r/sysadmin Jul 10 '24

Admin says they require user passwords and store them all in a spreadsheet Question

Wife joined a small team (education org) who all collaborate using private and shared laptops with local accounts only. For work they all use Microsoft365 with online versions of the Office Apps. An external guy is managing this environment of around 15 users and while onboarding new users he requests they share their password with him for onboarding purposes, and to "test if everything works". It was explained that the passwords are stored in a spreadsheet together with all other users passwords in case the admin needs to change something or login to their accounts if they quit or die, etc. Apparently this is a requirement by the management, and there are other non-admin users with access to this spreadsheet. What is your take on this? What's the point in having a password if it's not private? Can't the admin do everything without direct knowledge of the users passwords? Isn't this a huge security risk?

787 Upvotes

811

u/nmj95123 Jul 10 '24

As a pentester, I love people that keep handy dandy spreadsheets with creds in them. Criminals love them, too. It speaks volumes that they don't even bother with a password manager, beyond deciding that storing end user credentials is a good idea, which it most definately is not.

166

u/Spraggle Jul 10 '24

It's a terrible idea to store everyone's passwords in a sheet, but these days, I don't mind people storing their own passwords in a secure manner, such as (what you've suggested) a password manager. I know you know as a pen tester, so this comment isn't for you. :-)

OP - The problem you've got here is that there is no way of proving which user did something, because it was as simple to log on as Geoff as whipping out the spreadsheet and using Geoff's password to log in. Now, if Geoff deletes all the files and emails in the system, there's no way of proving that it was Geoff that did it, because he's able to just say that Joan could have done it with his password.

Making passwords unique and secure is important, and writing them in a personal book only accessible by you would be better - so long as they are complex and unique for EVERY SITE. Password managers are so much more convenient though, and anyone's goal should be to get one set up and stop the reuse of passwords.

52

u/ConcernedCitizen1912 Jul 10 '24

Now, if Geoff deletes all the files and emails in the system, there's no way of proving that it was Geoff that did it, because he's able to just say that Joan could have done it with his password.

Incidentally this is why most restaurants (all the ones not run by idiots) disallow the "sharing" of a till/cash register by multiple employees. Once the fresh till is counted and inserted into the draw, it gets pushed shut, and it's the sole responsibility of the single person it's assigned to.

When I was much younger I waited tables at a shitty restaurant on graveyard shift, and the managers there were some combination of lazy, dumb, and/or too trusting, because they'd issue one server on the graveyard shift a till even though several were working, and not only did they not explicitly forbid the sharing of tills, they instructed us to do so quite often. So as any moron could have predicted, one day at the end of my shift my till comes up $50 short. Fucking Melissa, sticky finger bitch. And I still got written up for it.

25

u/NDaveT noob Jul 10 '24

You've just given me flashbacks of trying to explain to teenage employees why they shouldn't share tills.

15

u/ConcernedCitizen1912 Jul 10 '24

Word. And tbh I was complacent, too. I actually thought Melissa was the homie. Never expected her to do me like that. IDK what goes through the heads of the people who think "hey it's not my till, they'll never know who did it!"

Bitch, there are two of us working and I was in the gifted program. Call me arrogant if you want but if my choices are between

a.) believing I fucking up some simple math for exactly $50 or

b.) you stole that shit from my till (or rather, failed to insert it as you were supposed to while cashing out a customer)

then you might as well be wearing a hamburglar outfit to work as far as I'm concerned.

I ended up snapping on her a little while later, too, and got written up for that, as well. Fuck I don't miss waiting tables. Except maybe the cocaine, just a little bit.

→ More replies

5

u/nmj95123 Jul 10 '24

Incidentally this is why most restaurants (all the ones not run by idiots) disallow the "sharing" of a till/cash register by multiple employees.

Yup, also why sharing passwords is a terrible idea. If an employee does something malicious or criminal, it's going to be much more challenging to determine who was responsible.

3

u/awnawkareninah Jul 10 '24

Honestly when I was a waiter this is why you kept all your shit in cash til the end of shift in your waiter book. Usually that + credit tips could balance out and youd walk with the difference. Later they changed to all tips are paid out on your check and you hand in cash during the shift.

The workflow has changed dramatically since cash payments have dropped off so hard in the last 20 years.

3

u/ConcernedCitizen1912 Jul 10 '24

The workflow has changed dramatically since cash payments have dropped off so hard in the last 20 years.

Yep. That was just a little bit before my time. By the time I was waiting tables it was mostly card payments, and nobody except the really old gals who worked early mornings did things the old fashioned way (because their customers were all old dudes who came in with the same cash in the same denominations every day and ordered the same things, etc.)

→ More replies

70

u/MrCertainly Jul 10 '24

Oh yeah, there's no way to prove a user did anything. There's zero chain of custody with emails/files/etc.

Let's say suspected MaliciousEmployee gets mad and deletes EssentialDocuments. Company fires the suspected MaliciousEmployee and files a lawsuit against them.

MaliciousEmployee shows evidence from earlier that SO MANY PEOPLE had access to their password (because they KNEW it was a massive red flag ripe for abuse by someone who could be out to "get them"), and by showing this evidence, they claim they did not actually delete the files -- it could have been any number of other people.

Furthermore, they show evidence that they were mistreated at the company and this was in retaliation -- and remember, Capitalism is inherently based upon exploitation. It's really not that hard to find something that could be considered mistreatment in someone's opinion. Pretty much as prevalent as jaywalking in NYC. Especially at a place that stores their passwords in a fucking spreadsheet....you know their HR department isn't on top of harassment and whatnot.

Counter-suit is filed for wrongful termination and retaliation. Company loses and pays out the arse.

→ More replies

8

u/TheThoccnessMonster Jul 10 '24

I’d do everything in my power to have this company and responsible individuals excised like cancer.

7

u/Spraggle Jul 10 '24

I'm more of the opinion that this would be a total red flag - if the company wouldn't listen to me about rectifying this situation immediately, I wouldn't hesitate to leave.

12

u/rinpoce Jul 10 '24

Thanks for your feedback, this makes a lot of sense.

→ More replies

3

u/CubesTheGamer Sr. Sysadmin Jul 11 '24

We use a password vault with an enterprise license where we can transfer the vault of a user to another user. Obviously this creates an audit trail so it’s kind of the ideal method I would say.

→ More replies

15

u/Toribor Windows/Linux/Network/Cloud Admin, and Helpdesk Bitch Jul 10 '24

Exec team fought me on implementing MFA until someone got phished and the attacker connected to sharepoint and downloaded every file with 'password' in the title. Once of the files was a word document belonging to the marketing team which contained all the usernames/passwords for all our social media accounts. A few of the passwords were old, but the ones that were up-to-date were immediately used to start spamming clients, customers, industry leaders, etc. It was a real mess.

