Infrastructure Team/Central Login: Difference between revisions

No edit summary
No edit summary
Line 8: Line 8:
* Centralized users database.
* Centralized users database.
* Reuse users database not only for Web services, but also for shell accounts, for example.
* Reuse users database not only for Web services, but also for shell accounts, for example.
* (a side-benefit) Education about the risks of inter-networked services.  Most people have little understanding of such risks, their significance, or appropriate protective behaviors.


== Costs ==
== Costs & Risks==


* To be accounted.
* To be accounted.
Line 16: Line 17:
*: This point belongs to [[#Benefits|Benefits]] as well, e.g., if most of our services will use CAS, we will have only one, well controlled, access point. --[[User:Alsroot|alsroot]] 13:40, 28 September 2011 (EDT)
*: This point belongs to [[#Benefits|Benefits]] as well, e.g., if most of our services will use CAS, we will have only one, well controlled, access point. --[[User:Alsroot|alsroot]] 13:40, 28 September 2011 (EDT)
*:: There is an escalating intrusion/protection arms race on the Internet that challenges the most advanced providers of ethical services.  Yes, we should seek to benefit from those efforts. --[[User:FGrose|FGrose]] 13:34, 5 October 2011 (EDT)
*:: There is an escalating intrusion/protection arms race on the Internet that challenges the most advanced providers of ethical services.  Yes, we should seek to benefit from those efforts. --[[User:FGrose|FGrose]] 13:34, 5 October 2011 (EDT)
* What risks are there after signing on from a public workstation and leaving one's authentication cookie behind, or otherwise loosing one's cookie?  What responsible efforts should we undertake to get the vulnerable community to participate more safely?


== Resources to authenticate on ==
== Resources to authenticate on ==