Password and Authentication Standard

Overview

Promoting secure access to UA systems, services, and data relies on strong digital identity authentication, with passwords playing a key role. Passwords help protect data confidentiality and are the responsibility of their respective account holders. They are used across UA for various accounts, including user, system, service, and email accounts, as well as for accessing specialized applications.


Scope

This standard applies to all individuals who have (or are responsible for) an account or access that supports or requires a password. This includes all faculty, staff, students, sponsored accounts, affiliate, and service accounts.  This standard is particularly applicable to :

  • All university computer and networked  systems, including any externally hosted systems that are integrated with UA login mechanisms;
  • All individuals that create, process, maintain, transmit, or store sensitive institutional data on any device, regardless of ownership (including personal devices) or whether it is connected to UA networks;
  • Any third-party providers in a contractual relationship with the university that maintains sensitive UA data.

Definitions

  • Assurance
    The confidence or trust that security measures are effectively protecting systems, data, or processes from threats.
  • Authenticator
    The tool or method used to prove your identity during authentication that is unique to you as an individual. It can be something you know (like a password), something you have (like a phone or security token), or something you are (like your fingerprint or face). The authenticator helps confirm that you’re really you before granting access to a system or service.
  • Secret
    Any sensitive information that needs to be kept confidential to protect systems, data, or processes. This can include things like passwords, encryption keys, API tokens, or any piece of data that grants access to secure systems.
  • Service Account
    A special type of account used by applications, services, or automated processes, rather than a human user. These accounts are typically used to run software, perform background tasks, or interact with other systems securely. Service accounts often have elevated privileges to access specific resources, making it important to manage and secure them properly to prevent unauthorized access or misuse.

Standard

UA generally aligns with the National Institute of Standards and Technology (NIST) standards, including NIST SP 800-63 (Digital Identity Guidelines or Guidelines). These Guidelines specify levels of assurance related to identity proofing, authentication, and federation and assertions.

User Authentication Levels

A description of UA levels of assurance, mapped to their NIST counterpart, are in the table below:

UA levels of assurance, mapped to their NIST counterparts

UA NIST
Level 1 AAL 1
Level 1 provides some assurance that the person trying to log in has control over the device or method used to access their account. It requires either one-step or multi-step login methods using various technologies. To log in successfully, the person must show they have and control the device or method used to access their account, through a secure process.
Level 2   AAL 2
Level 2 provides high confidence that the person trying to log in has control over the device or method used to access their account. Proof that the user has the device or method used to access the account, as well as control of two different authentication factors is required through secure authentication protocol(s). Approved encryption techniques are required at AAL2 and higher.
Level 3 AAL 3
Level 3 provides very high confidence that the person logging in has control over the device or method used to access their account. Logging in at AAL3 requires proof of possession of an encryption key. It requires a hardware device and a device that resists impersonation, which can be the same device. To log in at AAL3, the user must show they have and control two different login methods using secure authentication protocols. Approved encryption techniques are required.

 

In general, Levels 1-3 are applied to systems based on the following risk levels: 

System Risk Level

UA Assurance Level

Examples

Low

Level 1

Public, Student Workstations

Moderate

Level 2

Employee Workstation

High

Level 3

Systems containing sensitive or regulated data

 


Authenticator Types

Application owners and data custodians are required to enforce multi-factor authentication (MFA) for all moderate- and high-risk applications whenever possible.  MFA is encouraged (but not required) for low-risk applications.

The following factors are currently allowed at UA: 

Factor

Level 1

Level 2

Level 3

One-time passcodes (TOTP)

EOL December 2025

EOL June 2025

Application-based push (via Duo or Entra MFA)

Security Key

Phone Call

EOL December 2025

EOL December 2025

Not allowed

SMS

EOL June 2025

Not allowed

Not allowed

 

Phone call and one-time passcodes will be disallowed for UA Assurance Level 3 effective June 2025, and disallowed for UA Assurance Level 2 effective December 2025. SMS is not a permissible authentication factor regardless of assurance level. SMS will be disallowed for UA Assurance Level 1 in June 2025.

Memorized secrets (passwords or passphrases) are a permissible authenticator type if in compliance with the complexity, storage, and usage requirements outlined in the “Password Requirements” section of this document.


Reauthentication, Timeouts, and Session Locking

Reauthentication refers to the process and frequency of periodically verifying a user’s identity after the initial authentication event.  In this context, reauthentication shall terminate a user’s session in an application or service.  

1. Re-authentication and Session Timeout

In all cases, session timeout followed by re-authentication is required when a system or service restarts.  Re-authentication (session timeout) is required for all user sessions at intervals which are appropriate for the risk level, regardless of user activity. The session should be terminated (i.e., logged out) when this interval has been reached.

2. Session Locking

User sessions for applications and services shall be locked in accordance with UA’s Minimum Security Standards. Reauthentication of users where the session timeout has not yet been reached but the inactivity period has been reached (e.g. session lock or “screen lock”) allows for only a single factor to be presented to re-enable the session.  The session lock shall obscure any sensitive or restricted data pursuant to UA’s Data Classification Standard. 


Password Requirements

The following are minimum requirements for all UA systems, services, and applications, subject to the system, service, or application supporting these requirements:

Account Type

Minimum Length

Maximum Lifetime

Standard UA User Account

16

730 Days

Privileged Account (Admin)

24

730 Days

Service Account

32

When integrity in doubt

Guest Accounts

32

60 Days

 

If a system, service, or application does not support these minimum password requirements, an exception must be obtained from ISA. Please see “Violations and Exceptions” to request an exception. 