Anyway now we have MFA and the marketing team uses the credential manager I'd rolled out to everyone years prior.

49

u/sylfy Jul 10 '24

If someone ever requires you to hand over a password, may as well change it to “123456”.

47

u/Cyhawk Jul 10 '24

You mean

A123456!

Capital letter and special character requirements.

13

u/vCentered Sr. Sysadmin Jul 10 '24

I like this, it's easy to increment when I change it every 90 days!

→ More replies
→ More replies

24

u/USAF6F171 Jul 10 '24

If someone in that scenario demanded my password, I'd tell them to just set it to what they want and then give it to me. I'll establish (document) that I was prohibited from assigning my own password, and move forward from there.

Also, you should decide your future employment based on what this rule tells you about the organization.

27

u/FlibblesHexEyes Jul 10 '24

That’s amazing! I have the same combination on my luggage!

10

u/jakebechtold Jul 10 '24

Remind me to change the combination on my luggage

→ More replies

24

u/ZealousidealTurn2211 Jul 10 '24

I'd use ThisPasswordIsNotSecure, might as well be petty if they're enforcing something this stupid.

9

u/sylfy Jul 10 '24

The irony is that that password is probably actually pretty secure, based on the length alone. A dictionary based attack might get it, but realistically whose dictionary is gonna have that string?

12

u/R1skM4tr1x Jul 10 '24

Meets the latest NIST guidance FWIW

6

u/LogicalExtension Jul 10 '24

I was about to reply that it's definitely on a top passwords list somewhere.

But HIBP doesn't seem to have it. So...

→ More replies

6

u/willbeonekenobi Jul 10 '24

According to the Password Strength Meter (passwordmonster.com), ThisPasswordIsNotSecure would take about 4 hours to crack, but adding a '!' quadruples that to 16 hours and a '1' on top of that it goes to 3 days.

Also it has been leaked according to Leaked Password Check: Has My Password Been Hacked? (cybernews.com)

→ More replies

4

u/Legionof1 Jack of All Trades Jul 10 '24

ThisPasswordIsNotSecure42069!

Gotta get those special characters and numbers in.

→ More replies
→ More replies

6

u/MadManMorbo Jack of All Trades Jul 10 '24

My god! I have the same combination on my luggage!

5

u/Dar_Robinson Jul 10 '24

Don’t you mean use the password of “solarwinds123”

→ More replies

8

u/pokebud Jul 10 '24

Oh but what if they store them all in a public folder in outlook, certainly that can be considered best practices /s

8

u/awnawkareninah Jul 10 '24

Even without a password manager, in Google Workspace for sure and I think Exchange you can just delegate their inbox to yourself and force a password reset. There's no reason to keep their password when you can just change it.

7

u/hutcho66 Jul 10 '24

Your inference here that memorising passwords rather than using a password manager probably isn't right, it's far better to use a secure password manager and randomise your password for each different application, than to use a single guessable password for everything.

→ More replies
→ More replies

718

u/Drew707 Data | Systems | Processes Jul 10 '24

I've worked in some janky-ass environments and have never come close to this level of fuckery.

175

u/ofnuts Jul 10 '24

I worked as a contractor in a software development project where on customer demand all the developers (about 20) shared a common id/pwd to the source code repository.

When someone entered an invalid pwd (good ol' CapsLock) three times, the pwd was invalidated for everybody and had to be changed. But of course, unaware people mistakenly using the old pwd would cause the new one to be invalidated. So the project entered a password crisis every two weeks.

And of course, this being developers, the id/pwd where used in scripts, so running a monthly backup script could generate a new round...

127

u/roguetroll hack-of-all-trades Jul 10 '24

Requiring everyone to use the same account for a source code repository negates half of the reason you’d have one in the first place

63

u/OldHandAtThis Jul 10 '24

In these cases, it is an end run around licensing, As it was contractors only, rather than security.

10

u/Gadgetskopf Jul 10 '24

My spouse was complaining one day about how at their job, the Adobe software started complaining about not being licensed and asking for the key, and the "IT guy" had to come around to each machine individually to "install the registration certificate".

I suggested the next time that "IT guy" gave guff, the response should mention how he was initially unavailable, so they called Adobe who couldn't seem to find a legitimate license on the books. Since there's no was someone in a professional capacity could POSSIBLY be pirating the software, they took down all the pertinent company management contact info to contact when it's located.

7

u/Geno0wl Database Admin Jul 10 '24

I mean the real questions I have are

a) Does anybody else other than this IT guy know about this?

b) How much do you actually like your job?

If you think the IT guy is a lone wolf who is solo doing this, then going to management should be your first step.

If you actually like your job then I wouldn't make veiled threats like that. Because you never know how the bosses are gonna take it and might mark you as "not being a team player"...

if you hate your job then I wouldn't pussy foot around with threats but would just report it outright(anonymously)

→ More replies
→ More replies
→ More replies

16

u/Genoblade1394 Jul 10 '24

Holly mother of god that is a nightmare

8

u/ofnuts Jul 10 '24

It was. And that was only one problem in probably the most dysfunctional project I have ever worked on (and I've seen quite a few).

6

u/tofu_ink Jul 10 '24

Thats awful, this may or may not 1-up it. Recently where I work was acquired by another company. I was asked to work on one of the acquiring company servers. When I asked about how I was suppose to log into the server, I was given a shared private key file.... and it hasnt been changed for years. I melted inside.

→ More replies
→ More replies

33

u/jfoust2 Jul 10 '24

All true janky-ass environments have everyone logging in as the same domain admin user, duh.

20

u/Erok2112 Jul 10 '24

Or - real life situation I cleaned up - Just make everyone an domain admin "because its easier" but also make sure to enable internet sharing through the DC.

6

u/Efficient_Will5192 Jul 10 '24

First company I worked with after covid, I learned very quickly that when they panicked and sent everybody to WFH with laptops, they gave ever user a local admin password.

Boy were people pissed that the new guy was taking it away.

→ More replies

5

u/ConcernedCitizen1912 Jul 10 '24

The l33t jenky environments do that and don't just use "admin" or "Password1"--they use "P@ssword1" or "Fall202X!" (whatever season/year it currently is). That's how they secure all the cybers.

3

u/redmage753 Jul 10 '24

Password1 - it's what they were taught to use in school, right??? XD all the (learning) tools had it!

