Policy Center change in 1.1.5.5 – PS Passwords Shareable

I do not need a solution (just sharing information)

Starting with 1.1.5.1 PolicyCenter by default does not allow you to push touch or look passwords to the PacketShapers due to security concerns. However, this is a problem as one cound guess. To change the behavior back to sharable you have to do the following (from support):

There is a security risk with enabling the password push feature, which is why it has been disabled.  The only way to re-enable it is on a case by case basis, as Symantec will require the serial number of the PolicyCenter.  Using this serial number, a request will be made to Engineering to create an enablement key, which will then be provided to Support.  Support will then provide the enablement key to the customer along with the following instructions:

  1. Access the PolicyCenter CLI.
  2. Enable debug mode: pc showdebug 1
  3. Enter the enablement key you were provided: pc enablepushpw <enablement key>
  4. Disable debug mode: pc showdebug 0

This PolicyCenter unit will now be able to centrally manage passwords for all PacketShapers that are registered to it. 

Rick

0

Related:

  • No Related Posts

Cannot reset password through email recovery link – Cross Site Request Forgery

I need a solution

Hello everyone

I forgot password for my SMG control center.

I’m trying to reset password using email recovery link option, but unsuccessful.

When I try to open link from email I get the following error “Possible Cross Site Request Forgery”. (Screenshot attached.)

Can anyone help me with this problem ?

0

Related:

  • No Related Posts

Proxy SG on AWS

I need a solution

Hi;

When tried to deploy Proxy SG on AWS using the instance provided on the market place, I could not logon using the private key that I associated with the instance. Everytime I do that, it asks for the password for the user “root”, tried user “admin” as well and it is not working. I have deployed many other instances in AWS with Putty authentication using a private key, but this particular one is not working.

Kindly

Wasfi

0

1557222504

Related:

  • No Related Posts

PVSVMAgent service on VDA not updating the machine account password locally

Users unable to login to MCS machines using domain account, getting error after machine account password was changed.

“The trust relationship between this workstation and the primary domain failed.”

Restarting the VDA does not resolve the issue, un-joining and rejoining the machine to domain fix the problem.

Forcefully triggering password change does not show this problem.

Related:

  • No Related Posts

New Integration between File Reporter Technology and Identity Governance Enables Access Reviews for Unstructured Data

buckgashler

The Challenge of Safeguarding Sensitive Data Today’s organizations are facing expansive requirements for safeguarding sensitive and confidential information. Whether it’s intellectual property, financial information, or PII (Personal Identifiable Information), there are data access risks that if not addressed properly, can be potentially devastating to an organization. With the risk of having to pay huge fines …

+read more

The post New Integration between File Reporter Technology and Identity Governance Enables Access Reviews for Unstructured Data appeared first on Cool Solutions. buckgashler

Related:

  • No Related Posts

How to Customize NetScaler Gateway Logon Page for Various NetScaler Versions

  • For the default English language, the User Name, Password 1, and Password 2 labels are defined in the /netscaler/ns_gui/vpn/resources/en.xml file. These labels are referred to the /netscaler/ns_gui/vpn/login.js file. If you have configured dual authentication, then you need to modify both the files.

    The following is an excerpt from the /netscaler/ns_gui/vpn/login.js file that indicates the function that controls the label:

    function ns_showpwd(){var pwc = ns_getcookie("pwcount");document.write('<TR><TD align=right><SPAN class=CTXMSAM_LogonFont>' + _("Password"));if ( pwc == 2 ) { document.write('&nbsp;1'); }document.write(':</SPAN></TD>');document.write('<TD colspan=2><input class=CTXMSAM_ContentFont type="Password" title="' + _("Enter password") + '" name="passwd" size="30" maxlength="32"></TD></TR>');if ( pwc == 2 ) {document.write('<TR><TD align=right><SPAN class=CTXMSAM_LogonFont>' + _("Password2") + '</SPAN></TD> <TD colspan=2><input class=CTXMSAM_ContentFont type="Password" title="' + _("Enter password") + '" name="passwd1" size="30" maxlength="32"></TD></TR>');}UnsetCookie("pwcount");}

    To replace the Password 1 label with Password, you need to replace document.write(‘&nbsp;1’), highlighted in bold, with document.write(‘&nbsp;’). Notice that 1 is removed from the function call parameter.

    In the netscaler/ns_gui/vpn/resources/en.xml file, the following entries control the labels:

    <String id=”Password”>Password</String> <String id=”Password2”>Password 2:</String>

    To replace the Password 2 label with Token ID, make the following changes:

    <String id=”Password”>Password</String><String id=”Password2”>Token ID:</String>User-added image
  • Related:

    Upgrade Clients: Remote push to machine(s) w/ tamper protection enabled?

    I need a solution

    Hey all,

    I have just run into a situation that has really perplexed me. We’re in the process of moving clients from one server to another, and at certain times also performing upgrades of the clients. When performing a remote push for the communications file, this prompts us for a password to disable the service so that the change can take effect.

    Unfortunately when attempting to remote push an actual upgrade package, there is no such setting present. Our installations continually fail and I strongly believe that the tamper protection setting is the problem. Sure, I could temporarily disable this setting if I want to however I would prefer to not have to do it this way. Nor do I want to have to move computers to different groups with different policies just to handle this.

    Is there a way to remote push a software upgrade to specific computers (that have tamper protection enabled), and more specifically a way to enter that password so that the client can do what it has to do?

    Thanks!

    0

    Related:

    • No Related Posts

    Breach Defense with Unified Endpoint Management

    Gil Cattelain

    An IBM-funded study in 2018, conducted by Ponemon, revealed the cost of a data breach. With costs per record rising by 4.8 percent to $148, data breaches on average cost companies $3.86 million. These are average costs for a low number of records lost, but larger breaches carry much larger costs. The study also uncovered some …

    +read more

    The post Breach Defense with Unified Endpoint Management appeared first on Cool Solutions. Gil Cattelain

    Related:

    • No Related Posts