Overview
This section will explain how to set different password patterns and how to segregate credentials from different devices by respecting the manufacturer's standards and following corporate security policies.
Also the layers of security policies that can be configured to affect the use of credentials, and the automated actions that will be taken to change passwords in many scenarios.