Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Centeralized authentication access accounts naming.

Posted on 2014-04-27
4
253 Views
Last Modified: 2014-08-12
Hi,

need to know the right security standard in creating access accounts naming for servers and systems..shall be unique for all servers or should be different on any network?
0
Comment
Question by:besmile4ever
  • 3
4 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 40025565
Please describe or give an example for what you mean by "access accounts". Also tell us what different networks you have.
0
 

Author Comment

by:besmile4ever
ID: 40025613
for example,

I have two public servers DNS and Mail and need to let 2 engineers to access them from internal and external.. which kind of accounts am I able to gave them? shall I let them use uniques account?
0
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40025633
They should use one account per technician. Which kind of, we could maybe answer if you told us what operating system you are running.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40255127
Grade c means solution incomplete. Next time please ask before closing.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question