3

u/Freakishly_Tall Jul 10 '24

I have first hand knowledge of a regionally well-known mid-size organization doing that...

... with admin / [ blank ] .

And I am sure I'm not the only one!

5

u/chaosgirl93 Jul 10 '24

I have seen some terrible IT practices in organisations I've had no real ability to leave or to even complain let alone fix it.

But never anything this bad!

3

u/Freakishly_Tall Jul 10 '24

It was... pretty impressive.

And, no surprise, there was MUCH anger and gnashing of teeth at the effort to fix it.

Good times.

→ More replies

15

u/TotallyNotIT IT Manager Jul 10 '24

I've seen two that were equally this bad throughout my consulting career, but only these two.

In one of them, the "admin" had everyone's password in a spreadsheet on her desktop. In the other, they just decided that everyone needed to have the same awful password and no one was allowed to change it.

17

u/petrichorax Do Complete Work Jul 10 '24

sounds like somebody hasn't checked their outlook notes yet :P

29

u/kirashi3 Cynical Analyst III Jul 10 '24

sounds like somebody hasn't checked their outlook notes yet :P

I checked mine, but all I see is "hunter2" written over and over...

11

u/bofh What was your username again? Jul 10 '24

I checked mine, but all I see is "*******" written over and over...

Same actually. How odd.

8

u/gochomoe Jul 10 '24

my first IT job the server root account was "toor" and the password was literally ******** (8 asterisks). The previous guy thought it was really clever. Then at some point we realized someone else thought it was funny too and started using our server to serve porn.

13

u/Affectionate_Ad_3722 Jul 10 '24

Why did you write "*******"?

7

u/IJustLoggedInToSay- Jul 10 '24

education org

That's why. Education as an industry is thirty years behind in their own field. Not much hope that they'd have their IT security shit together.

3

u/chaosgirl93 Jul 10 '24

I suspect the reason schools use Chromebooks is because they're a shortcut for at least some of the facility IT security.

6

u/Mr_ToDo Jul 10 '24

I've seen that setup sans the non-admin access. Well with the password to the spreadsheet, plenty of people could get to the file.

They were a unique group who tended to stay with whatever solution they first adopted unless change was forced, and since that attitude was top down things didn't really change very much.

But I also found out much later that they thought because it was password protected that anybody would need that password to delete it too. Thinking about it they never did go ahead with fixing that.

5

u/dark_frog Jul 10 '24

I played a web game in the aughts where one of the password requirements was that it couldn't be the same as anyone else's. If someone gave you permission to access their account (it was real time, so account sharing wasn't uncommon) you would log on using their username with your password. 👀

3

u/ibanez450 Sr. Systems Engineer Jul 10 '24

How about a single shared VPN account by all vendors that also happened to be in the Domain Admins group?

→ More replies

88

u/Suaveman01 Lead Project Engineer Jul 10 '24 edited Jul 10 '24

This guy either has no idea what he is doing, or he’s very dodgy. Either way, this is extremely bad practise.

→ More replies

241

u/strongest_nerd Security Admin Jul 10 '24

Yes, massive security risk. No one should know your password but you. Administrators do not require passwords to gain access to your account, they can simply use their admin privileges. There is no accountability with a spreadsheet like that, especially if multiple people have access to it. External guy sounds like someone's brother/uncle who 'knows computers' is managing shit.

21

u/Knotebrett Jul 10 '24

Speaking of this. Is there a way to impersonate someone during onboarding for instance Azure AD on Windows OOBE, so that you as "admin" actually are onboarding "charles@contoso.com" on his new laptop without knowing his password? So that you can finalize his out of box experience into just starting working?

73

u/dubinception Jul 10 '24

Wouldn't you just set the users password in AD, login as said user, configure the device as you/user want, then set AD to require a password change after the next login?

21

u/[deleted] Jul 10 '24

Maybe not the most elegant way but that’s what we do and seems to be secure enough and work well.

16

u/Wolfram_And_Hart Jul 10 '24

All of our clients are assigned a “new guy password” that we store in ITG and they are forced to change it and set up MFA at the same time.

3

u/gnadenlos Jack of All Trades Jul 10 '24 edited Jul 10 '24

And how do you handle it, if it's an existing user, that wants to use his old notebook, while you setup the new one? For M365 you can create one-time-access-codes, but for local accounts it's not that easy. Using "one-time-access-codes" whould also give the admin access to everything - not that much better than asking the user for the password and make him set a new one later.

5

u/KnowledgeTransfer23 Jul 10 '24

User sets up his new notebook, anything that isn't automated via policy in the first place. I'll sit right at their side and have them log in, connect Outlook, etc.

→ More replies
→ More replies
→ More replies

20

u/MindErection Jul 10 '24

You either use ZTD/autopilot or just sign in, do your shit, and reset the PW before they start (way manual)

17

u/SupportRamen Jul 10 '24

Temporary Access Pass (TAP) in combination with Web Sign In can be used for this purpose.

https://learn.microsoft.com/en-us/entra/identity/authentication/howto-authentication-temporary-access-pass

TAP will allow you to login during OOBE as the user, when enabling Web Sign In (Intune Settings Catalog) you can also use this mechanism on the sign in screen.

13

u/ReputationNo8889 Jul 10 '24

Its called TAP, its a temporary password, that can be used to skip a password requirement and onboard a device as a user. BUT you should not do this if you have any kind of Management (Like Intune). Get you users into the habit of enrolling their own devices and you will be much happier.

6

u/Thoth74 Jul 10 '24

Get you users into the habit of enrolling their own devices and you will be much happier.

LOL. Wouldn't that be the best? Users being expected to do anything other than their explicitly defined job duties, none of which include anything "computery"?

If I had a dollar for every time I heard "but I'm not a computer person!" from a user and then another dollar for every time management supported their position, I'd have retired before 40.

3

u/ReputationNo8889 Jul 10 '24

I totally get your position. Im in the same boat, you know. But it is possible. Most users already setup their own phones/pc's, with things like "Autopilot" they basically are only required to sign in with their email. (This should be the minimum if you get a PC). From experience the "not computery" person can magiacally create excel files with tons of makros and business logic + custom data integration, if required. For most it's a "get ot of jail free" card, if you ask them to do something on a devices they dont want to/dont know how.

→ More replies

12

u/strongest_nerd Security Admin Jul 10 '24

Windows Autopilot?

7

u/StreetPedaler Jul 10 '24

Remember imaging? Forget imaging.

