![]() ![]() AD management takes care of password management. When an employee is terminated, their AD is one of the first things to get disabled. Use your existing AD accounts to maintain access to the passwords/keys.There are some key benefits to this approach: ![]() So I thought I’d give it a go and blog about it. Unfortunately and surprisingly Google didn’t come to my rescue. And since we were an all Azure shop, I immediately wondered if we could use the Azure Key Vault in some way as a password repository. Since I was new to the team and the budget was he-who-must-not-be-named, I wondered what we could use to rectify the issue on hand or at least mitigate some of the risks and improve the workflow. This also leads to scenarios where teams are resorting to sending passwords over chat or worse (email?). Imagine someone updates a password and now s/he would have to update his password, update the password database to a central repository and wait for all other users to ‘pull’ the new file… all in order to be in-sync. With the KeyPass files sitting individually with each team member, they can get quickly out-of-sync especially in teams where a lot of systems (and passwords) are at play.In the wrong hands, the file can be deadly. KeyPass password file needs to be shared amongst users.My new team had been using open source KeyPass (MacPass for MacOS) for password management. Recently, I was presented with an interesting challenge. ![]()
0 Comments
Leave a Reply. |