Yup I don't it when some sites do not like to change that default, when even
loosing the new password in documentations is not a reason good enough. With
the way its designed, you do not need to really know the new password in
order to change it. You do not even need to remember the Demo password
(thank you arcache). All you need to remember is the system password and
given that permission as a AR Admin, you can hack your way in, if all
documentations on these passwords is lost. You can't even call that a hack
as that tool is designed for accidental loss of admin account recovery.

 

The only good reason I can come up with is that they probably trust their
people very much and they can live with that trust and not worry about
little things like system passwords :-).

 

Joe

 

  _____  

From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Jason Miller
Sent: Wednesday, March 13, 2013 6:01 PM
To: [email protected]
Subject: Re: Mid Tier administration password

 

** 

I had a similar experience the first day on the job as the first ever
dedicated Remedy admin.  The role of admin had either been contractors or
the Help Desk manager.  I was waiting for my account to be created when I
decided to try Demo without a password.  Built my own account thank you very
much.  And added a password to Demo shortly after :)

 

And even though I didn't have root access on the app server Remedy was
running as root.  I built a console to issue command via Remedy as root.
Problem solved!

 

I joke about the ARAdmin password but we ran with the default for many
years.  More years then I would like to admit.  Security used to be an
afterthought.  Even worse other systems were using that account for
integrations   I took a lot of flak when I finally decided enough is enough
and changed it from the default.

 

Jason

 

On Wed, Mar 13, 2013 at 12:32 PM, Joe D'Souza <[email protected]> wrote:

** 

 

You're funny Jason :-)

 

I recall many years ago, when I was fairly new to Remedy, I was at a site,
and waiting on a MS-SQL system administrator on the sa password for
something (not an install or upgrade but just to login as sa to do something
on the server), and could not get in touch with that person, so for fun I
attempted to login into that DB (which was a standalone DB for the AR
Server) with sa and a blank password, and it went right in! And later found
out that many of the SQL servers on their network were having blank
passwords for sa :-)

 

When I brought it to their attention, they had no idea these were
unprotected. They had several other network logins into these servers that
they had forgotten about the sa login..

 

Joe

 

  _____  

From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Jason Miller
Sent: Wednesday, March 13, 2013 10:16 AM


To: [email protected]
Subject: Re: Mid Tier administration password

 

** 

Great, now we have to change our production db password. Thanks for
publishing it!

On Mar 13, 2013 2:06 AM, "John Baker" <[email protected]>
wrote:

Steve: It is difficult to compare a decade-old open-source enterprise-wide
solution (ie Atrium/OpenSSO), that is not well integrated with AR System,
with a modern solution built for AR System that sits neatly in Mid Tier and
is well supported/respected by BMC customers/partners. :)

Matt's found a very nice video and it only goes to highlight the importance
of protecting against brute-force attacks, such as automatically locking
accounts in AR System after a number of failed login attempts. And of
course, changing the default AR#Admin# database password.

Joe: An alternative mechanism of integrating Mid Tier and AR System would be
to use SSL client certificates. This is how the HP Service Manager web
application is integrated with the SM server side application (ie ARS in
this world). The down side of this approach is the complexity: SSL client
certs is far more complicated to configure than simply entering a password.


John 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to