Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Active Directory Is Dead: 3 Reasons
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
MauriceB786
50%
50%
MauriceB786,
User Rank: Apprentice
4/15/2014 | 11:15:42 AM
Re: What's the alternative
If we go with your assertion of what a startup needs, then Google would be the dead last place I'd go as they usually need secrecy and Google doesn't go in for that very much.  It's also a lot of fun migrating off as well. 

Most orgs when they're mature enough to need something like AD are ready to hire an EXPERT to do it for them.  You're neglecting to mention the fact that you're freqently going to run into systems where the password complexity requirements are incompatable.


This isn't taking into consideration audit and compliance issues.


One last thing, while you don't say it, I'd be willing to bet your service is largely open source.  What do you use fo your login services?
MauriceB786
67%
33%
MauriceB786,
User Rank: Apprentice
4/15/2014 | 10:48:40 AM
Re: What's the alternative
I came to point out that this is a thinly veiled ad for a service that's targeted at people who have no business touching a domain controller. Instead I will point out that everything this product does and I do mean EVERYTHING you can already do with Windows.  You just have to find an admin who's willing to step away from the GUI and get their hands dirty with a small bit of PowerShell.  That's just for the sync'ing everything with the same password stuff.

Delegated rights have been in AD from day one.

When properly configured (read: AD Sites and Services setup along with proper connectors) replication isn't an issue.

What's irritating is that this is being peddled like it's real news and I fear some poor IT Manager is going to be forced to sit in a three hour meeting justifying some headcount.

Incidenally I'm putting as an open challenge Mr.Pederson, that your product doesn't do anything that a decently resourced IT team can't. 

In fact I'd go as far to argue that your product hurts IT departments by giving a false sense of security , hiding people from the complexity of their decisions.
Thomas B. Pedersen
0%
100%
Thomas B. Pedersen,
User Rank: Author
4/15/2014 | 10:39:58 AM
Re: What's the alternative
The first application a startup needs is email. But when you start a company today, your first inclination is probably not to drive down to your local computer store and purchase Microsoft Exchange and Office. More likely, you will sign up your team for Google Apps and get email and productivity suite all-in-one.

And then you work your way from there. You'll quickly be adding more applications so you can build, market and sell your product or service. Soon you will realize that the number of passwords your company is managing is out of control and that you need some way to control access and relieve your busy employees of their password fatigue. At this stage of your company, Active Directory will do nothing to propell your company forward. It will only limit your agility and make things more complicated for everyone.

Your company will be best served by deploying a cloud-based identity provider, such as OneLogin. The advantage of this approach is that it becomes very easy to onboard new employees and applications. You centralize user management and access control and have a much better view of your identity footprint. And it was just as easy to get in place as that Google Apps account your company started out with.

 

 

 
orinthomas
67%
33%
orinthomas,
User Rank: Apprentice
4/15/2014 | 10:26:21 AM
Marketing rather than technical argument
"Why am I predicting the death of Active Directory?"

Because you're running a company that's trying to compete with it and you are trying to look relevant?
snake oil antedote
67%
33%
snake oil antedote,
User Rank: Apprentice
4/15/2014 | 10:19:55 AM
Horrible AD Assessment
This is truly a sensationalistic piece at best. To headline AD is dead then to fall back and say its a predictive analysis, shows the true intent of a marketing veiled security article with bad analysis.  Any RBAC, MAC, DAC based model has overhead, in fact good security will require it. It's important to temper the cloud-fare with a balanced approach. As long as there are brick-mortar establishments, its not sound security to have a multi-tenant auth solution authenticate your every app. Even for apps interfacing with AD, you have ADFS as a recourse which the author excludes. An article that only critiques a technology w/o proposing viable solutions should be received w/ caution.
Lorna Garey
100%
0%
Lorna Garey,
User Rank: Ninja
4/15/2014 | 9:28:32 AM
What's the alternative
This is all well and good, but do you really thing there's a better choice right now? Everyone knows how to use AD. Maybe it takes time to integrate new services, but it's doable. Yes, "different user communities require different security policies, and creating a new Active Directory group for every use case is time consuming." But IT has to manage roles, not individuals. The other way leads to anarchy. 

What would you suggest for a company that doesn't have 30 employees, lives on Red Bull and is all cloud all the time?

 
<<   <   Page 3 / 3


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...