Posted: . At: 8:33 AM. This was 3 years ago. Post ID: 15294
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.


Password security levels for different use cases.


Rules concerning passwords can be different depending upon the use case. A normal home user can get away with a standard 8 – 12 character password as long as it has some upper-case characters and numbers in it.

Password rules for the commoners.
Password rules for the commoners.

A business would require more security, physical security of the actual hardware and a stronger password, like 12 – 24 characters with many upper-case characters and numbers. This would be enforced with a strong password policy and changing passwords regularly. Using a VPN to connect remotely to the business and then accessing services on the network securely would be ideal.

Password rules for small businesses.
Password rules for small businesses.

A large corporation would have very secure passwords, this would possibly involve alternative authentication methods to allow connections securely. a RADIUS server would be a good way to allow secure connections to a remote server. RADIUS over TLS is designed to provide secure communication of RADIUS requests using the Transport Secure Layer (TLS) protocol. This would provide even more security for a remote connection. Using RADIUS authentication with Azure Multi-Factor Authentication would be the most secure option.

Password rules for the large businesses.
Password rules for the large businesses.

There is a guide here: https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/task/radsec-configuring.html. This is how to set up RADIUS over TLS. One consideration of these systems is physical security and what to do when a laptop is stolen. Encryption/authentication keys may be revoked and then access will not be possible. But the aforementioned Azure Multi-Factor Authentication would really help secure such a critical system. Using encryption would be very important when roaming and using untrusted networks. A VPN is very useful when using the Internet to connect to a local network. The user connects to an IP address, then access is granted to a local network over NAT to grant secure encrypted access to local services.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.