Solved

Does anyone have suggestions on verifying identification for password reset requests

Posted on 2009-05-19
3
203 Views
Last Modified: 2013-12-04
Suggestions on verifying staff identification for remote requests for A.D and appliation password resets
0
Comment
Question by:LPSHelpdesk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Expert Comment

by:drewha1969
ID: 24422390
Have them send it by signed email?

Assign them a PIN?
0
 
LVL 6

Accepted Solution

by:
astralcomputing earned 500 total points
ID: 24428174
Challenge response. But this implies they know something only they and helpdesk knows. Like a hire date.
0
 
LVL 6

Expert Comment

by:drewha1969
ID: 24453229
This topic is interesting, so I am not arguing the answer but arent PINs and Challenge responses basically the same thing?  They are both random answers to verify identity.

Plus, if you choose a question that is harder for a random person to find out other than the usual (like birth date, maiden name, etc) it will be just as easy to forget as a PIN.

You could have the employee create their own question, but wouldnt you need a system that allows for the random question to be stored?

So, I think either of those suggestions are probably the least secure, although every bank, cell phone, email company uses these questions...
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Come and listen to Percona CEO Peter Zaitsev discuss what’s new in Percona open source software, including Percona Server for MySQL (https://www.percona.com/software/mysql-database/percona-server) and MongoDB (https://www.percona.com/software/mongo-…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question