Policy: AWS > IAM > Account Password Policy > Settings > Hard Expiry
You can prevent IAM users from choosing a new password after their current password has expired. For example, a password policy can specify a password expiration period. If an IAM user fails to choose a new password before the expiration period ends, the IAM user cannot set a new password. In that case, the IAM user must request a password reset from an account administrator in order to regain access to the AWS Management Console. You can also leave this check box cleared. If an IAM user allows his or her password to expire, the user in this scenario is required to set a new password before accessing the AWS Management Console.
Refer to Setting an account password policy for IAM users for more information on account password policies.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] | Enabled |
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/aws-iam#/policy/types/accountPasswordPolicySettingsHardExpiry
- turbot graphql policy-type --id "tmod:@turbot/aws-iam#/policy/types/accountPasswordPolicySettingsHardExpiry"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-iam#/policy/types/accountPasswordPolicySettingsHardExpiry"
Get Policy TypeGet Policy Settings