Token Policy User PIN Complexity
Originally Published: 2019-11-22
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.4.0
Platform: null
Platform (Other): null
O/S Version: null
Product Name: null
Product Description: null
Resolution
[SERGIO] You should create a password dictionary that contains words that cannot be used as passwords or PINs. After that, assign the password dictionary to the Token Policy. Please let me provide the steps:
1) Create a text file having all PIN Numbers that will not be accepted. For instance:
123456
654321
1111111
222222
2) Add the Password Dictionary to Authentication Manager Server.
In the Security Console, click Setup > System Settings > Under Authentication Settings, click Password Dictionary.
Note: AM Servers shows Password Dictionary but the dictionary can be applied for PIN Numbers as well.
3) Assign the Password Dictionary to the Token Policy.
Use the search fields to find the token policy that you want to edit > From the search results, click the token policy that you want to edit > From the context menu, click Edit > Under "SecurID PIN Format" select the dictionary from the Excluded Words Dictionary drop-down list.
Related Articles
Access Manager 6.1 - aserver reports passwords are expired when password policy shows them as valid. 12Number of Views Password Lockout Examples 82Number of Views Self-Service Troubleshooting Policy 22Number of Views Lockout Policy 87Number of Views Password Policy 120Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?