2020-11-15 21:42:02 +00:00
---
title: Policies
---
2019-12-09 20:00:45 +00:00
## Standard Policies
2019-12-10 10:25:34 +00:00
---
2019-12-09 20:00:45 +00:00
### Reputation Policy
2020-12-05 21:08:42 +00:00
authentik keeps track of failed login attempts by source IP and attempted username. These values are saved as scores. Each failed login decreases the score for the client IP as well as the targeted username by 1 (one).
2019-12-09 20:00:45 +00:00
2020-06-18 18:27:20 +00:00
This policy can be used, for example, to prompt clients with a low score to pass a captcha before they can continue.
2019-12-09 20:00:45 +00:00
2020-02-19 09:21:28 +00:00
## Expression Policy
2019-12-09 20:00:45 +00:00
2020-06-05 10:00:27 +00:00
See [Expression Policy ](expression.md ).
2019-12-09 20:00:45 +00:00
## Password Policies
2019-12-10 10:25:34 +00:00
---
2019-12-09 20:00:45 +00:00
### Password Policy
2020-06-18 18:27:20 +00:00
This policy allows you to specify password rules, such as length and required characters.
2019-12-09 20:00:45 +00:00
The following rules can be set:
2020-11-15 21:42:02 +00:00
- Minimum amount of uppercase characters.
- Minimum amount of lowercase characters.
- Minimum amount of symbols characters.
- Minimum length.
- Symbol charset (define which characters are counted as symbols).
2019-12-09 20:00:45 +00:00
### Have I Been Pwned Policy
2020-12-05 21:08:42 +00:00
This policy checks the hashed password against the [Have I Been Pwned ](https://haveibeenpwned.com/ ) API. This only sends the first 5 characters of the hashed password. The remaining comparison is done within authentik.
2019-12-09 20:00:45 +00:00
### Password-Expiry Policy
2020-06-18 18:27:20 +00:00
This policy can enforce regular password rotation by expiring set passwords after a finite amount of time. This forces users to set a new password.