S
S
Sergey Gultyaev2020-01-29 09:29:14
Outsourcing
Sergey Gultyaev, 2020-01-29 09:29:14

How to properly organize access?

Good afternoon community!
There are three system administrators. Several servers in the data center (DC) on which virtual machines are spinning, several client servers. All servers on Windows Server from 08 to 19. Where there is an Active Directory, where there is not.
How to properly organize access for administrators?
Now everyone has one login and password, I think that it’s wrong to do this, because. then you can’t find out who broke what and who to kick.
The option for everyone to make their own login and password is also very slippery, because. If a person leaves, then all accounts must be turned off.
A small diagram to visualize the issue.
5e3124ba025c0641197937.png

Answer the question

In order to leave comments, you need to log in

8 answer(s)
K
KPOBABAK, 2020-02-12
@bite_byte

Make a terminal. Set up accounts for 3 admins there.
You configure there accesses to all resources that they should adminit.
Set up ip whitelists for terminal access. (+vpn if necessary) The
admin left his ip is thrown out of the list.
Accordingly, all client servers are allowed to administer only from this terminal.

C
CityCat4, 2020-01-29
@CityCat4

What do you actually want? Well, make three anonymous accounts - admin1, admin2, admin3 and assign each specific Ivanov, Petrov and Shvartsman. There are no other options here, except for: one account for everyone, depersonalized accounts for everyone, personal accounts for everyone.

D
DDwrt100, 2020-01-29
@DDwrt100

Without a centralized accounting system, you all end up in the routine administration of administrator accounts anyway.
Alternatively, select a separate server that will be used for administration.
From the side of administrators accounts.

D
Dmitry Shumov, 2020-01-29
@dshumov

There are three system administrators

The option for everyone to make their own login and password is also very slippery, because. If a person leaves, then all accounts must be turned off.

And with that you want to restrict access....... IMHO the above practice is dangerous and should not be available.
The most correct option:
Each admin has 2 (TWO) OZ - working and admin. With a worker, he sits on a local computer and has rights like all users. From the admin area, he walks and administers on the servers. On them and wind the rights. Alya:
Create groups: server_name_ROLE and include in them admin UZs to whom you want to give access to where.

A
Andrey Sitnikov, 2020-01-29
@Andrey001

Each admin has his own account.
If the administrator leaves, in AD you change the password / block the account. On machines outside the domain, access should be limited via rdp only from a specific machine, which in turn is in the domain. Direct access with administrator rights to databases only from the local host or from a special machine for management, without rights (read only, write to allowed tables/bases) from any machine.
You have windows everywhere, why not everything in the domain?

D
Dmitry Shitskov, 2020-01-29
@Zarom

Individual accounts, centralized account management. On your scale, the option with ansible and text files with administrator accounts is suitable

A
Andrey Barbolin, 2020-01-29
@dronmaxman

You don't have to reinvent the wheel.
Cheap, Convenient and Safe in one bottle does not happen.
There is a domain, so everyone should have their own account. Not convenient is not an argument.

B
beerchaser, 2020-01-29
@beerchaser

And raise a two-factor with reference to a corporate number? The person leaves - block the SIM card, switch the number to a new one? Or with reference to corporate mail?

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question