| ▲ | ChocolateGod 2 hours ago |
| > It's nuts Windows is still the go-to for anything these days despite everyone knowing what a parasitic Linux still doesn't have anywhere near as nice and cohesive as Group Policy, Active Directory etc. Plus you can pay Microsoft to host it all for you on Azure. |
|
| ▲ | llarsson 2 hours ago | parent | next [-] |
| Imagine what can happen if the French and other governments would start pouring all the money into developing that further in the open, rather than just giving it all to Microsoft instead? |
| |
| ▲ | JustFinishedBSG an hour ago | parent | next [-] | | Most of the cost (to the government) for Windows is "support" (in a very general sense) and that cost isn't disappearing with Linux. Especially since it is easier to find badly underpaid (and not particularly competent) Windows sysadmins than it is to find badly underpaid Linux admins. | | |
| ▲ | fao_ an hour ago | parent [-] | | Ok but the license fees are, what, 50 quid? times say, 3k or 30k people? A 150k or 1.5m injection into the linux ecosystem to develop those would pay for a _lot_ of developers and a _lot_ of developer time. | | |
| |
| ▲ | ethbr1 an hour ago | parent | prev | next [-] | | > Imagine what can happen if the French and other governments would start pouring all the money into developing that further in the open You'd get a clusterfuck of a consensus spec, then they'd all get pissed off and develop their own incompatible versions anyway? Have you seen international projects without strong, centralized leadership? | | |
| ▲ | kakacik an hour ago | parent [-] | | I have worked on things like PSD2, a well oiled government-led machine that just works. There are some dysfunctional things, then there are things working perfectly fine. You need to update your notes its not 90s. | | |
| ▲ | ethbr1 15 minutes ago | parent [-] | | Credit where credit is due, I think the strong centralization of the EU administration has made for better pan-European requirements and software. Sometimes the perfectness of the product is less important than the fact that there was one opinionated decider. |
|
| |
| ▲ | everdrive an hour ago | parent | prev | next [-] | | They'll start pulling Linux in a direction that suites them, which will potentially be at odds with the preferences of open source software enthusiasts. | | |
| ▲ | dbdr an hour ago | parent [-] | | They might have an effect in the development of an office suite, possibly of a desktop environment or one specialized Linux distribution. Nobody will be forced to use those specific ones if they don't like them. There are plenty of options in the Linux world. |
| |
| ▲ | orochimaaru an hour ago | parent | prev [-] | | Why haven’t they done it yet? I just think they’re incentivized enough for it. | | |
| ▲ | sph an hour ago | parent | next [-] | | Because until literally a year ago, the country that hosted Microsoft was one of France's most trusted allies. It takes time to find a suitable replacement to a global monopoly. | | |
| ▲ | pulse7 an hour ago | parent | next [-] | | It looks like the president - which was a businessman - will make a huge damage to American IT businesses. And IT stocks dominate the S&P 500, comprising roughly 1/3 of the index's total market capitalization... Good luck America! | |
| ▲ | gunsle 32 minutes ago | parent | prev | next [-] | | Gotta love anti America Reddit tier fear mongering | | |
| ▲ | sph 23 minutes ago | parent [-] | | You know about Europe from Reddit subs. I know about Europe because that's where I live. We are not the same. |
| |
| ▲ | orochimaaru an hour ago | parent | prev [-] | | Not really. I mean Trump has amped the rhetoric, but there have been no new laws passed. The privacy threats were always there. | | |
| ▲ | pjc50 an hour ago | parent [-] | | Law is irrelevant under the power of the gun; it was the threat to invade Greenland and the threat to leave NATO which have triggered this. (people keep saying things like "only Congress has the power to declare war"; that may be technically true, but a war declaration is a piece of paper, and practically the authorization of force is at the personal disposition of the President) |
|
| |
| ▲ | nixass an hour ago | parent | prev [-] | | > yet Best time to start doing it was yesterday.
Second best time to start doing it now.
