Re: Lee Downing
Would you like me to mirror a post I've just made on another site?
I do not need to be a paying customer of EMC to hold the opinion that their system is stupid if it's that unconfigurable (and where something as simple as changing an IP address might do anything that can't be undone by changing it back, or telling other systems about the change). If their systems are really that fragile that those IP's cannot be changed at will to suit the environment they are stored in (with suitable downtime and configuration, obviously), then it makes me worry that not only are they scamming the support ("Change a value in a configuration? Gosh, you'll have to pay us for that!") but that their products are not built to be customised in any way, shape or form, and also that they are doing things that are incredibly stupid to do (e.g. hard-coding addresses prior to shipping).
In the same way that I do not need to be a paying customer of Ferrari to think that their cars are gas-guzzling, or a paying customer of OnLive to express the opinion that it was set to fail from the start. Otherwise, opinions would be few and far between and only made by people with a vested interest in that opinion not making them look stupid for buying the product/service in the first place.
This is either a support-scam to change money to change a value in a box somewhere, or a complete ineptitude of design that doesn't take account that someone with appropriate permission, somewhere, sometime in the future might want to change IP's or even authentication on their devices. It would also make me wonder what happens when technology moves on - say you're starting an IPv6 migration. Are you then forced to use the addresses programmed into the device or pay someone to add that single configuration value for you because you didn't have it to hand when you bought the product?
Whatever way you look at it, it's ridiculous. That's not to say that it's not normal in some industries (a certain database vendor comes to mind) but that doesn't make it any less ridiculous.
"When creating subtenants, there is no selection box for the Authentication Source when using remote authentication. So, the subtenants are set to an Authentication Source that is not valid."
Suggests that a non-valid Authentication Source, which cannot be deleted, is present. And I would suggest that it no longer operates as an Authentication Source if it cannot be removed (security), or if it does not function (technicality).