Managing external identities to enable secure access for partners, customers, and other non-employees
Haha, AI saying this is ok almost.
I think thats a terrible end user experience and should be fixed.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Steps to reproduce:
Expected: Validation error shown, form submission blocked
Actual: Form submits successfully with mismatched passwords
Managing external identities to enable secure access for partners, customers, and other non-employees
Haha, AI saying this is ok almost.
I think thats a terrible end user experience and should be fixed.
This behavior is a client-side validation bug in the password reset UX, not the server-side password policy.
From the documented flow, password reset is ultimately validated only when the new password is submitted to Microsoft Entra ID. At that point, the service evaluates the password against:
If the submitted password is invalid according to these rules, the reset fails and an error such as “Password doesn't comply with fuzzy policy” or “On-premises policy violation” is returned. However, the documentation does not define or guarantee any specific client-side behavior for comparing the “new password” and “confirm password” fields; that logic is implemented in the UI layer.
Because the server accepts a single password value, the mismatch between the two fields in the browser does not affect the backend validation. The form should block submission when the fields differ, but if it does not, the backend will still only store the value actually sent as the new password and then apply its normal strength/banned-password checks.
Recommended actions:
isInvalidPassword() / isPasswordResetFailed().The server-side password evaluation and SSPR flows remain governed by the documented password protection and SSPR rules; this issue is limited to the front-end form not enforcing a match between the two fields before submission.
References: