- Privileged password management
=Overview=
Privileged password management software may be deployed by organizations to secure the passwords for login IDs that have elevated security privileges. This is most often done by periodically changing every such password to a new, random value. Since users and automated software processes need these passwords to function, privileged password management systems must also store these passwords and provide various mechanisms to disclose these passwords in a secure and appropriate manner.
Examples of privileged passwords
There are three main types of privileged passwords. They are used to authenticate:
* Local administrator accounts.
* Service accounts.
* Connections by one application to another.Local administrator accounts and passwords
On Unix and Linux systems, the root user is a privileged login account. On Windows, the equivalent is Administrator. On SQL databases, the equivalent is sa. In general, most operating systems, databases, applications and network devices include an administrative login, used to install software, configure the system, manage users, apply patches, etc. On some systems, different privileged functions are assigned to different users, which means that there are more privileged login accounts, but each of them is less powerful.
ervice accounts and passwords
On the Windows operating system, service programs execute in the context of either SYSTEM (very privileged, but has no password), or of a user account. When services run as a non-SYSTEM user, the service control manager must provide a login ID and password to run the service program -- so service accounts have passwords. On Unix and Linux systems, init and inetd can launch service programs as non-privileged users without knowing their passwords, so services do not normally have passwords.
Embedded application accounts and passwords
Often, one application needs to be able to connect to another, to access a service. A common example of this pattern is when a web application must log into a database to retrieve some information. These inter-application connections normally require a login ID and password and this password.
ecuring privileged passwords
A privileged password management system secures privileged passwords by:
* Periodically changing each password to a new, random value.
* Storing these values.
* Protecting the stored values (e.g., using encryption and replicated storage).
* Providing mechanisms to disclose these passwords to various types of participants in the system:
** IT administrators.
** Programs that launch services (e.g., service control manager on Windows).
** Applications that must connect to other applications.Required infrastructure
A privileged password management system requires extensive infrastructure:
* A mechanism to schedule password changes.
* Connectors to various kinds of systems.
* Mechanisms to update various participants with new password values.
* Extensive auditing.
* Encrypted storage.
* Authentication for parties that wish to retrieve password values.
* Access controls / authorization to decide whether password disclosure is appropriate.
* Replicated storage, to ensure that hardware failure or a site disaster does not lead to loss of data.External links
* [http://id-archive.com/docs/privileged-password-management.pdf Privileged password management] is a white paper discussing the architectural challenges associated with large scale management of sensitive passwords.
Wikimedia Foundation. 2010.