They are at "now" step. |
|
|
|
| ▲ | pjc50 2 hours ago | parent | prev | next [-] |
| > Linux still doesn't have anywhere near as nice and cohesive as Group Policy, Active Directory etc. Isn't it about time someone developed one? The foundations are there; you can imagine an organization deploying laptops with, say, Ansible, and not giving users root on them. LDAP sort of matches the old capabilities of AD, but not completely. There's even a "SAMBA as fake domain controller" mode. Ironically what it needs is a product or service which organizations can pay to take the problem off their hands. But then people get stuck in never paying for anything in the open source world. |
| |
| ▲ | xorcist an hour ago | parent | next [-] | | > Isn't it about time someone developed one? Honest question: Why? If you want a Windows-like environment, run Windows. I get this all the time when people ask about a Linux equivalent for something, and aren't really satistied when it doesn't work or look the same. Linux isn't a clone of Windows. Linux comes from an older heritage, and has a unique culture. You are in for a hard time if you want to use Linux like you would use Windows. That's a suboptimal experience, at best. That said, of course Linux should be easy to manage. But Windows is from a single corporate entity, of course their management tools will be different. It used to be unix admins that laughed about people using Windows as servers. The culture around Linux is one of scriptabiliy where even the user interface, the basic shell, is one where every command is inherently a script. That's why management on Linux looks like Ansible and OpenSSH, not like Remote Desktop and Group Policies. You could write something like Group Policies for Linux of course, but it wouldn't be a complete solution so people would just continue using Ansible, OpenSSH, and the respective package managers. | | |
| ▲ | pjc50 an hour ago | parent | next [-] | | > If you want a Windows-like environment, run Windows. One of these questions where we, those doing the discourse, need to pick apart what the word "you" refers to here. In this context, it is national governments, who have started to fear that there may come a day when they are not allowed to or able to or safe to run Windows. That gives rise to the question, "how can we get a system that minimizes the disruption of migrating away to Windows?" Ultimately it's not about specifically wanting AD or GP as technologies, either, but the things they enable: seamless single-sign-on across an organization, and management of software security and updates across a fleet of desktops. (possibly the thing that fills this hole is simply a fleet of consultants which go around explaining things to CIOs!) | | |
| ▲ | xorcist 38 minutes ago | parent [-] | | Right, I see where you are coming from, I still want to make the stronger argument that we should not strive to re-work Linux in Windows' image. Most such initiatives, like gconf/dconf, have severely degraded the desktop experience. I have some experience at places where Linux are run on desktops at scale, but they all have in common that these are engineers for whom Linux is the better experience to begin with. It's not like that for administrative staff and management. And as much as I'd like to tell people to use Prezi instead of Powerpoint, and Markdown instead of Word, sometimes Libre Office is the best answer. We have to be practical. Still, I feel that too often it is engineering that has to use tools intended for administrative people. Once in a while, they other way around may not be that bad. For a modern workplace, where smartphone and cloud based applications rule, the traditional Windows tools like AD and GP can only do so much. You also need MDM tools, and something like SAML. If you are looking for an out-of-the-box tool that can manage both Linux and Windows clients, Red Hat has FreeIPA. It's not AD, but it goes beyond that capability. |
| |
| ▲ | ethbr1 an hour ago | parent | prev [-] | | What's the Linux version of AD and group policies? (honestly curious; linux sysadmin at scale not my day job) | | |
