LATTE (course materials)
Library OneSearch (library collections)
(replacing LouFind in fall 2013)
LouFind Library Catalog
(will be replaced by Library OneSearch in fall 2013)
(databases and articles)
eJournals A-Z (online journals)
Research Guides (subject guides)
Account Tools (passwords & more)
Get Help! (technology and library)
Best Practices for Remote Access to SystemsLoading
Where possible, access should use protocols which require the remote server to authenticate to the connecting user as well as vice versa. This two-way authentication helps protect against man in the middle attacks. For example, SSH tracks host keys, while RDC contains no server authentication mechanism.
Access must use cryptographic authentication rather than password authentication wherever possible. For example, SSH private keys and USB smart cards must be used instead of passwords.
Users must protect their cryptographic authentication credentials with a password known only to themselves. This password must be new and not used for any other purpose, especially for their UNet account.
Users must limit the exposure of their cryptographic authentication credentials.
If the user employs an external device such as a USB smart card, he should keep one copy of the credential on that device and a single back-up copy on non-network accessible storage such as a USB flash drive.
Software certificates, etc.
If the user does not employ an external device, he should keep one copy of the credential on each of his personal computers and a single back-up copy on non-network accessible storage such as a USB flash drive. The user must maintain the security of all personal computers storing a copy of his credentials.
Where possible, users' credentials should be used for access instead of direct access between servers.
Direct access between servers must only be used in the following situations:
Direct access between servers is appropriate for automating non-interactive processes that involve more than one server.
Direct access between servers is appropriate in cases where the design of the servers is such that compromising the trusted server entails access to the trusting server.
Limitation of access
The extent of the access between servers must be limited as much as possible. This limitation includes commands or functions that can be performed as well as the user context in which the commands run. For example, if the only essential function is to transfer files, then no further access should be allowed.