Password Manager for System Accounts
As it stands, organisations have to download third party tools to do this and in some extreme cases, use an excel spreadsheet to hold passwords.
Best Answer
-
Steve_Wright Cireson Support Advanced IT Monkey ✭✭✭Adam,
Well said. Windows Server 2016 introduced concepts of Just Enough and Just In Time Administration to reduce the security risks in an AD environment. I'm not sure how this will play out in providing security with the simplicity Amarjit is looking for, but security is top-of mind in most application solutions today.
Thanks,5
Answers
That said, I've always seen both sides of this (and truthfully I'm with you that I'd like to see it in SCSM for the sake of simplicity):
My personal guess as to why no one has done this yet based off of my (albeit, somewhat limited) understanding of the SCOM/SCSM sdk is that were it to be created: there is probably no good way to protect the code that is responsible for creating the encryption which means from a security standpoint all it would take is someone decompiling an MP to determine the encryption mechanism. Which means, the last "line of defense" is getting whatever the private key is to perform the decryption which you could probably at least could be guided into retrieving from the encryption mechanism/code. In which case it feels like all of this would have to be part of the core code base/framework perhaps?
Again, just my personal guess. @Conner_Wood seems to be rather intune with SDK stuff so I'd be interested to hear his thoughts on this topic and/or how reasonable my guess is.
Well said. Windows Server 2016 introduced concepts of Just Enough and Just In Time Administration to reduce the security risks in an AD environment. I'm not sure how this will play out in providing security with the simplicity Amarjit is looking for, but security is top-of mind in most application solutions today.
Thanks,