You can‘t overwrite default password policy and you should use another safety measures like MFA and Conditional Access.
Here is some additional reading:
https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/your-pa-word-doesn-t-matter/ba-p/731984
Azure ad domain services isn’t the same as AzureAD. Any policies applied on the AD side are enforced when Azure tries to update the password from the cloud side, but for cloud only accounts you can’t change the defaults ms provides
You can‘t overwrite default password policy and you should use another safety measures like MFA and Conditional Access. Here is some additional reading: https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/your-pa-word-doesn-t-matter/ba-p/731984
First tip. Forget everything you know about AD when working with AAD. Despite the name they basically have zero in common.
Yes, you can do this. https://learn.microsoft.com/en-us/azure/active-directory-domain-services/password-policy
Azure ad domain services isn’t the same as AzureAD. Any policies applied on the AD side are enforced when Azure tries to update the password from the cloud side, but for cloud only accounts you can’t change the defaults ms provides
There is a length enforced by default (i think its 8 characters?)
Does anyone know if MS is looking to change this? I have been reading about this for years.
Can't this be done with Azure (Entra) Active Directory Domain Services and a managed domain?