Should We Use LDAPS or Local Accounts for Admin Access on Non-Windows Devices?

0
32
Asked By TechGuru42 On

I'm currently tidying up our Active Directory (AD) and aiming to enhance our security measures. This brought up a question about the best approach for logging in as administrators on non-Windows devices like firewalls and other appliances. I know that using AD users can make management simpler, but considering our smaller IT team, I'm wondering if it's better to have separate admin logins for these devices. Is there a significant security difference between using LDAPS and local accounts? Or is it more about management convenience?

5 Answers

Answered By FirewallFanatic On

Avoiding local admin accounts on devices can lead to a really risky situation—you could end up locking yourself out. It might be a pain to manage, but keeping local accounts is safer. You could even have fun with naming your admin accounts something quirky!

Answered By AdminExtraordinaire On

Using centralized management like LDAP has its benefits, making management easier. As for security, it's a bit of a gray area; there are various factors that can impact the security level of either approach.

Answered By SecurityNerd99 On

I recommend using LDAPS whenever possible, but also have a 'break-glass' local account just in case you need emergency access without relying on the LDAP server.

Answered By EncryptAllTheThings On

For optimal device authentication, using certificates allows for mutual authentication and should definitely include MFA. If you want the best security, here's my ranking: SAML > RADSEC > LDAP over TLS > LDAPS > RADIUS > plain LDAP. SAML is the most secure option out there!

Answered By NetworkWhizKid On

For devices like firewalls, routers, and switches, I wouldn't suggest using LDAP directly. Instead, a RADIUS server is typically more appropriate for those.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.