Managing KeePass passwords on Nextcloud

Another post where we are going to integrate another interesting feature into Nextcloud! If you are fond of having your passwords stored in a password manager, you may work with KeePass, If that's the case, that you know, that we can access the password file remotely and fully integrated into the Nextcloud interface, A blast. Strong and encrypted passwords, accessible at all times!

Nagios – Checking the status of Users in Active Directory

When we have enough users in our organization, or above all, When they are a bit of moles, we can try and control your Active Directory accounts, to prevent and monitor possible failures, This is, We will be able to control whether user accounts are disabled, Your passwords have expired or are close to expiring, as well as if they have become blocked, among other options.

Installing PINsafe on Linux

In this document we will look at a manual installation of PINsafe on an Ubuntu Server 12.10, We will install the requirements beforehand. This will be an alternative, since we are interested, Swivel will already leave us an appliance ready to deploy in our virtual environment. Anyone who wants to can also mount it under Windows, meeting these same requirements!

PINsafe – Deploying the appliance and basic configuration

One of the products we use the most at Tundra to provide stronger authentication in our customers' environments is the use of PINsafe, from the company Swivel Secure. In this document we will see the deployment of the virtual appliance where PINsafe comes already installed, if we want, we can download the Java binaries and mount them on a Windows or a Linux, as long as you have Tomcat.

RODC Password Replication Policy

The Password Replication Policy (PRP) indicates which user credentials will be cached on the Read Only Domain Controller (RODC) based on Windows Server 2008 o Windows 2008 R2. This is necessary when we have delegations in our company and we want to put an RODC in the delegations with the functions that we are interested in and also allows users to authenticate in these DCs and the authentication process is faster since no traffic is generated by the WAN with this type of traffic.