We use Network Password Manager.  It uses AD security and allow multiple
departments to use the same tool/db but, is easy to restrict users based
on roles.
http://usefulsoft.com/network-password-manager/


>>> On 11/5/14 at 9:07 PM, in message
<[email protected]>, Matthew Topper
<[email protected]> wrote:


With the discussion seemingly moved to password vaults, we’ve been
using one called PasswordState:
 
http://www.clickstudios.com.au/
 
I’ve been very happy with it, particularly with its auditing features.
 

Matthew Topper

 

From: [email protected]
[mailto:[email protected]] On Behalf Of Free, Bob
Sent: Wednesday, November 05, 2014 9:30 PM
To: [email protected]
Subject: RE: [NTSysADM] Has anyone implemented this solution?

 
We have thousands of local passwords in ours. Plus the *NIX accounts. 
 
Don’t know how that compared to a gazillion but then, you are the
numbers guy, not me J
 
Here’s an example of one that does a lot both in scalability and
functionality
http://www.beyondtrust.com/Products/PowerBrokerPasswordSafe/
 
That’s said, this is a big stretch from the original dilemma but it’s a
pretty elegant solution.
 

From: [email protected]
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Wednesday, November 05, 2014 4:28 PM
To: [email protected]
Subject: RE: [NTSysADM] Has anyone implemented this solution?

 
I LOL’ed.
 
That being said – I’ve never seen a vaulting solution that properly
handled a gazillion local admin passwords.
 
Do you have a specific solution to which you are referring?
 

From: [email protected]
[mailto:[email protected]] On Behalf Of Free, Bob
Sent: Wednesday, November 5, 2014 6:01 PM
To: [email protected]
Subject: Re: [NTSysADM] Has anyone implemented this solution?

 
OTOH, I have found the entire thread invigorating. 
 
:-D
 
From: [email protected]
[mailto:[email protected]] On Behalf Of Micheal Espinola
Jr
Sent: Wednesday, November 05, 2014 12:12 PM
To: ntsysadm
Subject: [spam] [dkim-failure] Re: [NTSysADM] Has anyone implemented
this solution?
 

:-P



--
Espi

 

 

On Wed, Nov 5, 2014 at 12:08 PM, Free, Bob <[email protected]> wrote:


 
From: [email protected]
[mailto:[email protected]] On Behalf Of Micheal Espinola
Jr
Sent: Wednesday, November 05, 2014 12:03 PM
To: ntsysadm
Subject: [spam] [dkim-failure] Re: [NTSysADM] Has anyone implemented
this solution?

 

*vigor ?



--
Espi

 

 

On Wed, Nov 5, 2014 at 11:59 AM, Free, Bob <[email protected]> wrote:

Passwords can go in a vaulting solution and have all kinds of rigor
wrapped around them.
 

From: [email protected]
[mailto:[email protected]] On Behalf Of Matthew W. Ross
Sent: Wednesday, November 05, 2014 9:13 AM


To: [email protected]
Subject: Re: [NTSysADM] Has anyone implemented this solution?

 
Just curious, but what would you use as an alternative?

 

ACLs can be ignored if you have physical access to the machine. Online
syncing solutions (like LastPass) are a little scary for me, if your
keeping those keys to the kingdom in them. (Not to say LastPass and
others like it are not great for personal password.)

 

The only other option I can think of is a hand-written list, kept on
something non-digital. Please enlighten me to the (I'm sure glaringly
obvious) solution I'm not thinking of! Sm:)e.

 

 

--Matt Ross
Ephrata School District

 

 

Matthew W. Ross <[email protected]> , 11/5/2014 9:07 AM:

Yes, if the file it's in is encrypted.

 

 

--Matt Ross
Ephrata School District

 

 

Kennedy, Jim <[email protected]> , 11/5/2014 5:35 AM:

Are you two ok with storing important passwords in text document on a
share and using ACL’s to secur
e that? 
 

From: [email protected]
[mailto:[email protected]] On Behalf Of Matthew W. Ross
Sent: Tuesday, November 4, 2014 7:52 PM
To: [email protected]
Subject: Re: [NTSysADM] Has anyone implemented this solution?

 
If you don't trust Windows based ACLs, how do you secure anything in
Windows?

