On Aug 18, 2006, at 10:03 AM, Stephen Russell wrote:

But the Q comes up, what should a security model for a workstation be?
Locked and loaded for users by network admins? Root comes to mind here,
or Domain Admins you pick your flavor.  Or do you think that a
workstation should be allowed to install what ever and whatever it
wants?  Notice I said the device and not a user....

It should be at the user level, not the hardware level. How would the machine get configured and updated if it was set up to never allow configuration changes or updates at the hardware level?

The Mac's security model works great, IMO. On the family machine, I'm an admin, and everyone else is a normal user. They can install apps, but only in their home directory - they have no rights to common directories, especially system-level. When a shared app needs upgrading, or a security patch to the OS needs applying, they have to get me to do it. This way, they're free to install all the apps they want, since the worst it can do is screw up their own stuff. If an app tries to mess with a protected location, a dialog pops up asking for admin credentials. Unless an admin OKs it, changes to the protected areas are simply not allowed.

-- Ed Leafe
-- http://leafe.com
-- http://dabodev.com





_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to