. 30 to Nov. 9 and an adaptation of Jean-Paul Sartre’s “No Exit,” Dec. 4-14.
Enjoy a Halloween night concert
Join the Lionel Hampton School of Music for an evening of spooky low brass music and storytelling fun at Tubaween 7:30 p.m. Oct. 31.
Events
News
University of Idaho Campus Winter
Alumni Association names new executive director
Students and faculty of the Calder School take part in an activity put on by the school and U of I's College of Natural Resources, including using CNR's logging simulator and learning from CNR faculty about forest industry careers. For UCM story about how U of I resources in Moscow, and the county Extension office in St. Maries, assists small, rural schools by bringing technology and lectures to them to aid their education.
U of I hosts forestry event for rural students
News
Support a Vandal - Make a gift
  • Apply
  • Costs
  • Explore
  • Explore
  • Academics
  • Admissions
  • Financial Aid
  • Student life
  • Research
  • Recreational offerings
  • Student resources
  • Alumni
  • Parents
  • Newsroom
  • Events
  • Sustainability initiatives

Password standards

  • leadership
  • President's Office
  • Provost's Office
  • Finance and Administration
  • General Counsel
  • Information technology
    • leadership
    • President's Office
    • Provost's Office
    • Finance and Administration
    • General Counsel
    • Information technology
    leadership
    • President's Office
    • Provost's Office
    • Finance and Administration
    • General Counsel
    • Information technology
    1. Home/
    2. leadership/
    3. Information technology/
    4. IT standards/
    5. Passwords

    Overview

    This standard addresses the authentication requirements for university accounts to ensure the confidentiality, integrity, and availability of university data and technology resources. Varying requirements reflect the current mitigation with multi factor authentication (MFA) as well as known risks.

    What is in this document:

    • Zero trust requirements for high-risk data
    • Application of principle of least privilege from APM 30.10
    • Requirements of external/public systems
    • Session and timeout requirements
    • Remote and wireless access

    What is NOT in this document:

    • Identity types and authentication (see: Identity and Authentication standard)
    • Auditing requirements for authentication (see:

      Audit and Accountability standard)

    • Full coverage of 3.1.* under NIST 800-171 for Controlled Unclassified Information
       

    Policy reference

    • APM 30.15 Password and Authentication Policy
    • APM 30.10 Identity and Access Management Policy
    • APM 30.11 University Data Classification and Standards

    Purpose
    This Access Control standard supports APM 30.11 University Data Classification and Standards and other relevant university policies.

    Scope
    These standards establish password requirements for all university faculty, staff, students, and affiliates accessing, storing, and processing UI data or using UI technology resources at any data classification level. Effective date: April 16, 2019.

    Standards

    U of I Office of Information Technology (OIT) is responsible for the content and management of these standards.

    To request an exception to this standard contact: oit-security@uidaho.edu 

    1. Individual accounts
    1. Length and expiration standards for individual accounts
      1. Low Risk (ex. Student) password requirements for length and expiration:

        Authentication factorsMinimum charactersExpiration
        With Duo Mobile or hardware factors only12 charactersindefinite
        With All MFA types12 characters400 days
      2. Moderate Risk (ex., most Faculty & Staff) password requirements for length and expiration:

        Authentication factorsMinimum charactersExpiration
        With Duo Mobile or hardware factors only12 charactersindefinite
        With All MFA types12 characters400 days
      3. High Risk password requirements for length and expiration:

        Authentication factorsMinimum charactersExpiration
        With Duo Mobile or hardware factors only12 characters1095 days
        With All MFA types12 characters90 days


         

    2. Shared, functional and privilege accounts
    1. Length and expiration for shared, functional or privileged accounts
      1. Shared account password requirements for length and expiration:

        RiskAuthentication factorsMinimum charactersExpiration
        LowWith Duo Mobile or hardware factors only12 charactersindefinite
        LowWith All MFA types12 characters400 days
        Moderate or HighWith Duo Mobile or hardware factors only12 characters1095 days
        Moderate or HighWith All MFA types12 characters90 days
      2. Functional account password requirements for length and expiration:

        RiskAuthentication factorsMinimum charactersExpiration
        AnyWith Duo Mobile or hardware factors only12 characters1825 days
        AnyWith All MFA types12 characters1825 days
      3. Privileged account password requirements for length and expiration:

