[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Does anyone have suggestions on verifying identification for password reset requests

Posted on 2009-05-19
3
Medium Priority
?
211 Views
Last Modified: 2013-12-04
Suggestions on verifying staff identification for remote requests for A.D and appliation password resets
0
Comment
Question by:LPSHelpdesk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Expert Comment

by:drewha1969
ID: 24422390
Have them send it by signed email?

Assign them a PIN?
0
 
LVL 6

Accepted Solution

by:
astralcomputing earned 1500 total points
ID: 24428174
Challenge response. But this implies they know something only they and helpdesk knows. Like a hire date.
0
 
LVL 6

Expert Comment

by:drewha1969
ID: 24453229
This topic is interesting, so I am not arguing the answer but arent PINs and Challenge responses basically the same thing?  They are both random answers to verify identity.

Plus, if you choose a question that is harder for a random person to find out other than the usual (like birth date, maiden name, etc) it will be just as easy to forget as a PIN.

You could have the employee create their own question, but wouldnt you need a system that allows for the random question to be stored?

So, I think either of those suggestions are probably the least secure, although every bank, cell phone, email company uses these questions...
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question