6

u/PunDave Jul 10 '24

I can't remember the name but Entra Id does have a temporary password feature for this sort of thing

8

u/fatalicus Sysadmin Jul 10 '24

A function to create temporary passwords to gain access to an account, like some kind of Temporary Access Pass?

→ More replies

5

u/_keyboardDredger Jul 10 '24

Entra’s Temporary Access Pass - intended for initial auth to configure strong authentication methods, but works just as well for the initial login if Web-Sign-In is configured for the user/org in Intune.

5

u/FinsToTheLeftTO Jack of All Trades Jul 10 '24

Temporary Access Password

3

u/devloz1996 Jul 10 '24

Yes, you can TAP yourself into virtually everything. For Windows Sign-In, you need to enable this:

https://learn.microsoft.com/en-us/windows/security/identity-protection/web-sign-in/?tabs=intune

If you need it before CSP kicks in, push this:

[HKLM:SOFTWAREMicrosoftPolicyManagercurrentdeviceAuthentication]
EnableWebSignIn DWORD 1
→ More replies
→ More replies

45

u/sengh71 Jul 10 '24

I honestly thought I was in r/shittysysadmin for a brief moment

65

u/SaintNewts Jul 10 '24

Yeah, no. Both M365 and G-office have administrator level accounts that provision and manage everything. There's no need at all for the whole password spreadsheet thing.

That's just sketchy as hell.

If they were using a password safe with multi factor authentication and local only storage, that would be only slightly less sketch. Still an improvement over whatever kind of bullshit infused dirt that guy is snorting.

Everyone should change their passwords and never tell anyone else what their new one is. Especially not that walking honeypot.

TL;DR

Isn't this a huge security risk?

Yah think!?! 😆

10

u/rinpoce Jul 10 '24

Thank you sir, yes I do think ...Needed 3rd party input to change this ignorant approach. Let's see...

→ More replies
→ More replies

25

u/botmarshal Jul 10 '24

Whoever enforced this rule should no longer be in charge of password policy.

The dwarves in Snow White (who keep their key on the wall outside the door) have better operational security than this.

It must be a very isolated group of non technical people.

Even though I don't know them, it keeps me up at night to know that this environment exists :-(.

They deserve better.

14

u/nanonoise What Seems To Be Your Boggle? Jul 10 '24

On the plus side your wife has plausible deniability on anything that happens with her account...

55

u/cliffag Jul 10 '24

Gonna take a different approach here. Yes, it is a terrible policy and practice. 

But. 

Unless you or your wife are in management and have the level of clout to change policy, the question seems moot. Plenty of people have jobs with stupid policies and it's just part of being in the workforce. 

Your choices are: comply and protect yourself  (aka no PII in email), try to push back and deal with the fallout (very low success rate and rarely good for the person making waves), or quit.

I don't see much productive coming from asking here. Plenty of people will tell you it is dumb, and showing reddit posts as prof to management will have all the weight of a helium balloon, and won't give you any peace of mind. Seems like a fruitless endeavor. 

6

u/monedula Jul 10 '24

That is a reasonable point, but I beg to disagree. The situation could be any of the following (all of which I have met): * The IT guy misunderstood what management was really saying;
* The management requirement was actually just an off-the-cuff remark by a manager;
* Management is willing to listen to reasonable arguments;
* It really is a hard requirement by a dumb management.

In the first three cases sending a polite e-mail to management (using words like "risk" and "standard IT practice", while avoiding words like "incompetent") could do some good. While in the last case a single polite e-mail is probably - probably - not going to produce a huge fall-out. Just document what you sent and what exactly the response was, and keep it for potential future use.

18

u/disclosure5 Jul 10 '24

Definitely this. There's multiple people on this thread attacking some IT guy, when the post itself says it's a management demand.

There's definitely no point talking about pentests in the context on some small educational group. You know they don't have one.

12

u/Heavy_Dirt_3453 Jul 10 '24

It's not clear if this "management requirement" is

a: External IT guy tells management "this is the way this must be done, tell your staff to comply"

-or-

b: Management have told External IT to go along with this, and because they know no better themselves or are desperate for clients have gone along with it.

Neither paints anybody in a particularly good light.

→ More replies

5

u/vCentered Sr. Sysadmin Jul 10 '24

Here's the thing on the IT guy for me.

You drop this client. They're a massive liability.Huge.

→ More replies

11

u/[deleted] Jul 10 '24

[deleted]

→ More replies

9

u/MeatSuzuki Jul 10 '24

You dont need passwords as an Azure admin.

→ More replies

16

u/Knotebrett Jul 10 '24

This would be quite expensive in the EU region. The fines can range from 10 million euros or up to 2% of the annual turnover of an organization for less serious violations, and up to 20 million euros or 4% of the annual turnover for more serious violations.

13

u/joshghz Jul 10 '24

Is the "education org" dealing directly with minors or information pertaining to minors?

I'd report the crap out of their setup to... someone.

→ More replies

6

u/ElevenNotes Data Centre Unicorn 🦄 Jul 10 '24

What is your take on this?

That this is how a 12 year old would organize this.

What's the point in having a password if it's not private?

None.

Can't the admin do everything without direct knowledge of the users passwords?

Maybe. Depends on how the environment is setup. By the looks of it, that guy has maybe such limited knowledge that he doesn’t even know how to setup administrative access.

Isn't this a huge security risk?

Yes.

but

Not your problem. If your wife wants to work there, and that is their policy, so be it. Not your wife’s nor your problem.

3

u/RickoT Jul 10 '24

I disagree with that, it could become their problem if he chooses to abuse the information. If I were her, I would leave.. if that's not an option, then I would have a password EXCLUSIVELY for my computer, and nothing else, not even other work related systems. Never use autofill, remember passwords, etc.

Protect yourself best you can. Not to fearmonger or put shit in anyone's head, but this is how breaches start and come from the most unexpected places.

→ More replies

15

u/Khallann Sysadmin Jul 10 '24

Hmm they are on to something….. stupid. If someone would ask me this I would straight up say no. As an admin I do not WANT to know anyone’s password. It can only come back to bite me in the ass later. If the company would pressure me in doing so I would give a false password for their spreadsheet and wait how long it would take for them to test this. The request is clearly from a “IT department” that does not know how to dot this properly. Next they are going to ask for your PIN code and card for whatever reason.

5

u/Hyperbolic_Mess Jul 10 '24 edited Jul 10 '24

This is bad practice on so many levels. Even if they didn't want to do anything "fancy" the usual onboarding process is to set up the user account with a temporary password, check everything works then hand it over to the user and force them to change it to something that IT doesn't know. If IT needs access after that they should have a separate local admin account on the laptop that they know the password to (stored in a password manager) so that they can reset the user's password for that account.

