The organization manages information system authenticators by changing default content of authenticators prior to information system installation.