There are multiple options for LastPass including standalone and MFA. I found 
it was a lot more flexible for personal use. YMMV. They also don't store your 
passwords in the cloud, read up on the cryptography involved if interested.

I repeat- "Not a substitute for a full blown on-prem password vaulting solution"


From: [email protected] [mailto:[email protected]] On 
Behalf Of Jon Harris
Sent: Thursday, October 09, 2014 3:43 PM
To: [email protected]
Subject: RE: [NTSysADM] Windows Service account management

I really dislike the idea of storing my passwords and user IDs in the cloud.  
That is why I use KeePass.  It would be more convenient out in the cloud but 
just my dislike and distrust of cloud based stuff.  Yeah, yeah OLD foggy I know.

Jon

________________________________
From: [email protected]<mailto:[email protected]>
To: [email protected]<mailto:[email protected]>
Subject: RE: [NTSysADM] Windows Service account management
Date: Thu, 9 Oct 2014 15:33:02 +0000
LastPass runs on all of those platforms and my Kindle :-D

Actually I can't vouch for WP because I don't have one but it's supported and 
it does run just fine on my RT tablet.

Also has a level of enterprise support & secure password sharing facility.

Not a substitute for a full blown on-prem password vaulting solution[1] but it 
can solve a lot of problems

[1] Which still has some of the inherent shortcomings mentioned in this thread 
but can close a lot of gaps. We have 10's of thousands of root and 
administrator accounts that are now unique & fully managed.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jon Harris
Sent: Wednesday, October 08, 2014 4:46 PM
To: [email protected]<mailto:[email protected]>
Subject: RE: [NTSysADM] Windows Service account management

KeePass does not appear to have a version to work on Windows RT or phones YET.  
I hope they do eventually get there though.

