Password Rules Monitor Activity (2024)

Password Messages

Using Password Rules Management, you define password reset, complexity, expiration, reuse, and lockout rules based on your district's needs. Once configured, user may encounter the following messages:

Occurs

Message

Action

Sign In

Your password was set by the system administrator. Please change your password.

User to reset their password.

Refer them to appropriate Reset Your Password procedure.

Sign In

Your password has expired. Please create a new password.

User to reset their password.

Refer them to appropriate Reset Your Password procedure.

Sign In

The number of sign in attempts for this account has been exceeded. Contact your school directly for assistance.

User to contact you to unlock their account. Refer toLock/Unlock Web Account Access.

Reset Password
Change Password

Current password is not correct.

User to re-enter password accordingly.

Reset Password
Change Password

New password must be at least [number] characters long.

User to re-enter password accordingly.

Reset Password
Change Password

New password must contain at least one uppercase and one lowercase letter.

User to re-enter password accordingly.

Reset Password
Change Password

New password must contain at least one letter and one number.

User to re-enter password accordingly.

Reset Password
Change Password

New password must contain at least one special character.

User to re-enter password accordingly.

Reset Password
Change Password

The verification password you enter must match the new password.

User to re-enter password accordingly.

Reset Password
Change Password

The password entered was previously used. Please enter a new password.

User to re-enter password accordingly.

Report of Sign-In Attempts

Using the Invalid Sign In Attempts Report, you can monitor sign-in attempts to ensure system security.

  1. Navigate to theReview Sign-in Attemptspage.
  2. Use the following table to enter information in the fields:

    Field

    Description

    Start Date

    To search for invalid sign-in attempts for a specified date range, enter the start date using the format mm/dd/yyyy. Otherwise, leave the field blank.

    If you only enter a start date, the system searches from that date to today’s date.

    End Date

    To search for invalid sign-in attempts for a specified date range, enter the end date using the format mm/dd/yyyy. Otherwise, leave the field blank.

    Source IP Address

    To search for invalid sign-in attempts using a specific IP address, enter the IP address in the field. Otherwise, leave the field blank.

    User Type

    To search for invalid sign in attempts by a specific portal, choose the appropriate portal:

    • Parent
    • PowerSchool Administrator
    • Student
    • System Management Console Administrator
    • Teacher

    Otherwise, leave the default setting of All Users selected.

    Username

    To search for invalid sign-in attempts based on specific user, enter the user’s username in the field. Otherwise, leave the field blank.

    Login ResultTo search for sign-in attempts based on result, select the appropriate option. Otherwise, leave the default setting of All.

    Minimum Invalid Attempts

    To search for invalid sign-in attempts based on a minimum number of sequential attempts, enter a number in the field. Otherwise, leave the field blank.

    Failure Type

    To search for sign-in attempts based on validity, select the appropriate option. Otherwise, leave the default setting of All.

  3. Click the Search icon. The following search results display based on the criteria you entered:
  4. User Name – Click to view user account details. If the account is locked, you can unlock the account by clicking theUnlockbutton.
    • Valid User
    • User Type
    • Source IP Address
    • Attempt Date
    • Attempt Time
    Click the name of a column to sort by that column in ascending order. Click again to sort in descending order. If many results appear, use the quick navigation links such as << first and next > to navigate between the different pages of results.

Locked Accounts

Using the Locked Accounts Report, you can monitor locked accounts to ensure system security. A user account may be locked automatically if Account Lockout Rules is enabled and the user has exceeded the number of sign-in attempts allowed. For more information, refer toPassword Rules Management Setup. Accounts only appear on this page if they have been automatically locked.

View Locked Accounts

  1. On the start page, choose System under Setup in the main menu.
  2. Under Security, click Locked Accounts.
  3. Click the appropriate portal:
  4. The following information appears for each locked account:

    Field

    Description

    Username

    The last name, first name, and username of the user that is locked out. Click to access the Security Settings page.

    Account Type

    Indicates the portal for which the user has an account.

    Lock Details

    The date, time, and reason the user is locked out of account.

Unlock an Account

Use this procedure to unlock a user’s account whereby allowing them access to the PowerSchool SIS Admin portal, the PowerSchool SIS Teacher portal, or the PowerSchool SIS Student and Parent portal.