Reading between the lines it sounds like they've just set up one admin account on the computer and give the users access to that 🤦. They've probably not encrypted the hard drive as well so it would be trivial to use 3rd party tools to blank all passwords on the computer anyway.

It's hard for you to change any of this but your wife should work under the assumption that anything she does on that computer will get hacked so don't ever store any personal information there. That said HR is probably just as at risk 🤷

→ More replies

4

u/prodsec Jul 10 '24

There’s no excuse for this, so dumb

5

u/WithAnAitchDammit Infrastructure Lead Jul 10 '24

Had to double check. Thought I was in r/shittysysadmin

8

u/Vesalii Jul 10 '24

This is a major risk and your wife should refuse. I'm an admin and I always tell our user to NOT give me their password because I don't want it. We do have some passwords to shared accounts but they're stored in an encrypted database and only admins can access it.

4

u/HaMAwdo Jul 10 '24

Storing passwords in a spreadsheet is a huge security risk, something like MyGlue and ITGlue are better alternatives, These tools are specifically designed for storing passwords securely. They use encryption and access controls to restrict access.

9

u/Suaveman01 Lead Project Engineer Jul 10 '24

Even then they shouldn’t be storing users passwords at all, if the admin needs to access the account they can reset the password.

→ More replies

4

u/No_Anywhere6700 IT Manager Jul 10 '24

Yes, huge security risk. This admin has no actual admin level control lf the network since all a user has to do is change their local account passwords and they're locked out.

Either domain join everything and get AD set up; or just build on the existing MS O365 accounts and upgrade to Business premium and enroll devices in entra and Intune.

Don't give this admin your actual password. They will compromise the network with how they are doing this.

4

u/Frmr-drgnbyt Jul 10 '24

Run. Run very far away.

4

u/CrappyTan69 Jul 10 '24

Nope. If some internal abuse happens your wife has no way to prove it was not her. The logs will show her account.

That's a very scary practice. I suspect "the IT guy" knows slightly more than the average Joe which is why he's the IT guy. He's not the right guy...

→ More replies

5

u/Obvious-Water569 Jul 10 '24

Standard small org activities to be honest.

Yes, it's a huge security risk. No, the admin does not need to know the user's password to do admin tasks.

→ More replies

3

u/Blyatman95 Jul 10 '24

I work in the MSP space for tiny businesses. This shit is so hilariously common. It’s because users save files to their desktops so when Jill’s on holiday and they need something they just log in to her pc as her. No amount of telling them about the existence of sharepoint or servers will change their mind.

Bonus points to the company I support who insists all user passwords are the same. They have AD and all PCs are domain joined, they just login once with a new user and it becomes “Steve’s pc”. They keep the password the same so anyone can log in to anyone’s PC. I’ve told them they can just press other user and sign in as themselves but they won’t have it.

4

u/Just_Steve_IT Jul 10 '24

I would require that the business provide me with a binding indemnity agreement stating that since my user credentials are not private, I cannot be held accountable for any actions taken under those credentials. Get the lawyers involved, and you may find that the company changes its tone real quick.

4

u/dartdoug Jul 11 '24

We worked with a small town that gave IT oversight to a guy who had no IT experience. The first thing he did was send an email to all employees instructing them to email him all of their passwords.

Several of the employees did a REPLY ALL to the request so every employee in the town had those user passwords.

→ More replies

10

u/barrystrawbridgess Jul 10 '24

Someone of some significance should fire or terminate the relationship with the admin.

14

u/mcdade Jul 10 '24

Reset all passwords, enforce MFA and delete that spreadsheet.

→ More replies

6

u/Maybe-Im-Dumb124 Jul 10 '24

that is not an sys admin at all

6

u/oneill2john Jul 10 '24

If a user resigns or die, and you can't get in their account without their password - you can't call yourself an admin. Especially if you are using Microsoft365 which has tons of options for admin to use without the need of user's password.

I always tell my users not to give me their passwords. And if they still do, I tell them to change it ASAP.

Oh, and storing user passwords in a spreadsheet? You can't be serious with this ...

Users in that company should just say NO to that.

→ More replies

3

u/ApricotPenguin Professional Breaker of All Things Jul 10 '24

and while onboarding new users he requests they share their password with him for onboarding purposes, and to "test if everything works"

The person that onboarded the new account can set the initial password and therefore knows it.

At that point they can do their testing if they really wish, then force the user to change the password.

What is your take on this?

It's a brilliant way for users to have plausible deniability of when they're caught in wrongdoing. "It wasn't me that was logged in at that time! The external guy knows my password and clearly he did it!"

Apparently this is a requirement by the management, and there are other non-admin users with access to this spreadsheet.

There's nothing that forbids you from changing your password after giving it to the person...

Also, whatever password you give make sure it's NOT used anywhere else nor is similar to anything used for your own personal accounts.

→ More replies

3

u/swissthoemu Jul 10 '24

Nope, Nope, Nope.

3

u/vCentered Sr. Sysadmin Jul 10 '24

This is bait, right? Rage bait? Click bait?

I've been in IT for a hot minute and the mantra has always been, "IT does not need your password and will never ask for it".

And we don't. I can't think of a legitimate reason why this person needs to know all the staff passwords.

→ More replies

3

u/AMoreExcitingName Jul 10 '24

I'm sure their cyberinsurance people would love this.

→ More replies

3

u/ReputationNo8889 Jul 10 '24

Ive had a user manage password in basically the same way. "But the excel sheet is password protected!" Yeah sure, thats gonna stop em ....

This is a major red flag and i would RUN from such a company. If he wants to know the O365 passwords, then he is just plain stupid. As a O365 admin you can reset any users password at will (you shouldnt, but you can). The admin logging in with just the password means, that MFA is also not a thing, since he would then need the MFA codes as well. There is no point in passwords, if they are stored accessible somewhere. Passwords by themselfes are not really secure, this is why Passwordless is becoming such a big thing.

→ More replies

3

u/Dumfk Jul 10 '24 edited Jul 10 '24

The times I dealt with this were definitely not due to the it admin. It was due to the company owner being a control freak and micromanager. If you are smart you will just bail and find something else. This is just the tip of the iceberg. Being what sounds like a non profit it also could be there are some shady things going on and forcing this setup is to scapegoat others if they get exposed for embezzling.

3

u/spyingwind I am better than a hub because I has a table. Jul 10 '24

User does something bad with their account. Police come to investigate. User blames admin, who has all passwords, as an alibi. Does admin have an an alibi?