| ▲ | xorcist an hour ago | parent | next [-] | | I don't know. What's the Windows equivalent of dpkg (from 1993) and ssh (from 1995)? Still nothing, three decades later. Not because Microsoft engineers couldn't do it, of course, but becasue they didn't want to. It doesn't fit the Windows model. They did recently adopt SSH, but that was because they want to use Windows in cloud-like environments, where expectations are set by Linux-style tools. By the time Windows got to the point where it even could be centrally managed in any reasonable fashion, Linux environments was routinely run an order of magnitude larger still. There is a reason why the whole cloud runs Linux. Anything else is a rounding error. That's because Linux is inherently so much less work to manage at scale. If something like Group Policies would somehow be accepted by the Linux community, that could only be a step backwards. A well run Ansible or Puppet or similar environment works on a completely different scale. | | |
| ▲ | fainpul 40 minutes ago | parent | next [-] | | > What's the Windows equivalent of dpkg (from 1993) and ssh (from 1995)? PowerShell PackageManagement [1] and Remoting [2] [1] https://learn.microsoft.com/en-us/powershell/module/microsof... [2] https://learn.microsoft.com/en-us/powershell/module/microsof... | | |
| ▲ | xorcist 15 minutes ago | parent [-] | | They are not exactly equivalents, but that's not the point. I try to expand on this answer in the sibling comment. What's important to notice however, is that the oldest of these are from 2009. At no time in the intervening 15 years (!) did someone say "Windows is unusable for desktops because it is not manageable". |
| |
| ▲ | kklimonda an hour ago | parent | prev | next [-] | | Isn't WinRM/PowerShell/RDP equivalent of SSH, and dpdk/apt-get is basically .msi with group policies for installation? This has been there for decades probably? Group Policies also allow you to enforce things like browser configuration (proxy, homepage, search engine etc.) wallpapers, screen locks etc. Can this be done on Linux? Honestly, I have no idea - I think gnome with gsettings/dconf can do that, but can KDE? | | |
| ▲ | xorcist 22 minutes ago | parent [-] | | That's the point I want to convey is that while there are tools like MSI on Windows, many years after Linux had dpkg, it's not the same thing. On Linux the package manager rules the filsystem and keeps a complete database of which package owns which file. There are no exceptions, not on the parts of the filesystem where the package manager rules. Even the operating system itself and all patches is handled by the package manager. That's first and foremost a cultural difference, not a technical. Sure, there's nothing to prevent a Linux vendor to write "install scripts" that copy files willy-nilly across the file system, and many vendors have done this but always with disastrous results and since Linux people hate it, those products are either repackaged or stored in a separate directory far away from other files. This means installing software at scale (any number of systems), or the question how to cleanly uninstall software it not a question you should ever ask in a Linux environment. The questions you should ask are different in a Linux environment. That is why the tools look different. Tools like gsettings are culturally alien to the unix world. Instead, home directories are seeded with dotfiles. And dotfiles are kept in version control. Yes, that means that unix people can't answer the quesion how to lock the proxy settings so the user is unable to change them. Instead, should a sensitive system require it, they would instead manage by policy and disallow any traffic outside said proxy. |
| |
| ▲ | ethbr1 19 minutes ago | parent | prev [-] | | I wasn't curious about those things. I was asking about AD+GPO, because I was interested. |
| |
| ▲ | kklimonda an hour ago | parent | prev | next [-] | | Lixnux version of AD is FreeIPA, with group policies translating to dconf - at least that was the way "enterprise" linux vendors (like RH or Canonical) were moving towards. Now, how well is dconf integrated with all the software you want to run is another thing (it was done by GNOME, and ignored by KDE), and whether this is still the way they are all moving is yet another question but the infrastructure was being built. | |
| ▲ | pastage an hour ago | parent | prev [-] | | The concept does not really exist it is a Windows thing. You could call Puppet or other config managements group policies, but Linux is not a monolith so it is more organic. |
|
| |
