Category: Security
-
What’s included in those SQL rpt roles?
Today’s #TipTuesday is a security tip to help administrators identify what exact permissions the SQL fixed database roles have, that start with rpt*. When granting access to some of Windows users or groups, admins want to know what they can get into, right? The purpose behind the rpt* roles was for SSRS (SQL Reporting Services)… (continue >)
-
Changing Password Managers
This post is my experience with changing Password Managers from LastPass to 1Password. (continue >)
-
Two Factor Authentication, part 2
Today’s #TipTuesday is a continuation of last week’s first post on Two Factor Authentication, 2FA for short. Today I am not getting into examples, as I found an interesting article last week after posting my first blog, that illustrates some of why 2FA and password managers are important. Instead of trying to document what already… (continue >)
-
Two Factor Authentication, part 1
Today’s #TipTuesday is a topic that likely needs multiple posts to handle it properly. As I write this, it’s already long before I even get into examples and “how to” on common sites so this will be a mini-series in my #TipTuesday series (a series within a series?!). Long story short: with all of the… (continue >)
-
GP Utilities user permissions part 2
Today’s #TipTuesday is short, but also related to a post from a couple of weeks ago where I posted what the minimum permissions required were for using GP Utilities. Coincidentally (or perhaps not?), last week a consultant posted a “tip” (link removed) on this on the GPUG Open Forum, where there was a dangerous suggestion… (continue >)
-
Unassigned Security Report & Superuser roles
This wasn’t going to be a “Tip” post but it’s Monday night as I write this, so it’s now becoming this week’s #TipTuesday. Funny how deadlines work! 🙂 Late last week, I was working on some upgrade tasks as my firm was going through an upgrade from Dynamics GP 2013 to GP 2016. One of… (continue >)
-
How secure are your passwords?
A recent scenario at a client got me thinking about security – or lack thereof – that exists at some clients for various reasons as well as the flip side of ridiculous security that was going too far the other way. The Background I’ve been documenting the configuration of a third-party reporting & budgeting tool one… (continue >)