Jon

> Date: Wed, 8 Oct 2014 15:00:41 -0700
> Subject: Re: [NTSysADM] Windows Service account management
> From: [email protected]<mailto:[email protected]>
> To: [email protected]<mailto:[email protected]>
>
> Password Safe and Keepass both come in flavors that run on iPhone and
> Android, as well as Windows and *nix.
>
> Kurt
>
> On Wed, Oct 8, 2014 at 2:40 PM, James Button
> <[email protected]<mailto:[email protected]>> wrote:
> > Yup! Nice concepts
> > And
> > 20 chars long - it better be based on a phrase I can remember, or I'll have 
> > to
> > write it down on something I keep near the system where I logon.
> > Maybe I can write it as the hint facility
> > Special characters - yup - definitely needs writing down
> > Ah! I can have the system remember the password and enter it whenever I put 
> > my
> > id in the userid panel
> >
> > Hey - I'm the sysprog, and I can't ask someone else to fix my lost password 
> > for
> > me, and management are not going to be happy if I can't fix their forgotten
> > password
> >
> > Ah! This weeks selection of monthly password updates, where's my jotter - 
> > postit
> > pad - that will do.
> >
> > The above is based on experience from many years as sysprog and security
> > management techy on a site with mainframes, mini's, comms, network servers 
> > and
> > PC's.
> >
> > And then, having required the consultant's ideas be implemented, management
> > wonder why people create back-doors and/or write notes on passwords.
> >
> > At least - for most systems, I was allowed to change the password, so used a
> > long phrase I could remember, and just wrote down the formula for selecting 
> > the
> > characters from the phrase.
> >
> > Are you sure you will never need to logon either locally, or remotely - not 
> > even
> > for a restore and update to 'current' status process.
> >
> > That said, how about limiting logon attempts to 1 a minute - that will
> > (hopefully) deal with brute-force attempts.
> > If possible email alerts about failed logon attempts (at least 2 userid's -
> > system manager (techy), their manager, and a 'in-post' id - both bad 
> > password
> > and not-allowed methods.
> >
> > You really want to know about access attempts rather than accessed by
> > inappropriate persons.
> >
> >
> > JimB
> >
> >
> > ----Original Message-----
> > From: [email protected]<mailto:[email protected]> 
> > [mailto:[email protected]] On
> > Behalf Of Dave Lum
> > Sent: Wednesday, October 08, 2014 10:17 PM
> > To: [email protected]<mailto:[email protected]>
> > Subject: RE: [NTSysADM] Windows Service account management
> >
> > Here's what I have so far. Thoughts?
> >
> > -- Windows Service Account Policy --
> > .Passwords must be > 20 characters in length
> > .Passwords must be human-unreadable (preferably auto-generated from a
> > password management tool) requiring upper case alpha, lower case alpha,
> > numbers AND special characters
> > .[Optional] If there is a service account management tool that can
> > automate password control and changes, this would be used
> > .Service accounts will be in a dedicated OU in Active Directory that has
> > inheritance disabled to ensure typical domain-wide policies aren't
> > unintentionally applied
> > .Service account GPO's will be applied that restrict the ability for them
> > to be used like a typical human user account. This includes configuring
> > the following:
> > .Disable Interactive logon
> > .Deny log on locally
> > .Deny log on through Terminal Services
> > .Logon restricted to specific machines
> > .Auditing enable for logon events
> > .Enable alerting for failed logons
> >
> > -- Windows Service Account Management --
> > 1.Collect criteria
> > a.Identify the process or function that requires a service account other
> > than the BuiltIn Windows accounts
> > b.Identify the specific servers that this service account needs access to
> > c.Determine the level of system access needed (run as batch, log on as
> > service, etc.) by the service account
> > 2.Create accounta.Account name should start with "svc. " and be descriptive
> > b.Assign a complex password that meets the requirements listed above
> > c.In<https://urldefense.proofpoint.com/v1/url?u=http://c.in/&k=4%2BViHuL0UtSJBpVrYi3EdQ%3D%3D%0a&r=Jek3QSvahmIrNAN1nuPfQA%3D%3D%0a&m=xHG45R7oXV6fDpAUaxwzsvjU/Lxgws9IQFFg9FkRR3o%3D%0a&s=bd1278a5489317d1a091812e6a794638939c0e030173b06d8d0e0a9020b04d63>
> >  the AD properties under the "Account" tab, use the "Log On To" option
> > to specify the servers this account has the ability to log on to
> > d.Description field should contain the application name, process, and or
> > function
> > e.Place account into the ServiceAccounts OU
> >
> > Dave
> >
> >>>
> >>> On 8 October 2014 21:40, Dave Lum
> >>> <[email protected]<mailto:[email protected]<mailto:[email protected]%3cmailto:[email protected]>>>
> >>>  wrote:
> >>>
> >>>> I've been tasked to create documentation on creation and management of
> >>>> Windows Service accounts, does anyone here have something I can use
> >>>> and
> >>>> modify?
> >>>>
> >>>> TIA,
> >>>> Dave
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>
> >>>
> >>> --
> >>> *James Rankin*
> >>> ---------------------
> >>> RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The Virtualization
> >>> Practice Analyst - Desktop Virtualization
> >>> http://appsensebigot.blogspot.co.uk<https://urldefense.proofpoint.com/v1/url?u=http://appsensebigot.blogspot.co.uk/&k=4%2BViHuL0UtSJBpVrYi3EdQ%3D%3D%0a&r=Jek3QSvahmIrNAN1nuPfQA%3D%3D%0a&m=xHG45R7oXV6fDpAUaxwzsvjU/Lxgws9IQFFg9FkRR3o%3D%0a&s=3d46d8ec934ae065120b540c58d40dc5ec4e48fa2c9a5a1274a2ec2232e6d791>
> >>>
> >>>
> >>
> >>
> >>
> >>
> >>
> >>
> >> --
> >> James Rankin
> >> ---------------------
> >> RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The Virtualization
> >> Practice Analyst - Desktop Virtualization
> >> http://appsensebigot.blogspot.co.uk<https://urldefense.proofpoint.com/v1/url?u=http://appsensebigot.blogspot.co.uk/&k=4%2BViHuL0UtSJBpVrYi3EdQ%3D%3D%0a&r=Jek3QSvahmIrNAN1nuPfQA%3D%3D%0a&m=xHG45R7oXV6fDpAUaxwzsvjU/Lxgws9IQFFg9FkRR3o%3D%0a&s=3d46d8ec934ae065120b540c58d40dc5ec4e48fa2c9a5a1274a2ec2232e6d791>
> >>
> >
> >
> >
> >
> >
> >
>
>

________________________________
PG&E is committed to protecting our customers' privacy.
To learn more, please visit http://www.pge.com/about/company/privacy/customer/
________________________________


PG&E is committed to protecting our customers' privacy. 
To learn more, please visit http://www.pge.com/about/company/privacy/customer/

Reply via email to