Setting Up LastPass & Duo

This weekend I decided that it was finally time to give LastPass another try. One of my long term concerns with LastPass was the need for a cheap and conveinent 2-factor authentication solution.LastPass_Duo_Logo When I originally looked into LastPass (a long time ago!) the only real option was a YubiKey. This key not only cost money but also used 1 of my very valuable USB ports. So I’m glad to report that LastPass now offers a variety of 2-factor authentication and 2 step verification options. In exploring LastPass’ 2-step verification options I saw that they supported Duo which brought a smile to my face because not only is Duo free, but it’s also already installed on my iPhone. So I promptly configured Duo with LastPass and wanted to share how simple that process is.

Step 1: Sign-up for LastPass

The first step in this setup is obviously to get a LastPass account. So head on over to LastPass.com, create a new account and be sure to choose an ultra-sophisticated master password. Remember, once you’re done with this guide this will be the only password you need to remember so you can afford to use all of your brain power!

Step 2: Sign-up for Duo

Bounce over to Duo.com and make a new Duo account. Even the free account will be perfectly fine for use with LastPass.

Note: I highly recommend using a Duo Push as your preferred verification method.

Read More

Change the Port CommVault Uses

Inf0commvault-systems-logo

In some cases it may be necessary to change the port that the CommVault agent uses. By default the agent uses both port 8400 and 8402.

This can be verified by issuing the netstat -aob command on the client.

Steps

  • RDP to the client
  • Open RegEdit
  • Browse to HKLM\SOFTWARE\CommVault Systems\Galaxy\Instance001\Session
  • Change the nCVDPORT or nEVMGRPORT key to the new port you would like to use

CV_Ports

 

 

 

 

 

 

 

 

  • Restart the CommVault services on the client
  • Verify the changes with the netstat -aob command.

Note: It also appears the port(s) can be changed during the installation of the client if you push the software from the CommServe.

Import a Public SSH Key in 3PAR CLI

3PAR_LogoInfo

This page documents the process of importing a public SSH key into the 3PAR CLI. This will allow for private key authentication instead of password based authentication.

Prep-Steps

  • Create a private/public key.

Steps

  • Open an SSH session to the 3PAR CLI
    • Login with the username that will use the SSH key for authentication
  • Issue the following command:

setsshkey

  • Copy the contents of the public key that was created in the prep-steps.
  • Paste the contents into the SSH window
  • Hit enter twice