----- Original Message -----
> From: [email protected]

> auditing release of the password (who got the password when, and who
> approved it)

One of the things that I never hear discussed during conversations like this is 
how exceptions are handled. Some of the exceptions I'd want to hear discussed 
include:

How business continuity is maintained across catastrophic events.

How, when everything else has hit the fan, can "I" a "trusted admin" working in 
the data center get access into our systems where even the networking is down? 
There are times that in preparation of bring up the data center from a dead 
stop, I need to log into some systems and run fsck's (or other such tasks) 
before everything else is live.

Can I, after getting the root password of a system in an emergency, flag a 
password as "exposed" but not "compromised" requiring the password to be 
changed and re-synced at the next possible opportunity when "normal" operation 
has been restored.

Is there a way to generate password displays using clear concise (unabigous) 
language for reading over the phone or other verbal exchange including, should 
it be required, printing. (i.e. Password=bwFq display as 
"[bravo][whisky][FOXTROT][golf]")
-- 
    << MCT >>   Michael C Tiernan.
    Is God a performance artist?
    http://www.linkedin.com/in/mtiernan
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to