Date: Thu, 25 Mar 1999 10:33:39 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Andrew Hobson <ahobson@eng.mindspring.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Kerberos vs SSH Message-ID: <199903251833.KAA00915@apollo.backplane.com> References: <Pine.GSO.4.10.9903251409300.17330-100000@primrose.isrc.qut.edu.au> <199903250426.UAA68023@apollo.backplane.com> <kjzp51u1y6.fsf@computer.eng.mindspring.net>
index | next in thread | previous in thread | raw e-mail
:> us to configure a crypted root password in the password file
:> good for logging into the console, but useless if stolen and
:> decrypted. All other accounts have '*' for their password (
:> i.e. ssh+kerberos logins only).
:
:How do you handle updating the password files on all machines when you
:need to add or remove a user? Do you have any automated process?
:
:Drew
Well, the provisioning for customer accounts is totally automated using
code I wrote for BEST.
Provisioning for administrative accounts is easy. We do it by hand.
Most employees only have access to one administrative machine. Employees
are given access to other peripheral machines depending on their job.
Except for the one employee machine, these accounts do not have home
directories and the password field is '*' ( i.e. kerberos/ssh-only
access ). Access is controlled through kerberos.
-Matt
Matthew Dillon
<dillon@backplane.com>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199903251833.KAA00915>
