{"id":5907,"date":"2020-05-13T14:28:14","date_gmt":"2020-05-13T05:28:14","guid":{"rendered":"http:\/\/52.205.251.174\/?p=5907"},"modified":"2021-11-29T16:59:38","modified_gmt":"2021-11-29T07:59:38","slug":"why-did-a-server-admin-at-a-city-government-adopt-autopassword-access-manager-ddc-city-case","status":"publish","type":"post","link":"https:\/\/www.autopassword.com\/en\/blog\/why-did-a-server-admin-at-a-city-government-adopt-autopassword-access-manager-ddc-city-case\/","title":{"rendered":"Why did a server admin at a city government adopt AutoPassword Access Manager? (DDC City Case)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5907\" class=\"elementor elementor-5907\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-298ee895 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"298ee895\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48be7769\" data-id=\"48be7769\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ae1b4fe elementor-widget elementor-widget-text-editor\" data-id=\"3ae1b4fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p>Server admins always worry about a hacker stealing their server credentials. Server access credentials can be phished when the server admin tries to connect a server. To connect servers, it requires an admin to send credentials on their PC. When a server admin inputs the credentials on their PCs, it can be phished. Although 2FA, including OTPs and server certificates are set on the server, that code and certificate file also can be hijacked If the phishing malware is already installed on the server admin\u2019s PC.<br>We cannot be sure that there is no malware running on our PCs. When we use a web browser, email, or any communication applications on our PC, malware can be downloaded without us knowing and steal data on our PC at any time.<\/p>\n<p><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-5920\" src=\"https:\/\/i0.wp.com\/www.dualauth.com\/wp-content\/uploads\/screenshot.png?fit=800%2C398&amp;ssl=1\" alt=\"\" width=\"599\" height=\"298\" srcset=\"https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot.png 1176w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-300x149.png 300w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-1024x509.png 1024w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-768x381.png 768w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/figure>\n<\/div>\n<p><\/p>\n<p>Because of that, a server manager needs to use a special authentication method that can not be phished. AutoPassword Access Manager helps a server admin to be free from phishing the credentials. If it is installed on your server, the servers present the automatic code to the admin, instead of asking to input the credentials. Because servers present a one-time credential code to a server admin, there is no chance to steal the credential on an admin\u2019s PC. When servers show the automatic code to the admin, a server admin just compares it with the code generated on their phone.<\/p>\n<p><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" class=\"wp-image-5921\" src=\"https:\/\/i2.wp.com\/www.dualauth.com\/wp-content\/uploads\/screenshot-1.png?fit=800%2C394&amp;ssl=1\" alt=\"\" width=\"600\" height=\"296\" srcset=\"https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-1.png 1126w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-1-300x148.png 300w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-1-1024x504.png 1024w, https:\/\/www.autopassword.com\/wp-content\/uploads\/screenshot-1-768x378.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<p><\/p>\n<p>AutoPassword Access Manager returns the admin&#8217;s right from the server whether or not to connect to the server.<\/p>\n<p><\/p>\n<p>DDC(Dong Du Cheon) City adopted the AutoPassword Access Manager to protect their servers. This protects the server credentials, and they also need to change the server password automatically according to their regulations. Usually, one server admin has to manage 200 servers. It&#8217;s very difficult and annoying to change the server password periodically following the rules. By adopting the AutoPassword Access Manager on their servers, the server admin at DDC city does not need to change the password of servers anymore.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Challenges<\/p>\n<p><\/p>\n<ul>\n<li>How to protect input-based credentials even when malware is running on an admin&#8217;s PC.<\/li>\n<li>To change and reset 200 server&#8217;s passwords every 90 days according to the regulations<\/li>\n<li>Temporary server access management for MSPs<\/li>\n<\/ul>\n<p><\/p>\n<p><\/p>\n<p>Results<\/p>\n<p><\/p>\n<ul>\n<li>The server access credentials are protected with output-based authentication technology<\/li>\n<li>The server&#8217;s password is changed automatically whenever the admin login to their servers<\/li>\n<li>Temporary server access management with a single touch<\/li>\n<\/ul>\n<p><\/p>\n<p><\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1760\" height=\"1040\" class=\"wp-image-5930\" src=\"https:\/\/i2.wp.com\/www.dualauth.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1.png?fit=800%2C473&amp;ssl=1\" alt=\"\" srcset=\"https:\/\/www.autopassword.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1.png 1760w, https:\/\/www.autopassword.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1-300x177.png 300w, https:\/\/www.autopassword.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1-1024x605.png 1024w, https:\/\/www.autopassword.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1-768x454.png 768w, https:\/\/www.autopassword.com\/wp-content\/uploads\/AutoPassword-Access-Manager-test-with-AD-and-Exchange-\u1103\u1169\u11bc\u1103\u116e\u110e\u1165\u11ab\u1109\u1175\u110e\u1165\u11bc-\u1112\u1173\u1105\u1173\u11b7\u1103\u1169-1-1536x908.png 1536w\" sizes=\"(max-width: 1760px) 100vw, 1760px\" \/><\/figure>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Server admins always worry about a hacker stealing their server credentials. Server access credentials can be phished when the server admin tries to connect a server. To connect servers, it requires an admin to send credentials on their PC. When a server admin inputs the credentials on their PCs, it can be phished. Although 2FA, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5936,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-customer-case-studies"],"jetpack_featured_media_url":"https:\/\/www.autopassword.com\/wp-content\/uploads\/thumbnail_02.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/posts\/5907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/comments?post=5907"}],"version-history":[{"count":19,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/posts\/5907\/revisions"}],"predecessor-version":[{"id":7350,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/posts\/5907\/revisions\/7350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/media\/5936"}],"wp:attachment":[{"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/media?parent=5907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/categories?post=5907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.autopassword.com\/en\/wp-json\/wp\/v2\/tags?post=5907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}