sync: Auto-sync from ACG-M-L5090 at 2026-01-26 16:45:54
Synced files: - Complete claude-projects import (5 catalog files) - Client directory with 12 clients - Project directory with 12 projects - Credentials updated (100+ sets) - Session logs consolidated - Agent coordination rules updated - Task management integration Major work completed: - Exhaustive cataloging of claude-projects - All session logs analyzed (38 files) - All credentials extracted and organized - Client infrastructure documented - Problem solutions cataloged (70+) Machine: ACG-M-L5090 Timestamp: 2026-01-26 16:45:54 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
914
CATALOG_SHARED_DATA.md
Normal file
914
CATALOG_SHARED_DATA.md
Normal file
@@ -0,0 +1,914 @@
|
||||
# Shared Data Credential Catalog
|
||||
**Source:** C:\Users\MikeSwanson\claude-projects\shared-data\
|
||||
**Extracted:** 2026-01-26
|
||||
**Purpose:** Complete credential inventory from shared-data directory
|
||||
|
||||
---
|
||||
|
||||
## File Inventory
|
||||
|
||||
### Main Credential File
|
||||
- **File:** credentials.md (22,136 bytes)
|
||||
- **Last Updated:** 2025-12-16
|
||||
- **Purpose:** Centralized credentials for Claude Code context recovery across all machines
|
||||
|
||||
### Supporting Files
|
||||
- **.encryption-key** (156 bytes) - ClaudeTools database encryption key
|
||||
- **context-recall-config.env** (535 bytes) - API and context recall settings
|
||||
- **ssh-config** (1,419 bytes) - SSH host configurations
|
||||
- **multi-tenant-security-app.md** (8,682 bytes) - Multi-tenant Entra app guide
|
||||
- **permissions/** - File/registry permission exclusion lists (3 files)
|
||||
|
||||
---
|
||||
|
||||
## Infrastructure - SSH Access
|
||||
|
||||
### Jupiter (Unraid Primary)
|
||||
- **Service:** Primary container host
|
||||
- **Host:** 172.16.3.20
|
||||
- **SSH User:** root
|
||||
- **SSH Port:** 22
|
||||
- **SSH Password:** Th1nk3r^99##
|
||||
- **WebUI Password:** Th1nk3r^99##
|
||||
- **Role:** Primary container host (Gitea, NPM, GuruRMM, media)
|
||||
- **iDRAC IP:** 172.16.1.73 (DHCP)
|
||||
- **iDRAC User:** root
|
||||
- **iDRAC Password:** Window123!@#-idrac
|
||||
- **iDRAC SSH:** Enabled (port 22)
|
||||
- **IPMI Key:** All zeros
|
||||
- **Access Methods:** SSH, WebUI, iDRAC
|
||||
|
||||
### Saturn (Unraid Secondary)
|
||||
- **Service:** Unraid Secondary Server
|
||||
- **Host:** 172.16.3.21
|
||||
- **SSH User:** root
|
||||
- **SSH Port:** 22
|
||||
- **SSH Password:** r3tr0gradE99
|
||||
- **Role:** Migration source, being consolidated to Jupiter
|
||||
- **Access Methods:** SSH
|
||||
|
||||
### pfSense (Firewall)
|
||||
- **Service:** Network Firewall/Gateway
|
||||
- **Host:** 172.16.0.1
|
||||
- **SSH User:** admin
|
||||
- **SSH Port:** 2248
|
||||
- **SSH Password:** r3tr0gradE99!!
|
||||
- **Role:** Firewall, Tailscale gateway
|
||||
- **Tailscale IP:** 100.79.69.82 (pfsense-1)
|
||||
- **Access Methods:** SSH, Web, Tailscale
|
||||
|
||||
### OwnCloud VM (on Jupiter)
|
||||
- **Service:** OwnCloud file sync server
|
||||
- **Host:** 172.16.3.22
|
||||
- **Hostname:** cloud.acghosting.com
|
||||
- **SSH User:** root
|
||||
- **SSH Port:** 22
|
||||
- **SSH Password:** Paper123!@#-unifi!
