Why not use certificates or rsa for admin accounts? IF you have a pki environment that would be my suggestion. Then only then default administrator account would be insecure. But that can be mitigated with very long password.
An other option is to put admin accounts in a separate child or top domain. /petter borling -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: den 7 september 2006 05:54 To: ActiveDir@mail.activedir.org Subject: Re: [ActiveDir] Separate Administrator password policy Hi Al, All good questions. I'll answer here, but if it starts to get hairy, lets take it offline (same as my post to Susan - I don't want this to become a deep discussion of our product on the list). > Not to pick, but it occurs to me that you're trying to complicate the > problem. While I agree that changing the passwords every 24 hours > (whatever freq works is likely going to be fine), is not a bad idea, > it has the likely problem of being very problematic. This is similar > to a push vs. pull paradigm and if looked at that way, you have > similar issues such as connectivity and reliability. i.e. how do you > ensure that the password change was successful if there's a network outage? Or just a network blip? > Is it important that you do so is assumed from the previous > information to date. 100% reliability is mandatory in this kind of app. Funny that you raise push vs. pull, as we have two modes of operations, called push and pull. :-) We "push" passwords to server-class target systems (e.g., AD, mainframes, whatever), and "pull" password changes from workstations (i.e., the workstations push to the server). The handshake used ensures that password changes are 100% reliable - we abort if there isn't a connection, etc.; and password history is retained just in case something went wrong anyways. > A solution that scales up, down, or laterally is appropriate. > Something that allows an account to traverse the different sites, > possibly into the hundreds or even thousands, and allows almost > instant revocation of the user account with administrative privileges > should that become necessary during the course of normal business. Scaling is easy enough - just arrange for different devices, of which there may be tens of thousands, to contact a central server at somewhat randomized times, and keep trying in case of powerdown, connection failures, etc. etc. This eliminates nasty traffic bursts. Traversing sites is easy too - use HTTPS to connect to the central server, and use whatever proxy settings are needed to "get out." Instant revocation is another matter. Our approach provides for timed revocation on workstations (due to limitations fundamental to pull mode), and instant revocation on servers (since push allows for it). > Now, if only we had such an technology....... We sell it, more or less as described. > Some suggestions that come to mind would be everything from a > "toaster"-like device placed at the client site to a certificate based > credential system come to mind. Hybrid ideas also entertained. Plenty > of pros and cons for each, such as the ability to have something > tangible at the client site that can also be a multi-functional device > and can work semi-autonmously to monitor even if the WAN link goes > away (different issues can be monitored.) It can also provide the 8th > layer with a sense of investment and partnership. Downside is that > it's more to manage and monitor. But that can be mitigated by allowing > it to be <gasp> sales person installable meaning that if something > goes wrong with the device, then you roll a salesperson to replace it. > That gives the salesperson reason to have more facetime with the client and gives a chance to sell more business. A service on each client device is probably cheaper than yet another machine at the client site, if you're managing lots of small-ish clients... Of course, you pointed to other, unrelated but quite useful functionality above, such as WAN link monitoring. > The conversation could be longer, but I'm sure that a solution is > possible that fits many of the criteria defined. Because the original > problem scope is to remove the administrative access, using a hybrid > solution that relies on certificates and a toaster item would be more > likely. The details and pricing would need to be hammered out in such > a way that the final solution is reliable, inexpensive (drive > adoption), and easy to use (dumb down the interface such that your > salesforce or interns could deploy or you could even just drop ship > one to the client and they could hook it up in 5 steps or less - > similar to voip device installation in that sense.) Personally, I'm not big on appliances ("toasters") -- in the end they are mostly just cheap Intel/AMD boxes, but without the hardware support that Dell/HP/IBM offer. Niche market vendors really can't offer the kind of hardware support that these huge vendors do. Better for nice guys (yeah, that's me) to stick to what they *can* do well - specialized software, and avoid what others do well - local and prompt hardware support. > Just my random thoughts. I haven't really put much effort into it, > Susan. :) Maybe random, but insightful. :-) -- Idan Shoham Chief Technology Officer M-Tech Information Technology, Inc. [EMAIL PROTECTED] http://mtechIT.com List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx