The way our MFA solution works is that we associate the RACF userid to
an Active Directory userid, and use our existing RSA SecureID Token
infrastructure as the second authentication factor. I'm not seeing how I
can tie the shared userid to a single AD Userid/RSA Token.

Mark Jacobs

> Carmen Vitullo <mailto:cvitu...@hughes.net>
> December 7, 2017 at 2:58 PM
> Hey Mark, the last two places I worked we had fire-call ID's that were
> 'suspended' (inactive) and after each use (DR) mostly ,secadmin would
> change the password, store the password in an envelope on a lock box
> in the computer room, this was before MFA, only MFA experience we have
> is windows, LAN ID's
> I suspect with MFA, you don't need to suspend the ID, since you'd need
> a password and a PIN to be valid?
>
>
>
>
>
>
> Carmen Vitullo
>
> ----- Original Message -----
>
> From: "Mark Jacobs - Listserv" <mark.jac...@custserv.com>
> To: IBM-MAIN@LISTSERV.UA.EDU
> Sent: Thursday, December 7, 2017 1:37:43 PM
> Subject: Fire-call, emergency RACF userid
>
> We have an emergency use userid with it's password "locked in a safe",
> which can be used by authorized people when/if needed. How do other
> organizations better control something like this? I'm asking since we're
> implementing MFA for "special" userids, and I don't know how to fit this
> shared userid into the MFA framework.
> --
>
> Mark Jacobs
> Time Customer Service
> Global Technology Services
>
> The standard you walk past is the standard you accept.
> Lt. Gen. David Morrison
>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
> Please be alert for any emails that may ask you for login information
> or directs you to login via a link. If you believe this message is a
> phish or aren't sure whether this message is trustworthy, please send
> the original message as an attachment to 'phish...@timeinc.com'.
>
> Mark Jacobs - Listserv <mailto:mark.jac...@custserv.com>
> December 7, 2017 at 2:37 PM
> We have an emergency use userid with it's password "locked in a safe",
> which can be used by authorized people when/if needed. How do other
> organizations better control something like this? I'm asking since
> we're implementing MFA for "special" userids, and I don't know how to
> fit this shared userid into the MFA framework.

-- 

Mark Jacobs
Time Customer Service
Global Technology Services

The standard you walk past is the standard you accept.
Lt. Gen. David Morrison


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to