Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Blog
/
Current article

NIST's September 2024 Update to Password Guidelines: Improved User Experience.

Last Updated:
May 14, 2025
Ben Rolfe
NIST's September 2024 Update to Password Guidelines: Improved User Experience.
AWS Partner
Authsignal is an AWS-certified partner and has passed the Well-Architected Review Framework (WAFR) for its Cognito integration.
AWS Marketplace

In September 2024, the National Institute of Standards and Technology (NIST) released updated guidance on password practices as part of the second public draft of its Digital Identity Guidelines (SP 800-63-4). Rather than focusing on complexity, the new guidelines emphasize usability, password length, and Password Blocklists, aiming to balance improved security and user-friendly practices. Below, we explore the core elements of NIST's updates.

These updates provide a modest enhancement in password security, but they only address a small part of the broader challenges with passwords. As organizations adapt to these changes, they should explore implementing modern multi-factor authentication (MFA) and passkeys.

Key Changes in NIST's Updated Password Guidelines.

Focus on Password Length Over Complexity.

Historically, security policies demanded passwords that mixed uppercase and lowercase letters, numbers, and special characters. However, NIST's updated guidance refocuses on password length as the most critical factor.

"Humans have a limited ability to memorize complex, arbitrary secrets, so they often choose passwords that can be easily guessed." - NIST SP 800-63B.

Studies show that longer passwords are much harder to crack and, more importantly, easier for users to remember. For example, a passphrase like "SeedsInTheBreezeFlowersByTrees" provides greater security than a short, complex password like "P@ssw0rd!".

"Password length is a primary factor in characterizing password strength. Passwords that are too short yield to brute-force attacks and dictionary attacks." - NIST SP 800-63B.

The 2024 NIST update requires Verifiers and CSPs to allow passwords of up to 64 characters and a minimum length of 15 characters, with support for ASCII and Unicode characters.

Remove Mandatory Password Resets.

Gone are the days of requiring password changes every 60 or 90 days. NIST's research shows that frequent password resets lead to weaker passwords as users tend to make minor alterations to existing passwords or resort to writing them down. The 2024 update recommends only requiring password resets after a confirmed credential breach, thereby minimizing user fatigue and reducing the likelihood of insecure password practices.

Implement Password Blocklists.

Another significant change is the introduction of password blocklists. This practice ensures that users cannot choose weak or commonly used passwords, especially those that have been compromised in previous data breaches.

Though these updates provide a small enhancement for password security and user experience, they are only a small fix for the ongoing issue with passwords. Integrating Authsignal into your identity stack has made deploying modern and adaptive multi-factor authentication (MFA) and passkeys easier and faster. Thousands of organizations, including Google, Apple, Microsoft, and PayPal, now rely on passkeys for a more seamless and secure user experience.

For a deeper dive into NIST's guidance on syncable passkeys, check out Authsignal's two-part blog series:

For the fastest way to implement adaptive MFA and passkeys to secure your entire authentication workflow (chain), learn more about integrating Authsignal with Auth0, AWS Cognito, Azure AD B2C, Duende IdentityServer, and more.

Try out our passkey demo
Passkey Demo
Have a question?
Talk to an expert
You might also like
What issuing and verifying millions of passkeys has taught us at Authsignal
Discover key lessons from issuing and verifying millions of passkeys at Authsignal. Explore adoption trends, real-world enterprise results, and why the passwordless future is arriving faster than expected.
Webinar July 2025 - Building high-trust in the age of AI-powered fraud
Discover how to build high-trust authentication in the age of AI-powered fraud. Learn why traditional MFA is failing, and how phishing-resistant passkeys and high-assurance biometrics can protect against deepfakes, session hijacking, and evolving cyber threats.
What happens when your passkey device is lost? Understanding recovery and device sync
Losing a device with your passkeys isn’t as catastrophic as many fear. Thanks to cloud sync, cross-device authentication, and advanced recovery methods, your access and security remain intact. Learn how Apple, Google, and others handle device loss, and the best practices to keep users safe in a passwordless world.

Secure your customers’ accounts today with Authsignal