| ▲ | mbreese an hour ago | parent | prev | next [-] | | Well AD is just a really opinionated LDAP/Kerberos setup, so you’d think that there would be something that Linux could do. But when you’re talking about enterprise management of thousands of devices, you need some kind of consistent security policy management. That requires running OS software that accepts remote policy management, which is a very specialized configuration and not just “vanilla Linux”. You can get really far with LDAP, but I’ve only used it for remote accounts, file shares, and sudoer config. I’m sure there are more policy configurations that would be possible with a more advanced tool. I suspect the RHEL world has something to offer here, but I’d love to see a more general and commonly supported solution developed. It would make Linux more of an option for enterprise managed endpoints. But, I agree with you - for an enterprise customer, this really needs to be some kind of paid/supported product. I wouldn’t want the French government to rely on some scripts that worked on my small cluster. | | |
| ▲ | pjc50 an hour ago | parent [-] | | > That requires running OS software that accepts remote policy management Every Linux system that supports SSH potentially "accepts" remote management! The challenge is just putting it into a framework. | | |
| ▲ | unbrice an hour ago | parent [-] | | The gaps: Pull VS Push, Imperative vs Declarative and Discovery being hard. |
|
| |
| ▲ | everdrive an hour ago | parent | prev [-] | | Group policy is an annoying pain. Yes, there aren't many better options out there, but it's not as if group policy is _good_. |
|
|
| ▲ | ninjagoo an hour ago | parent | prev | next [-] |
| > Linux still doesn't have anywhere near as nice and cohesive as Group Policy, Active Directory etc. Enterprise environments use a number of tools like Powerbroker, UCS, Centrify/Delinea etc to bind linux machines to active directory and manage identity and access through active directory. This is for mixed environments with both Windows and Linux machines. For pure linux environments, there are a number of tools like FreeIPA/IdM, Samba AD/DC (for A/D like management), and OpenText's eDirectory for the current version of Novell's eDirectory counterpart to A/D. They all provide centralized user/host/policy/access management. Since Entra+Intune are the recent MS products, cloud-based equivalents are Jumpcloud+Fleet, Okta PAM, FreeIPA/IdM. |
|
| ▲ | forinti 2 hours ago | parent | prev | next [-] |
| Yes, liberty comes at a cost. It seems that convenience is no longer the main motivator for many people. |
| |
| ▲ | lionkor 2 hours ago | parent | next [-] | | Convenience comes as a result of mass market adoption, for products for which convenience was not already the main selling factor. Look at cars; they were kind of difficult to drive and maintain 60 years ago, now they're super convenient to drive and maintain as you essentially just press buttons and look at screens to get all needed information about the car and drive it. It's probably something like "inception -> adoption -> convenience". For Windows it was the same, was it not? It wasn't absolutely convenient to use, it was just better (in terms of usability and features for the average consumer), and convenience came after (Windows XP, Windows 7). Sadly the functionality degraded, and now all that is left is convenience. | |
| ▲ | veber-alex 2 hours ago | parent | prev [-] | | lol "liberty" as if you are fighting to free slaves or something. Europe doesn't want to depend on US infrastructure, that's the only reason to do this. Nobody cares about Linux "freedom" or open source. | | |
| ▲ | pjc50 2 hours ago | parent | next [-] | | Freedom from suddenly being cut off is potentially important. | |
| ▲ | cgio an hour ago | parent | prev | next [-] | | If you don’t depend on someone that’s freedom. | |
| ▲ | mechoblast an hour ago | parent | prev [-] | | If your email was forcefully terminated would you call that an infringement on your freedoms. |
|
|
|
| ▲ | Bayart an hour ago | parent | prev | next [-] |
| The primitives are there and they're solid, beyond that it's "just" architecture and integration work. Hopefully the French government will be rational with this (I believe the time and financial constraints will for it to be, we're broke and we lack time) and they won't fall into the trap of trying to internalize every bit of the platform. A good example of that would be what happened with Docker. Off the top of my head cgroups, namespaces, seccomp, overlays and capabilities had been around for a while before it got rolled up in a nice utility in 2013 and opensourced in 2015. Hence the containerization movement.
