Questions tagged [identity-management]

53 questions
41
votes
2 answers

How could I stop ssh offering a wrong key?

(This is a problem with ssh, not gitolite) I've configured gitolite on my home server (ubuntu 12.04 server, open-ssh). I want an special identityfile to administer the repositories, so I need to access throught ssh to my own host ussing two…
Alvaro Maceda
  • 523
  • 1
  • 4
  • 5
7
votes
0 answers

Sunsetting Microsoft Identity Management for Unix the right way

I'd like to make sure that we don't have any connections to our AD controllers before sunsetting, but some run Microsoft Identity Management for Unix / Server for NIS. I'm having a dog of a time trying to find any related logging for this service…
7
votes
4 answers

Giant active directory deployment vs giant Sun LDAP

At work we're in the early phases of an identity management project. This is all in the context of higher ed where we have a couple thousand faculty / staff and about twenty thousand students. Has anyone used the Sun LDAP server with an AD domain…
chris
  • 11,784
  • 6
  • 41
  • 51
7
votes
4 answers

What tools exist for identity management w/ Active Directory?

What products do you use to manage identity propagation in your environment? For example, Joe gets hired at the company. HR inputs Joe's profile in the HR employee management application. A ticket is passed to IT to manually create Joe's Active…
spoulson
  • 2,173
  • 5
  • 22
  • 30
6
votes
2 answers

Account management tools supporting self-service registration and email verification?

I work in a university environment that has in the past offered services almost exclusively to university affiliates who already have "formal" accounts in central user database. We are increasingly offering services to outside collaborators (hosted…
larsks
  • 41,276
  • 13
  • 117
  • 170
5
votes
4 answers

Active Directory New User Workflow

I work in a small organization that uses a single file & print server with an Active Directory domain for user management. The office admin who inducts new people is non-technical and generally creates the AD user account because there is no…
4
votes
2 answers

Can I set up application specific passwords on Ubuntu?

I've got a Ubuntu virtual server that I use for webhosting and other stuff. I've been thinking about moving mail onto it, but I'd like to secure it more against the threat of losing my smartphone. Google has 2 step verification systems that allow…
4
votes
1 answer

SQL Server 2008: what happened if identity oversteps a maximal value of int?

Imagine we have a table: create table MYTABLE ( id int IDENTITY(1,1) ,name varchar(10) ) We have to insert a lot of rows into the table. Does anybody know what will happen when a generated identity value oversteps a maximal integer value…
Timofey
  • 145
  • 1
  • 7
4
votes
5 answers

Central Authentication For Windows, Linux, Network Devices

I'm trying to find a way to centralize user management & authentication for a large collection of Windows & Linux Servers, including network devices (Cisco, HP, Juniper). Options include RADIUS/LDAP/TACACS/... Idea is to keep track with staff…
3
votes
1 answer

How to Solve unknown_ca error on WSO2IS-5.7 when using MySQL RDS as backstore?

I've tried to install an instance on AWS using aws RDS as my datasource through the mysql-connector-java-5.1.45-bin.jar with jdbc url jdbc:mysql://< instance>.< zone>.rds.amazonaws.com:3306/carbon_db I've got an…
3
votes
1 answer

Active Directory memberOf LDAP syntax

I want to add a user (from Sun IDM to Active Directory) to more than one group. The command memberOf: CN=AAA,OU=AAA,DC=AAA,DC=AAA is for only one and I want to add a second one immediatly after the first; e.g.: memberOf: CN=AAA,OU=AAA,DC=AAA,DC=AAA…
Possa
  • 185
  • 1
  • 9
3
votes
3 answers

How to fix "Could not open a connection to your authentication agent." error when trying to add ssh-key?

I'm using Ubuntu server 10.04. ssh-add /foo/cert.pem gave the following output: Could not open a connection to your authentication agent. These are my running processes: ps -aux | grep ssh Warning: bad ps syntax, perhaps a bogus '-'? See…
theTuxRacer
  • 549
  • 2
  • 9
  • 22
3
votes
4 answers

Which identity management products are suitable for small to medium business?

Let's scope out an average setup: Web company About 50 users A few User Groups (Management, Support, Developers, Sys-Admins, Testers, Sales) A bunch of permissions (Only management is allowed to access sensitive business data, only administrators…
Michael Renner
  • 1,750
  • 13
  • 17
2
votes
1 answer

Recommendations for future-facing (fully cloud-based) Identity and EMM/UEM Solutions

I have recently started consulting for a tech startup of about 60 users that has grown, and is looking to expand, quickly. Due to the fast growth, and lack of formal IT advice up until now, they are badly in need of solutions around Identity and…
2
votes
1 answer

Grant users ssh access to instance in google compute project using IAM

We have a number of linux VMs (google compute engines) in our projects on google cloud. I want to allow the users (developers) access to the google compute engines using SSH only. No ability to change the VM details; just ssh access. I want to use…
1
2 3 4