An admin should never need to know a user's password to effectively administrate users. AD(GPO), Intune/AzureAD, or some kind MDM can configure or modify any machine needed.

Does the admin not know about changing the password of an account? That is what they should be doing when they need to login as a user that quit or passed away.

3

u/gomexz Linux Engineer Jul 10 '24

A company I used to work for was an M.S.P. We took over I.T. operations for a police station. The I.T. director was let go and we took over. The director required everyone to give him their passwords. He had everyones passwds on an app on his personal phone. There was no way for me delete that. So I had dispatch send a message out over the radio to all the officers that soon there will be a requirement to reset their passwds to something new and to never for any reason give out their passwd again. I then wrote a quick powershell thingy to comb A.D. and require a passwd reset at the next log on for everyone. Once that was done another message went out over the radio asking everyone to reboot.

There is NO reason for ANYONE in I.T. to have a list of peoples passwds. Maybe, MAYBE give the I.T. guy your passwd if you are having account issues and he is actively working with you to resolve it.... Maybe. But once the issues are resolved change your passwd.

3

u/Dar_Robinson Jul 10 '24

If they require your password, make it “N!ST_800-53”.

3

u/JohnBeamon Jul 10 '24

No. Admins do not require user passwords to become users and test permissions. Storing that data unencrypted at rest is a major security failure. There is no technical reasons to do this.

3

u/thefurnaceboy Jul 10 '24

This just seems like a guy who wants a list of all the passwords people definitely reuse for all their important accounts. He's either wildly incompetent or an obvious criminal

3

u/Manitcor Jul 10 '24

a quick chat with the company's insurance will fix this

3

u/CharcoalGreyWolf Sr. Network Engineer Jul 10 '24

In small environments, this usually means some big fish in a little pond wants the ability to randomly sift through a user's data. Usually to feel in control.

Personally, I'm not willing to work with that, even if it's not a security risk. It indicates either nobody is trusted, or that there's massive micromanaging going on. Also makes it very easy to set someone up for firing with cause by using their account for "purposes".

3

u/dbtwiztid Jul 10 '24

If someone called asking for this I'd assume they're phishing and hang up. Admins can reset your password, disable MFA, etc. No real reason to share your password with them.

3

u/mxpx77 Jul 11 '24

Lmfao wow. Just… wow.

8

u/Miniature-Admin Jul 10 '24

What the....
I always tell my Users: "Please, never tell me your Passwords, i do not want to know".

To be Fair , i work in a big industry and in the past, the police did asked me for passwords, wich i was happy to deny any knowlege of.

Treat your Passwords like your underwear.

Change them regularly, dont leave them on the Desk, and dont Share with others.

3

u/L3veLUP L1 & L2 support technician Jul 10 '24

Last time I checked common guidance around passwords was to actually not change them unless you're sure they've been breached but have one long strong password.

https://learn.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide

https://www.ncsc.gov.uk/collection/passwords/updating-your-approach

5

u/Legionof1 Jack of All Trades Jul 10 '24

Exactly like my underwear.

6

u/RickoT Jul 10 '24

This is the most insane thing I've ever heard.

As a Sysadmin myself, I would never NEVER EVER, EVER ask for anyone's password for ANY reason. I've had customers offer me their passwords and I tell them flat out no, I don't want it. And any self respecting sysadmin would do the same.

There are DOZENS of tools to get into a system as the user in an emergency situation without the user's password, PARTICULARLY for local accounts.

Anyone collecting passwords from users for WHATEVER purpose is up to nefarious things.

For example:

And this is just something I'm making up off the top of my head

Tiffany joins, gives DumbAdmin her password. He waits a few days/weeks for Britney to get settled and log into something important like... her bank. Once a week, DumbAdmin logs into Britney's (and probably other people's) computer, pops open the browser, checks browser history, looks at autofill stuff, maybe checks some email, and BOOM, now he has her username for a few sites. AND MOST LIKELY those accounts use the password he gathered from Britney when she started.

That's just one of a hundred scenarios I could probably think of.

Just the concept of the kind of data that these people (as someone else mentioned) is STAGGERING. And as another person said, there is ZERO accountability if he has everyone's password because he accesses the system as the user and there's no proof that user didn't.

Those people need to make EVERYONE change their passwords, then IMMEDIATELY terminate that relationship ASAP, IN THAT ORDER, or he can do MAJOR damage in an act of rage for being let go.

Then get a real admin that will get them set up properly.

Sorry for the rant, I just really hate predatory IT tactics like this, even if he's doing it for the "right reasons," for now, one day he'll abuse that information. Plus i'm high, and reddit makes me ranty

5

u/rswwalker Jul 10 '24

Does not compute. Admins can always change a user’s password to gain entry. The only reason to keep a user’s password is to log in without the user knowing. Probably some dumb HR requirement put on the provider.

4

u/BeefyIrishman Jul 10 '24

That assumes they have admin accounts setup. From the sound of it, they probably do not even know what an admin account is.

→ More replies

4

u/VanillaCandid3466 Jul 10 '24

The guy is utterly clueless and should not be given any passwords by anyone.

A spreadsheet? This guy is a total idiot.

2

u/MikealWagner Jul 10 '24

This is a significant security risk. The admin needs to utilize a password manager, and those who require access to specific passwords can only see what they need. Something like Securden Password Vault - there is a free version for small teams.

2

u/directorofit Jul 10 '24

fire everyone.

2

u/earthman34 Jul 10 '24

I'd tell them I object, if they insist, just change it immediately. There's zero reason for them to know a password and I'd never allow someone to have a password to a device that's mine.

2

u/ScreamingVoid14 Jul 10 '24

Well, I've been in this boat before.

Yes, it is a terrible idea and you should push back. But understand that a small org like this is probably literally owned by an individual or small group. If they want to drive their org into the ground or take undue risks, it is mostly their prerogative.

You can try to mitigate by training them on how to reset passwords and providing them a separate admin account, frame it as being helpful. You can try to push for a better password management system. You can quietly encourage people to reset their passwords and not let management know. Secret Server is a pricey but useful password manager with robust business continuity features (like letting management declare an emergency and read other people's passwords, with audit trails).

You can also consider framing the situation as, "If Suzy in accounting does something illegal, it will be legally difficult to prove it was her if the entire management team has access to her password."

2

u/[deleted] Jul 10 '24

We have a spreadsheet with everyone’s passwords and they’re handmade passwords, not even randomly generated. Once I came into the org, I’ve been pushing for us to have a password manager and self service for the staff, but it’s a slow slow process.