Solaris zones and FreeBSD jails were nice but they always were let's say a bit too bearded. |
|
| ▲ | Zigurd an hour ago | parent | prev | next [-] |
| Personal computers were used in office environments long before the technologies to make them administer-able as if they were a mainframe. Before blindly jumping in and reproducing those technologies, better to ask why they emerged in the first place. Most workplaces don't have strict bans on personal mobile devices, and some of the ones that do, don't have the kind of physical perimeter defense that can detect people getting lazy about whether or not they carry their personal mobile devices into the workplace. That makes perimeter defense into security theater anyway. We need a rethink about what we are guarding against and how we're doing it. |
| |
| ▲ | ethbr1 an hour ago | parent [-] | | > Most workplaces don't have strict bans on personal mobile devices If you're talking about select work apps on your mobile device, sure, but that's limited attack surface. If you're talking about employers who let unmanaged mobile devices hop on their internal network... I've never seen that. Maybe at a hypothetically perfect zero-trust shop? | | |
| ▲ | Zigurd an hour ago | parent [-] | | I've seen a lot of un-seriousness about security. One that's easy to spot is old unpatched IP phones that aren't segregated on the network. I've given demos at companies that are serious, where a device I accidentally left behind caused an urgent search of every room I had been in. Security didn't have to be told which rooms those were. | | |
| ▲ | ethbr1 22 minutes ago | parent [-] | | You likely know better than I, but I've always had a weird intuition that enterprise IT security is bifurcated into "Leaders who understand compliance+details" and "Leaders who confuse compliance for details" with very different results. And I get it's extra work, but I've seen some weird "But if you'd just built this a bit differently, you would have gotten all these free security bonuses to your posture" gaps. Imho, a huge part of the problem is invisibility. I'm firmly of the belief the US government should be running scans on entities in regulated industries (defense, healthcare, utility, telecom) with regulated redress of any findings. Trusting private industry isn't working. |
|
|
|
|
| ▲ | oneplane an hour ago | parent | prev | next [-] |
| It does, it's called FreeIPA (or RedHat IdM). The only GPO parts it doesn't do are those that are not related to policy in the IAM sense (i.e. configuring some application related thing). There's other systems for that, just like on Windows you practically never run GPO without anything else. On top of that, you can pay RedHat or Canonical to host it all for you on any cloud or non-cloud. |
|
| ▲ | otikik an hour ago | parent | prev | next [-] |
| Must be the only nice and cohesive parts left. Perhaps they have not figured out how to put ads on AI on it because it doesn't have many users. |
|
| ▲ | Levitating an hour ago | parent | prev | next [-] |
| > Linux still doesn't have anywhere near as nice and cohesive as Group Policy, Active Directory etc. I am sure that's something the Gnome Foundation could figure out if they had a grant to do so. |
| |
| ▲ | tremon an hour ago | parent [-] | | Putting it in the hands on the GNOME foundation will just result in a lot of new soon-to-be-mandatory APIs and numerous configuration variables with only one allowed value. |
|
|
| ▲ | ndriscoll 2 hours ago | parent | prev | next [-] |
| I've never understood the management thing. People manage fleets of Linux machines all the time. What does group policy do that e.g. nix or ansible don't? |
| |
| ▲ | jodrellblank 2 minutes ago | parent | next [-] | | Group policy just sets registry keys. That's nothing you can't do any other way. The important bit is the inertia of 30 years of Windows subsystems and integration with Active Directory and 3rd party Windows ecosystem software all being written to expose internal config and look to registry keys for the settings. For the first part, Group Policy (GPO) can set the screen to lock after 2 minutes of inactivity, say, which works because there are Windows subsystems built to look for a reg key for their config, and policy templates exposing that config in the GUI management tools. Or group policy configures which security group can "logon as a service" which works because Windows has system-wide and domain-wide pervasive Access Control Lists (ACLs). GPO configures that Background Intelligent Transfer Service (BITS) should limit its bandwidth use, which works because Windows Updates use BITS. Or sets the machine-wide SSL cipher order, because Windows software uses system-wide schannel not OpenSSL. Or GPO sets what your default printer will be and that's only useful because decades of 3rd party Windows software was written to use the standard Windows printer dialog, or User Documents path, or whatever. For the second part, Active Directory is a tree-shaped organization tool; in this screenshot[5] that I quickly Googled, see the tree on the left has a folder named "Sydney" and below that "Sydney Users", this customizable structure lets business IT people organise the company computer accounts, user accounts, and security groups by whatever hierarchy makes sense to their needs - e.g. by country, office, team, department, building floor, etc. Then Group Policy overlays on that structure and is composable, e.g. in this basic screenshot of the group policy manamement GUI[6] it's showing at the bottom a list of all group policy configurations that have been made in a domain such as "Block PowerShell", and higher up it shows the policy "PsExec Allow" has been linked inside the "ADPRO Computers" folder. So users and computers in that folder in AD, will get those policies applied. In screenshot[7] you can see a basic example showing corporate computers getting machine-wide settings, corporate users getting user-level MS Office config, and Executives get settings that nobody else gets. If you apply more than one GPO to a folder, the users/computers will get the all the policies combined. You can filter GPOs on a case-by-case basis to build patterns like "apply this machine-wide policy to all computers in the Sydney folder which are members of the WarehouseComputer security group" or "apply these logon-settings to employees in New York who are members of Finance and logging onto a laptop". 