<div dir="ltr">"Use strong (as in long and/or randomised and impossible to break using<br><div>
rainbow table attacks) password"</div><div><br></div><div>Again, since it's just me, this is do-able. But I'm looking for something practical as well.</div><div>I'm getting the feeling that people don't have an MFA implementation.<br></div><div><br></div><div>"if the users are sufficiently discipline"</div><div><br></div><div>As a Sysadmin, I can tell you they genuinely are not and they likely never will be.</div><div>Hope for the best, plan for the worst.</div><div><br></div><div>I also want to clarify that I'm not rejecting any of these suggestions, they're all good.<br>
</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sat, Nov 13, 2021 at 4:42 PM Ralph Seichter <<a href="mailto:ralph@ml.seichter.de">ralph@ml.seichter.de</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">* Tyler Montney:<br>
<br>
> Since this is getting increasingly complicated, I wanted to ask before<br>
> going further. What do you all do? Any recommendations?<br>
<br>
Use strong (as in long and/or randomised and impossible to break using<br>
rainbow table attacks) passwords which are used only once (!) and kept<br>
either in the user's brain or in an encrypted password store. Ensure<br>
that authentication data can only be transmitted over encrypted<br>
connections.<br>
<br>
These measures cover a lot of ground, if the users are sufficiently<br>
disciplined. Users are usually the weakest link.<br>
<br>
-Ralph<br>
</blockquote></div>