  1. Navigate to theUnlock Accounts page.
  2. Click the appropriate portal:
    • All
    • Admins
    • Teachers
    • Parents
    • Students
  3. Do one of the following:
    • ClickUnlocknext to each account you want to unlock.
    • ClickUnlock All [Name of Selected Portal] Accountsto unlock all locked accounts for the selected portal.
  4. Click Submit.
Password Rules Monitor Activity (2024)

FAQs

What are the password requirements for CJIS? ›

Advanced password standards

Passwords shall be a minimum of twenty characters in length with no additional complexity requirements imposed (e.g., ASCII characters, emojis, all keyboard characters, and spaces will be acceptable).

What is a good security answer? ›

According to the Good Security Questions website, answers to a good security question should meet these criteria: Safe: Cannot be guessed or researched. Stable: Does not change over time. Memorable: Can be remembered.

What is the 8 4 rule for password states? ›

Rule 2 – Password Complexity: Your password should contain at least one character from each of the following groups. This is often called the “8 4 Rule” (Eight Four Rule): 8 = 8 characters minimum length. 4 = 1 lower case + 1 upper case + 1 number + 1 special character.

What is the password recovery question? ›

Password recovery questions are designed to provide an alternative method for users to regain access to their accounts when they forget their passwords. These questions are often used as a secondary security layer, alongside email verification or SMS authentication.

What are the security requirements for CJIS? ›

What are the Security Requirements of the CJIS?
  • Information Exchange Agreements. ...
  • Security Awareness Training. ...
  • Incident Response. ...
  • Auditing and Accountability. ...
  • Access Controls. ...
  • Identification and Authentication. ...
  • Configuration Management. ...
  • Media Protection.
Jun 19, 2023

What are basic password standards? ›

At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Not a word that can be found in a dictionary or the name of a person, character, product, or organization. Significantly different from your previous passwords.

What should I put for security questions and answers? ›

The best security questions and answers are safe, memorable, consistent, specific and unpredictable.
  • Safe: Ensure that the answer to your security question is confidential and cannot be easily guessed by others. ...
  • Memorable: You should be able to recall the answer to your security question without writing it down.
May 17, 2024

What do you write in a security answer? ›

Pretend you are someone else when answering the questions.

Make sure you remember who you pretended to be, or write it down somewhere safe. 5. If you use a password manager (e.g. KeePass, LastPass), use answers that have nothing to do with you personally and store them along with your account information.

What is the 90 day password rule? ›

The thinking behind mandatory password changes

For example, a cybercriminal might stumble upon a list of leaked passwords. But if the leak is three months old, and you rotate your password every 90 days, the information will be out of date. The attacker can't use those credentials to get into your account.

What are weak password rules? ›

Poor, weak passwords have the following characteristics: The password contains fewer than eight characters. The password is a word found in a dictionary (English or foreign). Names of family, pets, friends, coworkers, fantasy characters, etc.

What is the one time password rule? ›

One-time password (OTP) systems provide a mechanism for logging on to a network or service using a unique password that can only be used once, as the name suggests. The static password is the most common authentication method and the least secure. If "qwerty" is always your password, it's time to change.

What are secret questions? ›

Secret questions are used for account security purposes. If you choose the question then any other security question is a red flag that something is not right. It should also be a question to which only you know the answer. This does not mean that it must actually answer the question, though.

What is the security answer? ›

Security Question & Answer means an answer used to verify the identity of a User when the User resets the User's Compliant Password.

What is the password question? ›

Passwords and security questions are one way of authentication (What you know). Authentication methods (What you know/ what you have/ What you are) are often used to access systems or devices, websites and services.

What are the password requirements for cloud identity? ›

Minimum password length (ranges from 6 to 30 characters; defaults to 6) Maximum password length (maximum length of 4096 characters)

What are the requirements for Fedramp password? ›

Minimum 12 characters. At least one each of uppercase, lowercase, numbers, and special characters.

What are the 12 character password guidelines for NIST? ›

All passwords must have at least twelve (12) non-blank characters. At least one of the characters must be a number (0-9) and one of the characters must be a alphabet and one of the characters must be special character (e.g. ~, !, $, %, ^, and *). No character may be repeated more than four (4) times.

What is CJIS advanced authentication requirement? ›

AA would comprise at least two of the following factors: 1) Something you know; 2) Something you are; and 3) Something you have. Something you know would be a password or PIN. Something you are would be a fingerprint, retina scan or hand geometry.

Top Articles
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5386

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.