→ More replies

2

u/vmeldrew2001 Jul 10 '24

Sounds to me like the org doesn't want to pay for it to be done properly. "Why pay money to change it when the way it is already works?"

2

u/dedjedi Jul 10 '24

This is so dumb that I would believe something criminal is going on.

→ More replies

2

u/qzmicro Jul 10 '24

I spent years traveling my county assisting business owners deal with the mess this causes. technical, financial or legal. Most of these business owners are still climbing Mount stupid (dun keugger effect anyone?) ... and they didn't seem to learn until it hits them hard in the pockets. :(

Edit: spelling

2

u/jrobertson50 Jul 10 '24

Tell her to not use the same password she uses for anything personal. And never touch a non work related website or anything on the work laptop. 

2

u/stussey13 Sysadmin Jul 10 '24

It amazes me the dumb shit that IT teams do in the education world. I'm in education myself and I see some dumb shit on a daily basis from conworkers

2

u/Always4Learning Jul 10 '24

This is a silly and insecure requirement. If you were truly an administrator, he'd have access to anything. Anyway. It's not the like administrators test every use case imaginable a user can run through n every functionality. In small shops like this they operate on the squeaky wheel principal.

Can you post where this is so we can all go to this educational institution and steal all their good ideas? Naturally, I'm hoping that they have better ideas in their domain than keeping credentials in a spreadsheet

2

u/BaconGivesMeALardon Jul 10 '24

Good time to take a long leisurely walk.

2

u/stshelby Jul 10 '24

Look up non repudiation in cyber security. That's the goal and cannot be achieved without single identity sign on. Security is a way of life not a convenience.

2

u/Marathon2021 Jul 10 '24

Janky as hell. It’s either lazy or malicious.

However…

Given you said there are only local accounts, I could maybe see the logic in a recovery situation. User gets hit by a bus. Critical files to the org in their account. In a normal org, you get someone with domain admin rights to reset their PW on Active Directory and then do whatever you need to do. More complicated to recover in a local accounts only scenario.

2

u/posixUncompliant HPC Storage Support Jul 10 '24

What is your take on this? 

Holy shit that's terrible!

What's the point in having a password if it's not private? 

No clue. I can usually devils advocate most things, at least in some vaguely plausible way, but this next level stupid.

Can't the admin do everything without direct knowledge of the users passwords? 

They certainly should be able to.

Isn't this a huge security risk?

Yes. It's also a liability risk. You can't plausibly track down who did anything.

2

u/EEU884 Jul 10 '24

Hell to the nah. Management and the external guy need rodding from the rear with a wire brush.

2

u/SilentMaster Jul 10 '24

Huge security risk. Solves almost zero of the problems mentioned. It's a crutch for lazy people. I hate it.

2

u/GSM193 Jul 10 '24

The answer is no, never. End of discussion.

Passwords are personal and the accounts normally are user account. Not Company account 😁

2

u/eddiehead01 IT Manager Jul 10 '24

There are a small selection of password types that we do fix and keep a record of (VPN passwords for instance) but we've recently moved away from spreadsheets to bitwarden

At the bare minimum they need to not be using a spreadsheet

There's no reason for them to have those though. If someone dies or quits then you go into your admin portal and reset the password

2

u/k0rbiz Systems Engineer Jul 10 '24

I had a CFO do this before. I showed him the vulnerabilities of using a spreadsheet. Shared proof of concepts and case studies of other businesses with data breaches using spreadsheets to store logins. I discussed the lack of encryption, how easy it is to share, access control methods, lack of audit trails, and backup risks like storing it in a network share or cloud storage. We made it very clear that everyone must use our paid Password Manager solution or face consequences.

2

u/binaryhextechdude Jul 10 '24

100% against this no matter what excuses they come up with. As someone else mentioned a while back on a similar post, if someone views illegal content such as child sexual abuse material ie photos and more than one person has the password? Well good luck proving who it was.

Similar vein, what if a highly confidential document or slide deck was sent to a competitor? How can they prove it was end user John and not admin Steve who sent it?

2

u/upnorth77 Jul 10 '24

This is common....20 years ago.

2

u/nesnalica Jul 10 '24

i hate spreasheets with passwords

u cant even find anything

2

u/GrimmBro3 Jul 10 '24

Someone's going to Mitnick that spreadsheet, then it's game over. Guessing they don't practice least privilege access, if non-admin users have access to that sheet. They need to use Active Directory. And your wife should consider finding a different place to work.

2

u/adamchri Jul 10 '24

No. Just no.

2

u/jmnugent Jul 10 '24

You should never be storing passwords in a spreadsheet. No. Absolutely not.

I have worked in places before were we asked for User Passwords to do things,. mostly because what ever configuration we were trying to change was a User-profile based change, so there was on other way to do it other than being logged in as the User.

Although we did eventually move away from that habit,. and any time a User-specific change needed to be made, we just forced the User to physically be there to type in their own Password.

In most modern workplaces,. you should have:

  • automated configuration tools.. so that whatever needs to be installed or configured can be push (silently, remotely) down to a Users machine.

  • or if it's a User Profile configuration of some kind.. have KB articles or instructions you can send a User so they can do it themselves.

None of that should require anyone to share passwords.

→ More replies

2

u/edcrosbys Jul 10 '24

This is beyond idiotic. However, if it's policy to give them the password, do so. If you "forget" to update them after you change the password, oops. You'll know they tried to access it when they reach out.

2

u/SamuelVimesTrained Jul 10 '24

Solution is "simple"

  • Log on with provided password.
  • Give password to this 'admin'
  • change password

And, if you get hit by the bus - HR/Legal and IT can reset the users password if they really need access to that account, so honestly, that argument is bogus, and that setup is totally asking to be abused.

2

u/notHooptieJ Jul 10 '24

<facepalm>

you dont need the user password for any of that. NONE OF IT!

Reset it - TAPS in, setup, test, send them a reset link.

The only reason to have everyones passwords is if you want freedom from oversight to be nefarious.

2

u/proletariate54 Jul 10 '24

That's fucking unacceptable.

2

u/edifus Jul 10 '24

Admins absolutely do not need your password to access accounts, or to test if everything works...

2

u/thejohnykat Jul 10 '24

Every security muscle in my body just twinged.

2

u/Thecardinal74 Jul 10 '24

Local admin accounts exist for a reason. Their it dept is shit

2

u/ScottIPease Jack of All Trades Jul 10 '24

For me I don't want the passwords, I can change them, remove them, block people from login, I don't want the risk and can do all the above in less than a minute.

The only person that knows the password is each user, and many users do not even know their passwords, we set it to log in automatically and forget it.

