Why you need Privileged Account Management

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.ย. 2024

ความคิดเห็น • 27

  • @mathcss8496
    @mathcss8496 ปีที่แล้ว +21

    This guy explains these concepts like a rockstar

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      So very nice of you to say! Thank you!

  • @princeaaron3186
    @princeaaron3186 ปีที่แล้ว +6

    Fantastic explanation

  • @thereal_jan
    @thereal_jan ปีที่แล้ว +3

    that was the best explanation of PAM I heard so far! thank you so much

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      Thanks so much for saying so!

  • @ITbugs-w2t
    @ITbugs-w2t 23 วันที่ผ่านมา

    Impressive explanation, helps a lot. Thanks!

  • @SahadFoundation
    @SahadFoundation ปีที่แล้ว +2

    Thank you for this explanation.

  • @lipinaries
    @lipinaries 11 หลายเดือนก่อน

    Oh ghosh...Jeff is explains the concept in an awesome and simple way. Love to attend his class f2f someday in Australia

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      You’re very kind to say so!

    • @lipinaries
      @lipinaries 6 หลายเดือนก่อน

      @@jeffcrume hope you got some plans to take classes in Australian Universities

  • @leonatkrasniqi5631
    @leonatkrasniqi5631 ปีที่แล้ว +3

    Great explanation😄

  • @pereganranwei2153
    @pereganranwei2153 ปีที่แล้ว +3

    Thanks for this

  • @RohanSingh-dy5ks
    @RohanSingh-dy5ks 5 หลายเดือนก่อน

    Phenomenal way to explain complex items.

  • @vectorialpx
    @vectorialpx ปีที่แล้ว +1

    @IBMTechnology you have very few views and likes for this kind of content. Kudos!

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      I’m glad you liked it!

  • @podemechamardeperguntas6854
    @podemechamardeperguntas6854 ปีที่แล้ว +2

    What it the name and model of the transparent whiteboard that you use?

    • @IBMTechnology
      @IBMTechnology  ปีที่แล้ว +4

      Sorry, our company policy does not allow us to recommend or endorse specific vendors or products without legal review.

  • @jean-charles-AI
    @jean-charles-AI ปีที่แล้ว +2

    Gosh.... Yes ! :/

  • @stock99
    @stock99 5 หลายเดือนก่อน

    what happen when PAM got ransomed?

  • @sak2029
    @sak2029 ปีที่แล้ว +2

    😁😁😁

  • @roeniss
    @roeniss ปีที่แล้ว +1

    Quick question: Is Kerberos a kind of PAM implementation?

    • @christopherswartz7405
      @christopherswartz7405 ปีที่แล้ว

      It's an interesting question...I didn't think so and I found some information on topic: access.redhat.com/documentation/
      19.4. Kerberos and PAM
      Currently, kerberized services do not make use of Pluggable Authentication Modules (PAM) - kerberized servers bypass PAM completely. However, applications that use PAM can make use of Kerberos for authentication if the pam_krb5 module (provided in the pam_krb5 package) is installed. The pam_krb5 package contains sample configuration files that allow services like login and gdm to authenticate users as well as obtain initial credentials using their passwords. If access to network servers is always performed using kerberized services or services that use GSS-API, such as IMAP, the network can be considered reasonably safe.
      Note
      Administrators should be careful to not allow users to authenticate to most network services using Kerberos passwords. Many protocols used by these services do not encrypt the password before sending it over the network, destroying the benefits of the Kerberos system. For example, users should not be allowed to authenticate using their Kerberos passwords over Telnet.

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Kerberos could be used behind the scenes to accomplish PAM but, by itself, it wouldn’t give the level of control (e.g., check-out, check-in) or visibility (e.g., session recording) that would be part of an enterprise class PAM solution.

  • @zaidal-samaraie6765
    @zaidal-samaraie6765 6 หลายเดือนก่อน

    This is disingenuous.
    AD? Password safe? MFA?
    No. No such thing. Administrators use one account and scribble the password on the wall ...or PAM.
    There are no other options.
    Who is this video aimed at?

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      Clients have been using PAM solutions successfully from vendors like IBM for more than a decade

  • @MohsenJebelli145
    @MohsenJebelli145 7 หลายเดือนก่อน

    Fantastic explanation

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      Thank you!