How to manage credentials the easy way

A seemingly simple, yet tedious task for anyone in the information technology field is credential management. End users are given usernames and passwords for various systems in an organizations environment, and the hope is that the end users can manage these credentials with very little issue or assistance.

The reality is that most end users store these credentials in insecure ways:

  • A post-it on their monitor or under their keyboard
  • Jotted down on a notepad somewhere on the desk
  • In their personal email
  • The list goes on…

The obvious potential for a security breach goes without saying.  What’s worse though is if the end user is provisioned access to multiple applications, they tend to lose track of their credentials in their “credential management system” at their desks.  So what’s the solution?

With the proper tools and knowledge, a system administrator can take the management of credentials out of the hands of the end user, and even help desk technicians. The following are several solutions to common credential management issues:

  1. Creation of the end user account in Active Directory can be automated using an automated account management solution. This occurs by pulling a subset of user data from the human resources database. This data is mapped to active directory to create the initial account. During account creation, the password is automatically generated using domain password policies.
  2.  Access to other systems in the environment can also be created automatically via an automated account management solution. Credentials for these other systems can match the AD credentials, but this is not required.
  3. Now that the end-user has access, they can enroll in a self service password reset solution. This will allow the end user to access a local client or a web portal to reset their own password, eliminating a call to the help desk.
  4. End users can then enroll in a single sign on solution, which allows them to centralize their credentials for all applications they access in the environment.

With the above in place, end users do not need to transact the IT department for credential issues at all. They can reset their own passwords, and simply log into their workstations with a single set of credentials to access all the systems they need on a daily basis.

Learn more about solutions that can assist with Credential Management.

Battle of the email solutions: exchange vs. google apps

In the industry I am in, with the job functions I perform daily, I see more and more organizations moving from an in-house email solution such as Exchange to cloud-based email solutions like Office 365 and Google Apps. This is due to many reasons and an easy way to see why is to compare Exchange and Google Apps.

Read more

Category

Password Reset

automated account management, cloud based email solutions, Compage Exchange and Google Apps, compare cloud based email solution, compare email solutions, Exchange, Google Apps

Account Management in Education: How Can It Be Improved?

Many school districts and even some higher-learning institutions have their technological infrastructure run by a skeleton crew due to things such as politics and budgetary constraints. Situations such as this can often lead to many issues within the organization: Lack of network resources for end users Inability to properly support end users and systems No time to research and implement newer technology This causes frustrated overworked admins to think outside the box and turn to other solutions, such as software-based, automated or semi-automated identity management.

Read more

Category

Password Reset

Account Management in Education, Automated Provisioning in Education, WFM in Education

Group Policy Object; What is it and how can it allow for seamless deployment of software

In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings on local stations, are just some of the items an administrator wants to manage centrally and cohesively. A common method to manage domain resources like this is via Group Policy in Active Directory.

Read more

What is the Next Step in the Evolution of the Password?

Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960’s when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to allow multiple researchers to have their own personal “profile” when logging in each user was given a login name and password. This allowed each registered user to access the system for their weekly time allotment.

Read more

Category

Password Reset

Password management, security management, two factor authentication

Advanced Authentication Methods

In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape our technological landscape are moving quickly, and those who see fit to exploit the weaknesses inherent in such a landscape are just one-step behind -or sometimes, they may be one-step ahead.

Read more

Category

Password Reset

E-SSOM, HelloID, secure, compliance, hackers, authentication, 2fa, mfa, SAML