|
||||
- **OS:** Rocky Linux 9.6
|
||||
- **Services:** Apache, MariaDB, PHP-FPM, Redis, Datto RMM agents
|
||||
- **Storage:** SMB mount from Jupiter (/mnt/user/OwnCloud)
|
||||
- **Notes:** Jupiter has SSH key auth configured
|
||||
- **Access Methods:** SSH, HTTPS
|
||||
|
||||
### GuruRMM Build Server
|
||||
- **Service:** GuruRMM/GuruConnect dedicated server
|
||||
- **Host:** 172.16.3.30
|
||||
- **Hostname:** gururmm
|
||||
- **SSH User:** guru
|
||||
- **SSH Port:** 22
|
||||
- **SSH Password:** Gptf*77ttb123!@#-rmm
|
||||
- **Sudo Password:** Gptf*77ttb123!@#-rmm (special chars cause issues with sudo -S)
|
||||
- **OS:** Ubuntu 22.04
|
||||
- **Services:** nginx, PostgreSQL, gururmm-server, gururmm-agent, guruconnect-server
|
||||
- **SSH Key Auth:** Working from Windows/WSL (ssh guru@172.16.3.30)
|
||||
- **Service Restart Method:** Services run as guru user, pkill works without sudo
|
||||
- **Deploy Pattern:**
|
||||
1. Build: `cargo build --release --target x86_64-unknown-linux-gnu -p <package>`
|
||||
2. Rename old: `mv target/release/binary target/release/binary.old`
|
||||
3. Copy new: `cp target/x86_64.../release/binary target/release/binary`
|
||||
4. Kill old: `pkill -f binary.old` (systemd auto-restarts)
|
||||
- **GuruConnect Static Files:** /home/guru/guru-connect/server/static/
|
||||
- **GuruConnect Binary:** /home/guru/guru-connect/target/release/guruconnect-server
|
||||
- **Access Methods:** SSH (key auth)
|
||||
|
||||
---
|
||||
|
||||
## Services - Web Applications
|
||||
|
||||
### Gitea (Git Server)
|
||||
- **Service:** Self-hosted Git server
|
||||
- **External URL:** https://git.azcomputerguru.com/
|
||||
- **Internal URL:** http://172.16.3.20:3000
|
||||
- **SSH URL:** ssh://git@172.16.3.20:2222
|
||||
- **Web User:** mike@azcomputerguru.com
|
||||
- **Web Password:** Window123!@#-git
|
||||
- **API Token:** 9b1da4b79a38ef782268341d25a4b6880572063f
|
||||
- **SSH User:** git
|
||||
- **SSH Port:** 2222
|
||||
- **Access Methods:** HTTPS, SSH, API
|
||||
|
||||
### NPM (Nginx Proxy Manager)
|
||||
- **Service:** Reverse proxy manager
|
||||
- **Admin URL:** http://172.16.3.20:7818
|
||||
- **HTTP Port:** 1880
|
||||
- **HTTPS Port:** 18443
|
||||
- **User:** mike@azcomputerguru.com
|
||||
- **Password:** Paper123!@#-unifi
|
||||
- **Access Methods:** HTTP (internal)
|
||||
|
||||
### Cloudflare
|
||||
- **Service:** DNS and CDN
|
||||
- **API Token (Full DNS):** DRRGkHS33pxAUjQfRDzDeVPtt6wwUU6FwtXqOzNj
|
||||
- **API Token (Legacy/Limited):** U1UTbBOWA4a69eWEBiqIbYh0etCGzrpTU4XaKp7w
|
||||
- **Permissions:** Zone:Read, Zone:Edit, DNS:Read, DNS:Edit
|
||||
- **Used for:** DNS management, WHM plugin, cf-dns CLI
|
||||
- **Domain:** azcomputerguru.com
|
||||
- **Notes:** New full-access token added 2025-12-19
|
||||
- **Access Methods:** API
|
||||
|
||||
---
|
||||
|
||||
## Projects - GuruRMM
|
||||
|
||||
### Dashboard/API Login
|
||||
- **Service:** GuruRMM dashboard login
|
||||
- **Email:** admin@azcomputerguru.com
|
||||
- **Password:** GuruRMM2025
|
||||
- **Role:** admin
|
||||
- **Access Methods:** Web
|
||||
|
||||
### Database (PostgreSQL)
|
||||
- **Service:** GuruRMM database
|
||||
- **Host:** gururmm-db container (172.16.3.20)
|
||||
- **Port:** 5432 (default)
