|
I agree with John's assessment of a desirable/workable group and auth list scheme. That's the easiest way to get fairly broad coverage and quick progress toward improving your overall security base line. I think we've all been professing this for years.* And, as Tom mentioned, I too am curious as to how group profiles were being used by Rob's shop such that it caused such a bottleneck on the save throughput... <begin snip> We might also point out that under these circumstances, the group profile(s) would essentially be the only user(s) entered on the authorization lists. The links in the authority chain can be very concise this way. I'd be interested in how Rob's group profiles were set up so that they caused long save-times. <end snip> *"All" being the vendors (NetIQ, PowerTech, SafeStone, etc.), IBM themselves, and those of us who used to be with vendors (like me, Wayne O., Woodbury, etc.); basically anyone who has had to deal with these pains in the real world - from either side. Best regards, Steven W. Martinson, CISSP, CISM Consultant - Servique, LLC Cell 281.546.9836 www.servique.com 4801 Woodway Drive, Suite 300E Houston, TX 77056 "Uniquely Qualified" --------------------------------- All-new Yahoo! Mail - Fire up a more powerful email and get things done faster.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.