Create an account Home  ·  Topics  ·  Downloads  ·  Your Account  ·  Submit News  ·  Top 10  
· Home
· Content
· Feedback
· News
· Search
· Statistics
· Surveys
· Top
· Topics
· Web Links
· Your_Account


The five ITIL books can be obtained directly from the publisher's website:

Or as downloadable PDFs: HERE

Current Membership

Latest: Michaelgob
New Today: 19
New Yesterday: 34
Overall: 231591

People Online:
Visitors: 145
Members: 2
Total: 147 .



Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Related Resources

Service related resources
Service Level Agreement

How to set up
IT Change Management
Process Info-Graphic

NOTE: ® ITIL is a registered trademark of OGC. This portal is totally independent and is in no way related to them. See our Feedback Page for more information.


Select Interface Language:

Please contact us via the feedback page to discuss advertising rates.

The Itil Community Forum: Forums

ITIL :: View topic - Password management CI ?
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Password management CI ?

Post new topic   Reply to topic    ITIL Forum Index -> Configuration Management
View previous topic :: View next topic  
Author Message

Joined: Mar 14, 2008
Posts: 32
Location: Porto, PO.

PostPosted: Fri Apr 11, 2008 6:28 pm    Post subject: Password management CI ? Reply with quote

Hi all.
I am trying to figure a (secure) way to manage the increasing number of usernames/passwords required for several online services that the organization uses. Do you think that such sensitive information should be recorded within each associated CI or would it make more sense, from a security point of view, to have a separated CI for password management?

Back to top
View user's profile

Joined: May 21, 2007
Posts: 4
Location: Bradford, UK

PostPosted: Fri Apr 11, 2008 6:58 pm    Post subject: Reply with quote

A couple of things to consider are (1) do you have tiered administration and (2) if you store all the passwords in one place and have a single password to unlock that store, why don't you just have one password for all systems?

If you do have tiered administration whereby the passwords to certain systems should be known only to certain levels of the organisation, some kind of crypt for passwords would be the best idea. I do not favour storage of passwords anywhere, but if you have to (because of tiered administration, changeable staffing or so on), then have a search for some kind of encrypted key management software.

As a sideline, should we call a password management system a PMS? Laughing
Back to top
View user's profile Visit poster's website

Joined: Mar 14, 2008
Posts: 32
Location: Porto, PO.

PostPosted: Fri Apr 11, 2008 7:34 pm    Post subject: Reply with quote

Thanks for your reply.
In small companies, most of the staff has more than one role and corporate operability requires that key information is not held in isolation by staff, so we do have the need to store username/passwords somewhere. This gives flexibility to some operational roles and allows people to substitute one another in case of absence or personnel rotation.

Authentication security must be kept at a certain level, but only to a level where, if needed, someone in the company does have the resources to retrieve the required information to keep things functioning without any dependence on the person who normally owns it. This does not apply to upper management levels, so in our case, tiered password administration is not in place, as I am referring only operational level activities.

PMS sounds nice, though I have no knowledge of any real “password management system”… Rolling Eyes
Back to top
View user's profile
Senior Itiler

Joined: Oct 12, 2007
Posts: 306
Location: Ireland

PostPosted: Fri Apr 11, 2008 8:38 pm    Post subject: Reply with quote


regardless of where you store it you need to be sure that only those that should have acces to the password are the only ones with acces to get the relevant passwords.

If you add them as CI's is the system secure enough for no one else to gat at the data i.e. can the fields be accessed by reporting tools, views, filters, direct database reads etc.

I don't think a general CMBD would have as much focus on password integrity and encryption methods as other more specalised password store applications. However you could include a password store application as part of your CMDB structure.

Just a consideration.
Mark O'Loughlin
ITSM / ITIL Consultant
Back to top
View user's profile
Senior Itiler

Joined: Mar 04, 2008
Posts: 1894
Location: Helensburgh

PostPosted: Fri Apr 11, 2008 10:03 pm    Post subject: Reply with quote


should not the CMDB just record who is the authority for the password?

Or, perhaps The CMDB should only note that password controls apply to the CI; a separate password management procedure would specify the arrangements for control of and access to passwords.

[sorry for the edit; I missed out a semi colon.]
"Method goes far to prevent trouble in business: for it makes the task easy, hinders confusion, saves abundance of time, and instructs those that have business depending, both what to do and what to hope."
William Penn 1644-1718
Back to top
View user's profile Send e-mail

Joined: Mar 14, 2008
Posts: 32
Location: Porto, PO.

PostPosted: Fri Apr 11, 2008 10:39 pm    Post subject: Reply with quote

Diarmid, I'll tend to agree with your approach.

Assuming that the passwords are stored in a dedicated application as part of the CMDB structure, there could be indeed a password management process involved which would define the steps for control, access, and modifications of all this authentication data. This would take care of the security question, which would be left to a more specialized and secure infrastucture.