2

u/Recalcitrant-wino Sr. Sysadmin Jul 10 '24

RED FLAG!

2

u/Happy_Kale888 Sysadmin Jul 10 '24

 An external guy is managing this environment

No he is not....

2

u/reaper527 Jul 10 '24

time for her to find a new job. that would be completely unacceptable.

even their reasoning isn't sound if the person managing the password has the slightest bit of competence, as it's trivial to reset a user's password if necessary. i'd "accidentally" write the wrong password on the paper for the short term.

i explicitly tell people NOT to give me their passwords. don't tell me, don't write them down, i don't want to know them. if i need access to an account, i'll reset it and then give them the new pass while setting a "change on next log on" flag.

2

u/Humble-Plankton2217 Sr. Sysadmin Jul 10 '24

As long as a local admin is set up and that pw documented, there is no reason for him to have their passwords other than the convenience of signing in to work on them if they are AFK and it's locked.

I worked somewhere like this in the past, briefly. Changing your password and not giving it to IT was a write-up. It was solely for the purpose of IT being able to work on your computer when you weren't at your desk. Same place also used cracked licenses for software that had to be re-cracked every 30 days. I looked for another job the minute I realized what kind of op they were running. Outskees.

At the end of the day your workplace owns your data, you have no right to privacy on your work PC. But there are good practices and bad ones and this is definitely a bad practice.

2

u/Sushigami Jul 10 '24

Think of a legal case.

A user did $BAD_THING_COST_MONEY. How do you prove it was actually the person who owned the user account that performed the action? It could be literally anyone on any team, to say nothing of other persons that managed to get hold of the excel.

2

u/BobTheOldFart Jul 10 '24

Maybe you could use this analogy to explain how bad this idea is:

Require all the employees to give a spare car key to the front office. These keys will be hung on a pegboard in the office somewhere, just in case anyone needs to get something from another employee's car while that employee might be in a class, meeting, etc. Or if someone wants to go rob a liquor store during lunch without using their own car.

Ask how that policy would go over.

2

u/LosAtomsk Jul 10 '24

Yes, it's a huge security risk - spreadsheets are no place to store passwords. Moreover, if someone leaves or passes away, an admin can reset that password anyway. From my experience, that's not even necessary, the account is usually converted to a (free) shared mailbox, and the license is removed, while a forward to another person is set up to catch any e-mails that still come in.

In some cases, the account is assigned read-and-manage rights to someone in management so they can still access past e-mails, if necessary. Like others have mentioned, if non-admins can consult this spreadsheet, there's really no control of who is doing what. In the worst-case scenario, everyone with access to those passwords could be liable. It's terrible practice.

2

u/Fallingdamage Jul 10 '24

Adm1nI5anA$$hol3##7

2

u/hawksdiesel Jul 10 '24

What the actual F ?!?!

2

u/TimmyzBeach Sysadmin Jul 10 '24

That would be a big f*** no.

2

u/l0st1nP4r4d1ce Jul 10 '24

Let me be clear. As a datasec guy for 15 years.

YOUR ORG WILL BE COMPROMISED with this mindset. Not if, when.

This is so far below best practices, I am honestly gobsmacked.

2

u/FriendlyRussian666 Jul 10 '24

Whoever made this up should be sent for mandatory cyber sec training, and should change their ways, or be fired.

2

u/net1994 Jul 10 '24

Tell your wife to RUN. And FAST!

2

u/Efficient_Will5192 Jul 10 '24

My take on it is either the admin or management (Probably both) are not qualified to do their jobs.

2

u/apeters89 Jul 10 '24

 Isn't this a huge security risk?

Yes.

2

u/GreyBeardIT sudo rm * -rf Jul 10 '24

This is stupid from any perspective. There is a reason Admins can change passwords, but not see them. Assign 2 admins, either can change passwords, move on.

His mgmt should try this horse shit in healthcare and see how far it gets them. smh.

2

u/spin81 Jul 10 '24

What's the point in having a password if it's not private?

I don't know if you're being rhetorical or not so I'll just say it: there is no point in having a password if it's not private.

Apparently this is a requirement by the management

I can see how that can make someone feel they have no choice but to do it, but on the other hand I feel stopping management when they're about to do something colossally unethical and unsafe is something that should at least be attempted.

2

u/Practical-Union5652 Jul 10 '24

This admin is a poor idiot and should be arrested

2

u/imnotabotareyou Jul 10 '24

When I started my current job I was told by management to do this.

I bet it’s way more common than people think.

I told them it was fucking stupid and wrong but they had some bs “we need access just in case!!” and were fucking deaf when it came to pw resets etc.

Whatever, I store the passwords.

But they’re the random initial ones and they are forced to pick a new password upon first log in.

I don’t ask about those passwords ever.

2

u/Horrigan49 IT Manager - EU Jul 10 '24

Security risk 12/10 And privacy breach 86/10 on a level of "you would be fcked anywhere in EU" with a fancy fines.

2

u/Ok_Presentation_2671 Jul 10 '24

Why bother wrecking your brain? Management sucks

2

u/VitualShaolin Jul 10 '24

It's a compromise waiting to happen, I'm a pentester and always test for password cred information in 365 after gaining creds. It's also a compliance issue as the accounts are effectively shared. Then there is the incompetence to consider that they are unaware of correctly managing user accounts.

2

u/aeveltstra DevOps Jul 10 '24

Woah. Major breach of trust here.

What should happen, is that all computers have a separate admin account with a password known to the admin group, only. Store it in a vault (both physical and digital).

Nobody but the admin group should have access, including the owners.

2

u/come_ere_duck Sysadmin Jul 10 '24

To quote Ollivander, "Nope! No! Definitely not!". Huge red-flag. In all my years in IT, if I ever need to test that everything is set up correctly, I just set a generic password for the user and then reset the password to one of 365's auto generated passwords with the "require user to reset password" option ticked. That way, the user signs in, has to reset their password, and everything is already tested and working.

If you are going to store user passwords, it should at least be in something secure like ITGlue or similar. But ideally, you should never be storing user passwords. If they forget it, you reset it for them.

Any time I have ever needed a user's password for troubleshooting etc, I usually reset their password and let them know that they'll need to reset their password again afterward. It's a win win, as it allows me to use an easy password I'll remember and it forces them to update their password.

2

u/fishermba2004 Jul 11 '24

This was fairly common 20+ years ago. Users liked the convenience of people being able to adjust things on their profile. Remote access tools weren’t nearly as good as they are now. neither were the tools. I’d be willing to bet this IT guy is really old and just hasn’t kept up.