3rd party programs can release XML files which plug into the GPO management, and the programs were written to expect to be configured by registry keys so they can pick up those settings; there are templates for configuring FireFox[1], Chrome[2] Adobe Acrobat[3], Word, Excel, Office[4], VMWare Horizon, Lenovo Dock Manager, Zoom, RealVNC, LibreOffice, Citrix, FoxIT Reader, and so on. The more enterprisey a tool is, the more likely it will plug into that ecosystem. Then all kinds of 3rd party reporting and auditing tools look there to see if your company is compliant with this or that; the whole thing is integrated with Windows' domain-wide ACLs so you can give some admins permissions to view or edit just their regional subset of this. As usual the lockin is not that they do something amazing that nothing else can do, the lockin is that Windows domains have been around in this format for 30 years since NT4 and Windows 2000, and it has huge inertia, familiarity, is deeply embedded in a lot of companies, you can easily and cheaply hire lots of people who know how to use and manage it, you can send screenshots of it to auditors and they understand it, you can buy 3rd party auditing software that will send you a management friendly report with green ticks saying almost everything is fine but you should change this setting for security... [Yes of course you can build your own custom replacement for every single thing, just like you can build your own custom replacement for any software]. [1] https://support.mozilla.org/en-US/kb/customizing-firefox-usi... [2] https://support.google.com/chrome/a/answer/187202?hl=en [3] https://www.adobe.com/devnet-docs/acrobatetk/tools/DesktopDe... [4] https://www.microsoft.com/en-us/download/details.aspx?id=490... [5] https://www.windows-active-directory.com/wp-content/uploads/... [6] https://activedirectorypro.com/wp-content/uploads/2022/09/gp... [7] https://www.varonis.com/hs-fs/hubfs/blog%20posts/Group%20Pol... | |
| ▲ | ethbr1 an hour ago | parent | prev [-] | | Fuse membership and inheritance-based object (in the sense of 'any computing thing or person') ontology with configurability? The insight in AD+GPO wasn't in either thing, but in the +. Each would be far less useful without the other. |
|
|
| ▲ | Spooky23 an hour ago | parent | prev | next [-] |
| This is actually a good time to disrupt that, as Microsoft’s attention is not on windows and Active Directory is slowly moving to Entra, although big enterprises are mostly hybrid. Some places are using Okta for many of those functions too. Trump’s instinctive parasitic slumlord behavior may be enough for the sleepy Europeans to get their shit together. |
|
| ▲ | Lihh27 an hour ago | parent | prev | next [-] |
| that's the catch with gp/ad. for a lot of orgs the hard part is intune/entra now. swapping the desktop is easy. replacing identity and device management is the real migration |
| |
| ▲ | ethbr1 an hour ago | parent [-] | | Doesn't the Azure team own Intune/Entra now? Read: less inclined to give a fuck about artificially protecting Windows desktop. I've no idea what current internal Microsoft org divisions are. |
|
|
| ▲ | kakacik an hour ago | parent | prev | next [-] |
| No non-US government should host anything on azure, or any other US-owned cloud. Thats security and sovereignity 101, or more like 100. Reality with hostile US being as it is. What you list are no showstoppers, and since its a well known topic I cant imagine why some EU-funded effort in say 2 billions over next 3-5 years shouldnt reaolve it once and for all, for entire world. Well invested money. |
|
| ▲ | kgwxd an hour ago | parent | prev | next [-] |
| Even the old companies have moved away from that nonsense. Huge waste of resources. |
|
| ▲ | hug 2 hours ago | parent | prev | next [-] |
| Group Policy and Active Directory are dead, for all intents and purposes. It's now Intune (via OMA-DM), and Entra. Both of those products are about as bad as you might imagine the "cloud" versions of GP & AD might be. They are better, in ways -- no longer having to care and feed for domain controllers is nice, and there's no longer an overhead for additive policy processing, so endpoints only get a single set of policy and log on much quicker -- but for the most part, enterprise management of Windows devices is in a worse place than it was ten years ago. Try to figure out how long it will take an online Intune device to discover a new policy: As far as I can tell the answer is "eventually". There are bandaids for this, because of how infuriating it is, of course, but all time guarantees are basically gone. Ask me a decade ago what an enterprise should do, and my answer would be straightforward: AD, GPO, Exchange. The answer now is not simple. |
| |
| ▲ | mbreese an hour ago | parent | next [-] | | > Ask me a decade ago what an enterprise should do, and my answer would be straightforward: AD, GPO, Exchange. That was also the answer two decades ago. But if AD and GPO are now dead, what killed them and what are the options? Is the problem mobile and BYOD? I’ve been primarily on Macs since that time where endpoint management isn’t much, so there are fewer knobs to fiddle with. In some ways it’s nice in that admins can’t screw around too much with my system. In other ways, I’m sure Macs feel limiting for those in charge of enterprise security. However, most endpoint management feels like it’s written for Windows with Macs as an afterthought for checklist security. Knowing that, I’m happy there are fewer places for dodgy software to be able to interface with the OS. (Edit: added quote to top) | | |
| ▲ | hug an hour ago | parent | next [-] | | It was absolutely not the case two decades ago.