        RiskAuthentication factorsMinimum charactersExpiration
        HighWith Duo Mobile or hardware factors only, or MFA Blocked12 characters400 days
    3. Password aging, history and dictionary requirements
    1. New passwords may be immediately changed after previous change.
    2. Password history, or limits on reuse of previous passwords:
      Systems must be configured to prevent re-use of at least the last 24 passwords. Where systems do not support this, the system must be reviewed and approved by the ITS Security Office and any identified risks appropriately mitigated.
    3. Dictionary requirements:
      1. Standard dictionary checks on passwords are no longer required for individual UI passwords protected by MFA.
      2. Where systems support such use, dictionaries of known bad passwords must be checked to prevent use of susceptible passwords.
    4. Multi-factor authentication requirements
    SystemAdditional authentication factors required
    High RiskYes
    Moderate RiskYes, where password is Internet-exposed
    Low RiskAt discretion of system owner
    5. Hardware factors
    1. Hardware factors currently supported:
      1. HOTP tokens provided and assigned by ITS, including those branded by Duo or Feitian
      2. Universal 2nd Factor (U2F) tokens supported by Duo, including YubiKeys
    6. Mobile devices
    1. Mobile devices, including mobile phones and tablets accessing or processing UI data, or providing local authentication to UI data classified as Moderate or High risk, are required to enforce a PIN and/or biometric authenticator
      1. Mobile device password/PIN standards shall be:
        1. A minimum of 6 digits or characters
        2. No allowed repeating or sequential PINs (i.e., 123456, 999999, etc.)
        3. Automatically lock or erase after multiple bad authentication attempts
      2. ITS requires use of ITS-managed Application Protection, or Mobile Device Management to ensure security of UI data and meet this and other requirements, where data is processed at the Moderate or High classification level.
      3. Where laptop computers are configured with ITS-approved biometric authentication, they shall also be required to meet ITS mobile device standards for authentication with PIN.
      4. Approved biometrics include, but are not limited to:
        1. Apple Face ID or Fingerprint
        2. Microsoft Hello Face ID or Fingerprint, including the convenience PIN
        3. Android biometrics

    Other references

    1. NIST SP800-171 (January 2016)
    2. NIST SP800-53r4 (April 2013)
    3. CIS Controls version 7

    Definitions

    1. Privileged account

      Individual account utilized for elevated access to systems or data, which may include authority to make changes to access permissions, roles, security configuration, or non-public data of other users. (APM 30.10)

    2. Individual account

      Primary account assigned to a single individual for access to technology resources, including interactive logon to computers, email, VPN, Banner, or other U of I resources. (APM 30.10)

    3. Functional account

      Account used by applications and processes and not interactively by end users. (APM 30.10)

    4. Shared account

      Account used or shared where multiple users know the password or otherwise use the account for interactive logon. (APM 30.10)

    5. Remote access

      Access to an information system communicating through an external network (Internet)

    6. Local access

      Access to an information system directly and not through a network

    7. Multi-factor authentication

      Two or more factors to achieve authentication, including something you know (password); something you have (cryptographic device, hardware or software token); or something you are (biometric)

    8. Security functions

      Hardware and software of an information system responsible for enforcing system security controls or policy and supporting the isolation of code and data

    *For further clarification, refer to APM or NIST SP800-171.

    Revision history

    3/6/2019 — Original document

    • M. Parks, D. Miller, D. Jacob

    Footer

    Ready to apply?

    Start your application
    Joe Vandal head illustration

    Footer Navigation

    Resources

    • Policies
    • Privacy statement
    • Web accessibility
    • Title IX

    Campus

    • Directory
    • Map
    • Safety
    • Events

    Information For

    • Prospective students
    • Current students
    • Parents
    • Employees
    Logo

    University of Idaho

    875 Perimeter Drive, Moscow, ID 83844

    208-885-6111

    info@uidaho.edu

    Engage with U of I on Facebook. Get the latest U of I updates on X. Catch up with U of I on Instagram. Grow your professional network by connecting with U of I on LinkedIn. Interact with University of Idaho's video content on YouTube. Join the University of Idaho ZeeMee conversation.
    Support a Vandal - Make a gift
    • Athletics
    • Jobs
    • News

    © 2025 University of Idaho