We use Network Password Manager. It uses AD security and allow multiple departments to use the same tool/db but, is easy to restrict users based on roles. http://usefulsoft.com/network-password-manager/
>>> On 11/5/14 at 9:07 PM, in message <[email protected]>, Matthew Topper <[email protected]> wrote: With the discussion seemingly moved to password vaults, we’ve been using one called PasswordState: http://www.clickstudios.com.au/ I’ve been very happy with it, particularly with its auditing features. Matthew Topper From: [email protected] [mailto:[email protected]] On Behalf Of Free, Bob Sent: Wednesday, November 05, 2014 9:30 PM To: [email protected] Subject: RE: [NTSysADM] Has anyone implemented this solution? We have thousands of local passwords in ours. Plus the *NIX accounts. Don’t know how that compared to a gazillion but then, you are the numbers guy, not me J Here’s an example of one that does a lot both in scalability and functionality http://www.beyondtrust.com/Products/PowerBrokerPasswordSafe/ That’s said, this is a big stretch from the original dilemma but it’s a pretty elegant solution. From: [email protected] [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Wednesday, November 05, 2014 4:28 PM To: [email protected] Subject: RE: [NTSysADM] Has anyone implemented this solution? I LOL’ed. That being said – I’ve never seen a vaulting solution that properly handled a gazillion local admin passwords. Do you have a specific solution to which you are referring? From: [email protected] [mailto:[email protected]] On Behalf Of Free, Bob Sent: Wednesday, November 5, 2014 6:01 PM To: [email protected] Subject: Re: [NTSysADM] Has anyone implemented this solution? OTOH, I have found the entire thread invigorating. :-D From: [email protected] [mailto:[email protected]] On Behalf Of Micheal Espinola Jr Sent: Wednesday, November 05, 2014 12:12 PM To: ntsysadm Subject: [spam] [dkim-failure] Re: [NTSysADM] Has anyone implemented this solution? :-P -- Espi On Wed, Nov 5, 2014 at 12:08 PM, Free, Bob <[email protected]> wrote: From: [email protected] [mailto:[email protected]] On Behalf Of Micheal Espinola Jr Sent: Wednesday, November 05, 2014 12:03 PM To: ntsysadm Subject: [spam] [dkim-failure] Re: [NTSysADM] Has anyone implemented this solution? *vigor ? -- Espi On Wed, Nov 5, 2014 at 11:59 AM, Free, Bob <[email protected]> wrote: Passwords can go in a vaulting solution and have all kinds of rigor wrapped around them. From: [email protected] [mailto:[email protected]] On Behalf Of Matthew W. Ross Sent: Wednesday, November 05, 2014 9:13 AM To: [email protected] Subject: Re: [NTSysADM] Has anyone implemented this solution? Just curious, but what would you use as an alternative? ACLs can be ignored if you have physical access to the machine. Online syncing solutions (like LastPass) are a little scary for me, if your keeping those keys to the kingdom in them. (Not to say LastPass and others like it are not great for personal password.) The only other option I can think of is a hand-written list, kept on something non-digital. Please enlighten me to the (I'm sure glaringly obvious) solution I'm not thinking of! Sm:)e. --Matt Ross Ephrata School District Matthew W. Ross <[email protected]> , 11/5/2014 9:07 AM: Yes, if the file it's in is encrypted. --Matt Ross Ephrata School District Kennedy, Jim <[email protected]> , 11/5/2014 5:35 AM: Are you two ok with storing important passwords in text document on a share and using ACL’s to secur e that? From: [email protected] [mailto:[email protected]] On Behalf Of Matthew W. Ross Sent: Tuesday, November 4, 2014 7:52 PM To: [email protected] Subject: Re: [NTSysADM] Has anyone implemented this solution? If you don't trust Windows based ACLs, how do you secure anything in Windows? --Matt Ross Ephrata School District Michael B. Smith <[email protected]> , 11/4/2014 4:46 PM: Do you trust Windows ACL-based security? If not - well, you might have a lot of other concerns as well. -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Kurt Buff Sent: Tuesday, November 4, 2014 7:41 PM To: [email protected] Subject: Re: [NTSysADM] Has anyone implemented this solution? Yes, they are stored in plain text in the AD field. That's something to think about, and something to test in the lab. Kurt On Tue, Nov 4, 2014 at 4:18 PM, Kennedy, Jim <[email protected]> wrote: > My kid just pointed out that in the fine print it states the passwords > are stored in plain text. Yea the are restricted access but still..... > > > Comments mention you can get then encrypted with Premier. > > ------ Original message------ > > From: Kurt Buff > > Date: Tue, Nov 4, 2014 3:51 PM > > To: [email protected]; > > Subject:Re: [NTSysADM] Has anyone implemented this solution? > > Cool. I'll see if I can lab this up, and if I get it working, I'll > report back. > > Thanks! > > Kurt > > On Tue, Nov 4, 2014 at 12:35 PM, Kennedy, Jim > <[email protected]> wrote: >> Ok, got one confirmation from Twitter that it deployed with no >> problems and works as advertised. >> >> -----Original Message----- >> From: [email protected] >> [mailto:[email protected]] On Behalf Of Kurt Buff >> Sent: Tuesday, November 4, 2014 2:42 PM >> To: [email protected] >> Subject: [NTSysADM] Has anyone implemented this solution? >> >> If so, how did it go? Any gotchas? >> >> Blog article on implementation >> >> http://blogs.technet.com/b/askpfeplat/archive/2014/05/19/how-to-autom ( https://urldefense.proofpoint.com/v2/url?u=http-3A__blogs.technet.com_b_askpfeplat_archive_2014_05_19_how-2Dto-2Dautom&d=AAMFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=tWCPp3g-pvgnZ8p6e3ndzixcHRvZZJxkRQdkD-uUsoQ&s=DK0MXDcOUb9tURz4P32T8bmZDzy8OU2LA2YFtr_fcuo&e=) >> ate-changing-the-local-administrator-password.aspx >> >> Code for the project >> https://code.msdn.microsoft.com/Solution-for-management-of-ae44e789 ( https://urldefense.proofpoint.com/v2/url?u=https-3A__code.msdn.microsoft.com_Solution-2Dfor-2Dmanagement-2Dof-2Dae44e789&d=AAMFaQ&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=tWCPp3g-pvgnZ8p6e3ndzixcHRvZZJxkRQdkD-uUsoQ&s=kvqDLlwOzPJUXN7UPD5DdVIf-JiYO4TtfNiNhLyQcl0&e=) >> >> I might have the chance to implement, but wanted feedback before I >> put it up in a lab. >> >> Thanks, >> >> Kurt >> >> > > PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, d istribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you.

