On Mon, 25 Jun 2012, Michael C Tiernan wrote:

----- Original Message -----
From: [email protected]

auditing release of the password (who got the password when, and who
approved it)

One of the things that I never hear discussed during conversations like this is how exceptions are handled. Some of the exceptions I'd want to hear discussed include:

How business continuity is maintained across catastrophic events.

How, when everything else has hit the fan, can "I" a "trusted admin" working in the data center get access into our systems where even the networking is down? There are times that in preparation of bring up the data center from a dead stop, I need to log into some systems and run fsck's (or other such tasks) before everything else is live.

With the systems I have used, the answer is a quialified "yes"

If you can get to one of the management systems in any way (and these can be replicated, including across the country), you can retrieve the password and then use it.

These systems change the actual password and record what they changed it to, they aren't a shim layer in authentication that must reach across the network (which is also a useful tool to have, but it solves a different problem). As such the password can be used at a serial console booting into single-user mode.

It's a qualified yes, because you need to get at one copy of the master system. This could be at a local console, or via a laptop with a crossover cable if everything else fails.

Can I, after getting the root password of a system in an emergency, flag a password as "exposed" but not "compromised" requiring the password to be changed and re-synced at the next possible opportunity when "normal" operation has been restored.

All of the systems I am aware of let you force a password change, the Hitachi-ID system does a password change every time the admin is finished with the password (the admin 'checks out' the password for a specified period of time, at the end of that time the password is changed. If the admin 'checks in' the password when they are done with it, the password is changed immediately)

Is there a way to generate password displays using clear concise (unabigous) language for reading over the phone or other verbal exchange including, should it be required, printing. (i.e. Password=bwFq display as "[bravo][whisky][FOXTROT][golf]")

customized displays can be created in Hitachi-ID, but as someone who has worked in multiple orgainizations that have used phonetic alphabets, I don't think it really helps. If users are not trained to understand what they are hearing, they end up typing "bravowhiskyfoxtrotgolf", and if they are trained to understand what they are hearing, the message will get through, even if the two sides were trained with different phonetic alphabets.

David Lang
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
http://lopsa.org/

Reply via email to