Nevertheless, as to CIs & Changes are concerned, perhaps these passwords would have to be a property of each “online authentication”-related CI (i.e. be referred as “existing in the PMS Laughing ).
Would you other itilers go that way?

Many thanks.

Back to top
View user's profile
Senior Itiler

Joined: Sep 16, 2006
Posts: 3597
Location: London, UK

PostPosted: Fri Apr 11, 2008 11:01 pm    Post subject: Reply with quote


one thought

There should be standard password for the following types of access

read only
special accounts like for services/applications that are automated
system override

for all manners of equipment - servers, etc

for each class of equipment.. for example

unix servers - there should be one password used to login into the unix servers as system admin / root

there should be one account / password set for read only

there are tools that will manage the password / accounts. i aint no sys admin any more so i dont know the name

the entire set up should not be in the standard available area of the cmdb

in addition, the password file shouldbe reviewed monthly and changed on a regular basis as well as announced

the use of FOBs - RSA tokens, tacacs, SSH - etc - should be part and parcel of the process

each environment needs to develop along the same lines how accounts/password with admin rights are handled

in addition,thought must include how to gain access when the password mgmt system isdone

in order words dont use the tool to screw u out of the system

read this carefully

I keep my house keys in a lock box.
I have a key to the lock box.
I keep the key in a safe place. my wallet
I keep the lock box in a safe place so I put the lock box in the house.
Now I cant get to the lock box because it is the house and in the lock box are the keys to the house.

I lose my wallet. now the house is safe and secure.
John Hardesty
ITSM Manager's Certificate (Red Badge)

Change Management is POWER & CONTROL. /....evil laughter
Back to top
View user's profile

Joined: Mar 14, 2008
Posts: 32
Location: Porto, PO.

PostPosted: Sat Apr 12, 2008 7:45 am    Post subject: Reply with quote

Hey Viking, thanks but now you gave me a lot to worry about during the weekend... Surprised I guess you even got me to some kind of neurotic state, now... Wink
Back to top
View user's profile
Senior Itiler

Joined: May 25, 2007
Posts: 105
Location: USA

PostPosted: Thu Apr 17, 2008 4:45 am    Post subject: Reply with quote

In my workplace, CyberSecurity requires one username/pw per person per system or application (except, of course, those "backdoor" usernames like admin). If you and I both need access to an app, you get a username and I get a username. The passwords are not stored anywhere else. If I forget or (fat-finger my pw three times), I request a reset - no one could retrieve it.

That said, our home-made CMDB has an area that contains the employees and their usernames who have "elevated privileges" on a CI (not run-of-the-mill usernames). It does not include passwords. Very few people can access that information.
Back to top
View user's profile

Joined: Mar 14, 2008
Posts: 32
Location: Porto, PO.

PostPosted: Thu Apr 17, 2008 8:25 am    Post subject: Reply with quote

Thanks for your feedback. Actually, we do not store "user passwords" for our internal system either, the request for a reset is the way we do it.

The difficulty lies in controlling the existence of every authentication information for third-party systems that can be critical to specific business functions (e.g. accounting) and for which sometimes only a particular user has knowledge of.

Say for eg. a public entity such an IRS online form, in case that accountant leaves the company she either has to pass on her online-irs user/password to another person or the pwd must exist, stored somewhere under lock and key, that should only be accessible to upper accounting management to retrieve/modify/erase in order to provide the same accessibilty for the third-party site to the new accountant.

I don't think that relying on online pwd reminders services ("lost your pwd, please send profile details to retrieve bla bla") is really a professional or manageable option.

Furthermore, if it was about a couple of profiles that wouldn't be such a problem, but as the IT manager I get that weird "feeling" that a lot of my users create a myriad of specific authentication profiles for which nobody else is aware of and then, one day, their chief officers might well enquires about a way for IT to rimiraculously retrieve the user/pwd, probably expecting that IT always has "records" of everything, even about what's outside our own system.

I have given some thought to this, and to some extent, I think that IT must have some of theses records in place, at least for the most critical processes, providing that security is well thought out and correctly in placed. That's when config.mgmt and the CMDN come to mind.

Back to top
View user's profile
Display posts from previous:   
Post new topic   Reply to topic    ITIL Forum Index -> Configuration Management All times are GMT + 10 Hours
Page 1 of 1

Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Powered by phpBB 2.0.8 © 2001 phpBB Group
phpBB port v2.1 based on Tom Nitzschner's phpbb2.0.6 upgraded to phpBB 2.0.4 standalone was developed and tested by:
ArtificialIntel, ChatServ, mikem,
sixonetonoffun and Paul Laudanski (aka Zhen-Xjell).

Version 2.1 by Nuke Cops © 2003

Forums ©


Logos/trademarks property of respective owner. Comments property of poster. Rest © 2004 Itil Community for Service Management & Foundation Certification. SV
Site source copyright (c)2003, and is Free Software under the GNU / GPL licence. All Rights Are Reserved.