In all cases where UA suspects that the password may have been compromised, passwords shall be immediately expired and required to be reset. 

Passwords may contain:

    • Upper and lower case letters
    • Numbers
    • Special characters, including spaces

Passwords must not contain:

    • More than four repeating or sequential characters (e.g. 11111, abcde, etc.)
    • Any part of the user’s name or assigned UA username

Authentication Requirements

1. Allow Show Password While Typing  

Applications should hide the password being entered (typically by displaying “*” in place of entered characters). Wherever possible, applications should allow the user to toggle between hashed and plain-text password entry to aid them in verifying correct entry of passwords. 

2. Allow Paste-In / Copy-Paste

Applications should allow the user to copy/paste passwords into password entry textboxes/fields to allow for the use of password manager tools. 

3. Disallow Password Hints

Wherever possible, knowledge-based password recovery should be avoided in favor of recovery via previously verified second factors (e.g. email address, phone number, etc.). 

4. Limit Attempts / Lockout Period

The ability to authenticate an account should be temporarily disabled if there are too many authentication attempts in a defined time period.  At minimum, accounts should be locked out or limited (throttled) in authentication attempts after 10 failed attempts in 10 minutes.  The lockout period should be not less than 10 minutes, and is recommended to be not greater than 30 minutes.  This requirement does not apply to privileged access accounts with system-generated passwords more than 20 characters in length or non-system generated passwords where MFA is also required.  

5. Disallow Detailed Errors

Detailed information on authentication failures should not be displayed.  Instead, authentication failures whether due to an invalid username or bad password shall display the same failure message.  It is recommended that the failure message state something similar to the following: “Unknown username or incorrect password supplied.” 

6. Utilize Risk Ratings / User Risk Monitoring

 Wherever supported, user-based risk ratings should be considered that may require earlier session timeout or reauthentication, additional MFA prompts, etc.  If risk-based authentication is utilized, ISA and the unit CIO should be informed. 


Password Hygiene

1. Sharing

Sharing of UA user account passwords is prohibited.  

Users must not provide their  password at any time and in any manner other than when accessing UA resources via an authentic login mechanism.

2. Creating a Secure Password

The most secure passwords are long and memorable. When selecting a UA user account password, users should:

    • Use a passphrase instead
    • Utilize a  list of unrelated words that are memorable to you

3. Reuse

Reuse of passwords is strongly discouraged.  Users should consider the use of a password manager to store and generate unique passwords for each separate and unique authentication need.

UA user account passwords should be:

    • Unique from passwords of other UA accounts
    • Different from personal account passwords
    • Not reused from previous passwords

4. Local Device Storage

Except when using approved password management tools, local storage of passwords is strongly discouraged on any electronic device – this includes in-browser storage of passwords (e.g. “Remember Me” functionality if passwords are stored in addition to usernames).  

5. ​Paper-Based Storage

UA strongly discourages written passwords for other than a temporary (generally defined in minutes) timeframe.  

If such a need arises:

    • Maintain control of the written password at all times.
    • Do not record the password alongside any identifying information (e.g., username, email).
    • Ensure the written password is only visible to those with a legitimate need.
    • Securely destroy the material containing the password immediately after use.

There are legitimate use cases for long-term storage of written passwords and their identifying information exist. In these cases, paper storage is permitted subject to appropriate controls, including (but not limited to): 

    • Use of a secure storage mechanism
    • Requiring two or more authorized persons to obtain the written passwords, etc.

6. System and Service-Based Storage

Systems and services storing passwords must:

    • Use strong, industry-standard encryption
    • Avoid storing passwords with reversible encryption
    • Implement salting or equivalent measures whenever possible
    • Be regularly audited and monitored for unauthorized access or potential data breaches

7. Approved Electronic Storage

Approval for password management tools will be given by the University CIO, UA CITO, or UA CISO.  Approved password/secret management tools are listed in the UA Software Catalog. Exceptions to approved password management tools will be considered pursuant to UA’s Information Security Controls Exception Handling Process. 


Violations and Exceptions

Per Board of Regents Policy & Regulation R02.07.060  violations of this Standard: 

  • may result in a reduction or loss of access privileges, or the imposition of other restrictions or conditions on access privileges;
  • may subject employees to disciplinary action, up to and including termination; 
  • may subject students to disciplinary action including expulsion according to the Student Code of Conduct procedures; and 
  • may also subject violators to criminal prosecution. 

Requesting an Exception

The process for requesting exceptions to this or other IT Security Standard are outlined in the Information Security Controls Standard.

 

Implementation

OIT Information Security and Assurance is responsible for the implementation, maintenance and interpretation of this IT Standard.

Related Standards

Information Security Controls Standard

References

This standard is intended to align with the National Institute of Standards and Technology (NIST) Special Publication 800-63b and designed to  meet the requirements of NIST 800-171 3.1.10 (Use Session Lock) and 3.1.11 (Terminate User Sessions). 

This standard is supported by University of Alaska Board of Regents Policy and Regulation Chapter 02.07.

Lifecycle and Contacts

Standard Owner: OIT Information Security and Assurance

Standard Contact: Chief Information Security Officer

Phone: 907-474-5347

Email: ua-ciso@alaska.edu

Approved: September 2024

Effective: January 2025

Next Review: September 2026