There were no other options for an enterprise fleet, 20 years ago, if the question was asked. If you weren't Google (who never asked the question anyway), the answer for managing 25,000 endpoints was to use Windows devices with Active Directory as the management plane. Anyone doing anything else was in for a world of hurt... and that's why every enterprise ended up on Windows, and why everyone targeting enterprise management targeted Windows -- because that's what the endpoints were already running. What killed AD & GPO was Microsoft, in their bullheaded push toward Azure everything. Instead of listening to what it was that the enterprise customers actually wanted, they designed a system that made sense to them, but to no one else. The original UI was written in Silverlight. It was horrific. | | |
| ▲ | mbreese an hour ago | parent [-] | | No, I meant that Windows AD was still the answer two decades ago. I can see how that may not have been clear - I edited my post to include the quote I was replying to. (You said one decade and I was just extending that timeline back another 10 years.) There was LDAP and Kerberos support for *nix management, but nothing you’d deploy over a thousand end devices. And you’re right, it wasn’t a question that got asked, because there wasn’t ever a second choice - AD was the only option. | | |
| ▲ | ethbr1 40 minutes ago | parent [-] | | > Kerberos I remember it almost being a trope at the time that every Kerberos question thread eventually landed on some subtle / niche incompatibility or edge case. |
|
| |
| ▲ | kgwxd an hour ago | parent | prev [-] | | No alternative, you can't realistically fully control everything everyone does on every device in their possession. It was job security for useless control freaks, the products never should have existed. | | |
| ▲ | ethbr1 39 minutes ago | parent [-] | | Spoken like someone who has never provided computers to non-technical, minimum-wage users. |
|
| |
| ▲ | Tarmo362 an hour ago | parent | prev [-] | | What about offline, to my knowledge Entra and Intune do not work without actual internet connection? |
|
|
| ▲ | XorNot an hour ago | parent | prev [-] |
| Honestly as wide spread as it is, managing group policy sanely is still a challenge I've found - it's very resistant to configuration as code. Linux has a lot of the pieces but is principally lacking a solid distribution system - in particular a big missing component is the network-based SELinux policy distribution system which you can see some hooks in for the concept of a "policy server" which never eventuated. SELinux would be a lot more viable if it had a solid way to federate and distribute policy and has some nice features in that regard (i.e. the notion that networked systems can exchange policy tags to preserve tagging across network connections). |
| |
| ▲ | ethbr1 31 minutes ago | parent [-] | | > managing group policy sanely is still a challenge I've found - it's very resistant to configuration as code Imho, this was historically (and continues to be) Microsoft's Achilles heel. Large parts of the company reflexively wrote features / tooling as manual-first, code-second (or never). In hindsight, what was missing was a Gates-level memo circa 2000 similar to Amazon's API one: all teams are required to build their configurators to be programmatically exposed. Unfortunately, I don't think Ballmer was enough of a technologist (and was likely too distracted) to intuit that path not taken. |
|