Subject: | |
From: | |
Reply To: | |
Date: | Thu, 13 Oct 2005 12:02:17 -0700 |
Content-Type: | multipart/signed |
Parts/Attachments: |
|
|
Aside from conference services -- why would you do this? Unless of
course your CCA implementation is sandboxed (as ours is), seems your
opening up alot of risk. Is the idea to keep machines in compliance
rather than having an audit trail? Would you wherehouse the user/pass
combos or just purge them after 24hrs. Where would they live? Seperate
LDAP or RDBMS or radius? Seems like kind of an odd setup.
Bradford Saul wrote:
>This may sound a little crazy but here is what I have in mind for Guest
>Access via Perfigo/CCA.
>
> - User connects to network
> - Perfigo/CCA prompts for auth
> - User enters a valid e-mail address
> - 24 hour username/password is generated and e-mailed to said account
> - Un-authenticated users are permitted 10 min of port 80/443 access to web
> to retrieve username/password
> - User authenticates using new account/password
>
>Anyone had any thoughts along this line. And, any chance anyone is already
>doing this?
>
>Thanks...
>
>Brad
>-----------------------------------
>Bradford B. Saul
>Lead Network Engineer
>IT - Network Engineering
>Hoffman Hall Room 10
>MSC 0601
>James Madison University
>Harrisonburg, VA 22807
>V: (540) 568-2379
>F: (540) 568-1696
>M: (540) 435-3079
>[log in to unmask]
>
>
--
John Stauffacher, CISSP
Network Administrator
Chapman University
[log in to unmask]
ph: 714.628.7249
"It's amazing how much you take for granted when you already know what you are doing."
"there is no /usr/local on my C:\ drive!"
|
|
|