Working with Systems that Prevent Credential Sharing
Some applications prevent credential sharing by disconnecting a user from all other locations when they sign in.
When working with a system that does not allow login sharing, special care must be taken so that a user does not inadvertently log in and disconnect the Universal Migrator.
You should do the following:
- Request two administrator-level login credentials.
You need two because if you use the same login credentials to access the system during the process, you will disconnect Universal Migrator.
- One should be used by the Universal Migrator application for extracting / injecting data.
- The other should be used by you if you want to login to the system during the extraction / injection process.
- Remove Two-Factor Authentication from Both Logins
- Change the password on the logins so that only you know the password. This prevents another user from logging in under the account and disconnecting you.
Related Articles
Working with Hostile Providers
Many providers to law firms treat their customers with honesty and integrity, however, occasionally you may encounter hostile / predatory providers. A hostile provider is one that will actively work to make it difficult for the client to leave. This ...
Working with Hostile Providers: Notice of Departure
When working with a hostile provider, we first recommend reading the instructions in this article. If the relationship has sufficiently deteriorated, you may consider using this email template to help ensure a smoother transition. Never mention the ...
Best Practices for Working as a Subcontractor
The following is our guidance on how to handle situations where you are requested to subcontract to another organization. (Almost) Never Subcontract Sometimes an IT department or another consultant may want to hire you to perform work for them ...
Working With Historic Users
To Preserve or Merge? When a client moves into their new system, what do they want to happen with data tied to former employees? Do they want to keep it and attribute it to the original user? Do they want to attribute it to another user? Or do they ...
Postal Transfers
In some situations, it may be necessary to transfer data via the postal system. This article represents the best practices for doing a postal transfer of data. 1. Make Two Copies of the Data Because postal systems can be unreliable, you should plan ...