> > My workplace does not have a policy to handle this situation, so I am
> > wondering how everyone handles this age-old problem. Any advice?
> > 
> > I can only think of these 2 methods:
> > 1) create local users to replace the AD user.
> >    There no confusion about the person who generated the data long time
> > past, and institutional knowledge can be preserved. However, this
> > becomes a management headache.

Local users are a bad idea when everything else is in the central
authentication system (AD in this case). 

> > 3) request for the accounts to be locked, not deleted. I think Security
> > will scream...

Security should not scream (but they probably will), as long as you
develop a specific policy and procedure for this. Security has to secure
the systems, but they also have to be usable by the end users -- the
computers, and their data, are for user to get their work done.

> > 2) create a general user to own all these files. Simple solution, at the
> > expense of institutional knowledge.

I think this starts to get to the right answer. There is more to it than
just creating a user, however.

- Create a user specifically to own the group files. Either name it by
  the group, or by the research project if you have multiple
  projects. Think this through and come up with a general solution that
  will work for all (or at least most) of your research groups. Make
  sure that the Security group is part of the team that develops the
  solution. 

- Make a policy that all group files will be kept in a well-known place
  on the file server (not in home directories) and add a regular task to
  change the ownership of all files in the repository to the group user.

- Make sure to document your policies and procedures, and refine them as
  needed

  --david
_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to