The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.