Skip to main content

Apple Password Policy

Updated yesterday

The Apple Password Policy allows organizations to centrally enforce password and passcode requirements on macOS, iOS, and iPadOS devices enrolled in Swif.ai. By defining strong password standards, companies can balance usability and security while ensuring that sensitive data, applications, and system-level features remain protected from unauthorized access.

This policy supports a wide range of password controls—including complexity rules, maximum age, history requirements, auto-lock timers, and failed-attempt thresholds—giving administrators complete control over how users authenticate on Apple devices.


Use Cases

  • Enforcing strong, consistent passcode requirements across all Apple devices

  • Blocking simple or weak passcodes that may be easily guessed

  • Ensuring devices lock automatically after inactivity to protect corporate data

  • Preventing users from reusing old passcodes

  • Aligning with compliance frameworks such as ISO 27001, SOC 2, HIPAA, and CIS Benchmarks


Requirements

  • macOS 10.12+

  • iOS 7.0+

  • iPadOS 4.0+


Policy Settings

Below is a detailed explanation of each configuration option available in the Apple Password Policy.


Allow Simple Passcode

Description:
Determines whether users are permitted to use simple passcodes (e.g., repeating or sequential numbers such as 1111 or 1234).

  • True – Allows simple passcodes

  • False – Prevents use of simple or easily guessable passcodes

Minimum OS: macOS 10.13+, iOS 4.0+, iPadOS 4.0+


Require Passcode on Device

Description:
Forces the device to require a PIN or password for unlocking.

  • True – Users must set a passcode/PIN

  • False – Passcode requirement is disabled

Minimum OS: macOS 10.13+, iOS 4.0+, iPadOS 4.0+


Maximum Grace Period for Device Lock (minutes)

The amount of time a device can remain unlocked after waking without requiring a passcode.
Setting a lower value increases security by limiting unauthorized access.

  • Default is 0, meaning the device requires a passcode immediately after waking.


Maximum Number of Failed Attempts

Defines how many failed login attempts can occur before the device takes protective action.
On iOS/iPadOS, reaching this limit may trigger automatic data erase (depending on system settings).
On macOS, this translates to screen saver settings and login delay behaviors.

Use Use System Default or specify a custom number.


Maximum Auto-Lock (minutes)

Specifies how long the device can remain idle before automatically locking.
After this period, users must reauthenticate.

Recommendation:
Set to a short window (e.g., 5 minutes) for improved security.


Maximum Passcode Age (days)

Controls how long a passcode can be used before the system forces the user to update it.

  • Example: Setting 90 days ensures quarterly password rotation


Minimum Number of Complex Characters

Defines how many characters in the passcode must be non-alphanumeric (e.g., !, %, $, #).

  • Minimum: 0

  • Maximum: 4

Useful when enforcing strong alphanumeric passcodes.


Minimum Passcode Length

Specifies the fewest characters required in the passcode.

  • Supports values 4–16

  • Higher values provide enhanced protection

Works independently from complexity requirements.


Delay After Failed Login Attempts (seconds)

Specifies how long the device must wait before the user can attempt to unlock again after consecutive failed attempts.

This protects devices from password-guessing attacks.


Passcode History

Determines how many previous passcodes the user is blocked from reusing.

  • Example: Setting 5 means the last 5 passcodes cannot be reused.

Useful for maintaining passcode uniqueness over time.


Require Alphanumeric Value

Ensures passcodes include both numbers and letters rather than being numeric-only.

  • True – Must include a mix of letters and digits

  • False – Numeric-only PINs allowed

Minimum OS: macOS 10.12+, iOS 4.0+, iPadOS 4.0+


Disallow User to Change Password

When enabled, it prevents users from manually changing their device passcode.

Minimum OS: macOS 10.10+


Best Practices

To maximize device security and compliance, we recommend:

  • Require complex passcodes (length ≥ 8, with complexity > 1)

  • Enable password history to prevent reuse

  • Limit auto-lock to 5 minutes or less

  • Disable simple passcodes

  • Use alphanumeric passcodes for high-security roles

  • Set failed attempt limits to defend against brute-force attempts


Summary

The Apple Password Policy in Swif.ai enables precise control over authentication on macOS, iOS, and iPadOS devices. By enforcing strong and consistent passcode requirements, organizations strengthen their security posture, reduce the risk of unauthorized access, and maintain compliance across their device fleet.

If you’d like help configuring your ideal password standards, feel free to ask!

Did this answer your question?