 

--Matt Ross
Ephrata School District

 

 

Michael B. Smith <[email protected]> , 11/4/2014 4:46 PM:
Do you trust Windows ACL-based security? 

If not - well, you might have a lot of other concerns as well. 

-----Original Message----- 
From: [email protected]
[mailto:[email protected]] On Behalf Of Kurt Buff 
Sent: Tuesday, November 4, 2014 7:41 PM 
To: [email protected] 
Subject: Re: [NTSysADM] Has anyone implemented this solution? 

Yes, they are stored in plain text in the AD field. That's something to
think about, and something to test in the lab. 

Kurt 

On Tue, Nov 4, 2014 at 4:18 PM, Kennedy, Jim
<[email protected]> wrote: 
> My kid just pointed out that in the fine print it states the
passwords 
> are stored in plain text. Yea the are restricted access but
still..... 
> 
> 
> Comments mention you can get then encrypted with Premier. 
> 
> ------ Original message------ 
> 
> From: Kurt Buff 
> 
> Date: Tue, Nov 4, 2014 3:51 PM 
> 
> To: [email protected]; 
> 
> Subject:Re: [NTSysADM] Has anyone implemented this solution? 
> 
> Cool. I'll see if I can lab this up, and if I get it working, I'll 
> report back. 
> 
> Thanks! 
> 
> Kurt 
> 
> On Tue, Nov 4, 2014 at 12:35 PM, Kennedy, Jim 
> <[email protected]> wrote: 
>> Ok, got one confirmation from Twitter that it deployed with no 
>> problems and works as advertised. 
>> 
>> -----Original Message----- 
>> From: [email protected] 
>> [mailto:[email protected]] On Behalf Of Kurt Buff 
>> Sent: Tuesday, November 4, 2014 2:42 PM 
>> To: [email protected] 
>> Subject: [NTSysADM] Has anyone implemented this solution? 
>> 
>> If so, how did it go? Any gotchas? 
>> 
>> Blog article on implementation 
>> 
>>
http://blogs.technet.com/b/askpfeplat/archive/2014/05/19/how-to-autom
(
https://urldefense.proofpoint.com/v2/url?u=http-3A__blogs.technet.com_b_askpfeplat_archive_2014_05_19_how-2Dto-2Dautom&d=AAMFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=tWCPp3g-pvgnZ8p6e3ndzixcHRvZZJxkRQdkD-uUsoQ&s=DK0MXDcOUb9tURz4P32T8bmZDzy8OU2LA2YFtr_fcuo&e=)
 
>> ate-changing-the-local-administrator-password.aspx 
>> 
>> Code for the project 
>> https://code.msdn.microsoft.com/Solution-for-management-of-ae44e789
(
https://urldefense.proofpoint.com/v2/url?u=https-3A__code.msdn.microsoft.com_Solution-2Dfor-2Dmanagement-2Dof-2Dae44e789&d=AAMFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=tWCPp3g-pvgnZ8p6e3ndzixcHRvZZJxkRQdkD-uUsoQ&s=kvqDLlwOzPJUXN7UPD5DdVIf-JiYO4TtfNiNhLyQcl0&e=)
 
>> 
>> I might have the chance to implement, but wanted feedback before I 
>> put it up in a lab. 
>> 
>> Thanks, 
>> 
>> Kurt 
>> 
>> 
> 
> 

 

PG&E is committed to protecting our customers' privacy. 
To learn more, please visit
http://www.pge.com/about/company/privacy/customer/

 

 

PG&E is committed to protecting our customers' privacy. 
To learn more, please visit
http://www.pge.com/about/company/privacy/customer/

 

 

PG&E is committed to protecting our customers' privacy. 
To learn more, please visit
http://www.pge.com/about/company/privacy/customer/

 

PG&E is committed to protecting our customers' privacy. 
To learn more, please visit
http://www.pge.com/about/company/privacy/customer/

CONFIDENTIALITY NOTE: The information contained in this transmission is
privileged and confidential information intended only for the use of the
individual or entity named above. If the reader of this message is not
the intended recipient, you are hereby notified that any dissemination,
d
istribution or copying of this communication is strictly prohibited. If
you have received this transmission in error, do not read it. Please
immediately reply to the sender that you have received this
communication in error and then delete it. Thank you.

Reply via email to