Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
bitterandtwisted
Sep 4, 2006






MF_James posted:

Someone lied.

The more I think about it the more I have to come to the conclusion it was my boss who changed it, couldn't find what he changed it to until now, and reset it back while denying it all. Anyone else would have come clean right away but he can simply not admit to being wrong about the most trivial things.

Anyway, now I'm off to make backup admin accounts for all our hosts in case this 'vmware problem' ever happens again.

Adbot
ADBOT LOVES YOU

Guy Axlerod
Dec 29, 2008


Probably a good idea for monitoring to use a different account than people who log in.

AlexDeGruven
Jun 29, 2007

Watch me pull my dongle out of this tiny box




MF_James posted:

Someone lied.

Always.

Thanks Ants
May 21, 2004

Bless You Ants, Blants



Surely you can pull the age of a password out of whatever system it is, and when it's less than a week old you know it was changed.

RFC2324
Jun 7, 2012

http 418



Guy Axlerod posted:

Probably a good idea for monitoring to use a different account than people who log in.

The more unique accounts the better. One for monitoring and one for each individual person.

Its not like accounts cost money, you can have as many as you want

The Fool
Oct 16, 2003



RFC2324 posted:

The more unique accounts the better. One for monitoring and one for each individual person.

Its not like accounts cost money, you can have as many as you want

Iíd argue that local admin and monitoring are the only local accounts you should be making.

While I agree that every user of a system should have their own account, it needs to be hooked up to an identity store like AD

RFC2324
Jun 7, 2012

http 418



The Fool posted:

I’d argue that local admin and monitoring are the only local accounts you should be making.

While I agree that every user of a system should have their own account, it needs to be hooked up to an identity store like AD

Fair.

I'm used to the linux world where writing a script to go through all the servers and add the missing lines to passwd is still sometimes a thing.

I spent 10 minutes last night trying to ssh into a windows server I didn't feel nearly as bad when a coworker and the MOD did the se thing, tho

RFC2324 fucked around with this message at 16:54 on Feb 23, 2021

ChickenOfTomorrow
Nov 11, 2012

god damn it, you've got to be kind





RFC2324 posted:

Fair.

I'm used to the linux world where writing a script to go through all the servers and add the missing lines to passwd is still sometimes a thing.

I spent 10 minutes last night trying to ssh into a windows server I didn't feel nearly as bad when a coworker and the MOD did the se thing, tho

eh it's not like MODs knew

SlowBloke
Aug 14, 2017


RFC2324 posted:

The more unique accounts the better. One for monitoring and one for each individual person.

Its not like accounts cost money, you can have as many as you want

My personal stance is to never create user accounts but to hook as many systems to the central auth hierarchy(ldap/saml/etc) to limit password oversimplification(if you need to remember ten passwords itís unlikely you will make them all complex and different).

VMware supports ldap on both hosts and vCenter and saml on vCenter. Use a restricted service account for logging and reporting, set up the local root/administrator to a overly complex pass stored on safe and set up everyone with their standard users as admins.

RFC2324
Jun 7, 2012

http 418



SlowBloke posted:

My personal stance is to never create user accounts but to hook as many systems to the central auth hierarchy(ldap/saml/etc) to limit password oversimplification(if you need to remember ten passwords itís unlikely you will make them all complex and different).

VMware supports ldap on both hosts and vCenter and saml on vCenter. Use a restricted service account for logging and reporting, set up the local root/administrator to a overly complex pass stored on safe and set up everyone with their standard users as admins.

like I said before, I come from linux where just doing it in passwd is still an accepted thing, particularly when you are dealing with hosted services.

Place I worked a little while back had a script that would iterate through the entire 10-15k server global list of N*X servers updating passwd, group, and sudoers files. it was nuts

Thanks Ants
May 21, 2004

Bless You Ants, Blants



At least it updated them and kept things consistent

Adbot
ADBOT LOVES YOU

RFC2324
Jun 7, 2012

http 418



Thanks Ants posted:

At least it updated them and kept things consistent

oh yeah, it was pretty good, and way better than the LDAP implementation used by a handful of boxes in germany. Why would you set up an AD server to be the LDAP server for a unix farm, instead of an LDAP server that happened to be referenced by a small handful of windows boxes?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply