Hi Trevon,
CA SSO BPS + AD is one of the most commonly used combination and has worked very well.
The way BPS works is by mapping user attributes used for enforcing password policy :

and , defining the actual password policy :

The “Password Data” user attribute value is commonly called the “Password Blob”. It is an enciphered collection of several virtual user attributes used by SiteMinder Basic Password Services.
These virtual attributes are:
- Current Login Failure Count
- Last Login Timestamp
- Previous Login Timestamp
- Disabled Timestamp
- Password History
- Last Password Change Timestamp (from the most recent entry in the Password History)
More on the blob and how to decrypt the blob here :
Tech Tip - CA Single Sign-On:Policy Server: Read Password Blob Utility
Particularly, for AD, we would also recommend to enable Enhanced Active Directory integration functionality :
Configure an Active Directory User Store Connection - CA Single Sign-On - 12.52 SP1 - CA Technologies Documentation
This option improves the integration between the user management feature of the Policy Server and Password Services with AD by synchronizing AD user attributes with CA Single Sign-On mapped user attributes.
Let me know if you have any questions.
Regards,
Ujwol