|
||||
- **Database:** gururmm
|
||||
- **User:** gururmm
|
||||
- **Password:** 43617ebf7eb242e814ca9988cc4df5ad
|
||||
- **Access Methods:** PostgreSQL protocol
|
||||
|
||||
### API Server
|
||||
- **External URL:** https://rmm-api.azcomputerguru.com
|
||||
- **Internal URL:** http://172.16.3.20:3001
|
||||
- **JWT Secret:** ZNzGxghru2XUdBVlaf2G2L1YUBVcl5xH0lr/Gpf/QmE=
|
||||
- **Access Methods:** HTTPS, HTTP (internal)
|
||||
|
||||
### Microsoft Entra ID (SSO)
|
||||
- **Service:** GuruRMM SSO via Entra
|
||||
- **App Name:** GuruRMM Dashboard
|
||||
- **App ID (Client ID):** 18a15f5d-7ab8-46f4-8566-d7b5436b84b6
|
||||
- **Object ID:** 34c80aa8-385a-4bea-af85-f8bf67decc8f
|
||||
- **Client Secret:** gOz8Q~J.oz7KnUIEpzmHOyJ6GEzYNecGRl-Pbc9w
|
||||
- **Secret Expires:** 2026-12-21
|
||||
- **Sign-in Audience:** Multi-tenant (any Azure AD org)
|
||||
- **Redirect URIs:** https://rmm.azcomputerguru.com/auth/callback, http://localhost:5173/auth/callback
|
||||
- **API Permissions:** openid, email, profile
|
||||
- **Created:** 2025-12-21
|
||||
- **Access Methods:** OAuth 2.0
|
||||
|
||||
### CI/CD (Build Automation)
|
||||
- **Webhook URL:** http://172.16.3.30/webhook/build
|
||||
- **Webhook Secret:** gururmm-build-secret
|
||||
- **Build Script:** /opt/gururmm/build-agents.sh
|
||||
- **Build Log:** /var/log/gururmm-build.log
|
||||
- **Gitea Webhook ID:** 1
|
||||
- **Trigger:** Push to main branch
|
||||
- **Builds:** Linux (x86_64) and Windows (x86_64) agents
|
||||
- **Deploy Path:** /var/www/gururmm/downloads/
|
||||
- **Access Methods:** Webhook
|
||||
|
||||
### Build Server SSH Key (for Gitea)
|
||||
- **Key Name:** gururmm-build-server
|
||||
- **Key Type:** ssh-ed25519
|
||||
- **Public Key:** AAAAC3NzaC1lZDI1NTE5AAAAIKSqf2/phEXUK8vd5GhMIDTEGSk0LvYk92sRdNiRrjKi guru@gururmm-build
|
||||
- **Added to:** Gitea (azcomputerguru account)
|
||||
- **Access Methods:** SSH key authentication
|
||||
|
||||
### Clients & Sites
|
||||
|
||||
#### Glaztech Industries (GLAZ)
|
||||
- **Client ID:** d857708c-5713-4ee5-a314-679f86d2f9f9
|
||||
- **Site:** SLC - Salt Lake City
|
||||
- **Site ID:** 290bd2ea-4af5-49c6-8863-c6d58c5a55de
|
||||
- **Site Code:** DARK-GROVE-7839
|
||||
- **API Key:** grmm_Qw64eawPBjnMdwN5UmDGWoPlqwvjM7lI
|
||||
- **Created:** 2025-12-18
|
||||
- **Access Methods:** API
|
||||
|
||||
---
|
||||
|
||||
## Projects - GuruConnect
|
||||
|
||||
### Database (PostgreSQL on build server)
|
||||
- **Service:** GuruConnect database
|
||||
- **Host:** localhost (172.16.3.30)
|
||||
- **Port:** 5432
|
||||
- **Database:** guruconnect
|
||||
- **User:** guruconnect
|
||||
- **Password:** gc_a7f82d1e4b9c3f60
|
||||
- **DATABASE_URL:** postgres://guruconnect:gc_a7f82d1e4b9c3f60@localhost:5432/guruconnect
|
||||
- **Created:** 2025-12-28
|
||||
- **Access Methods:** PostgreSQL protocol
|
||||
|
||||
---
|
||||
|
||||
## Projects - ClaudeTools
|
||||
|
||||
### Database (MariaDB on Jupiter)
|
||||
- **Service:** ClaudeTools MSP tracking database
|
||||
- **Host:** 172.16.3.20
|
||||
- **Port:** 3306
|
||||
- **Database:** claudetools
|
||||
- **User:** claudetools
|
||||
- **Password:** CT_e8fcd5a3952030a79ed6debae6c954ed
|
||||
- **Notes:** Created 2026-01-15, MSP tracking database with 36 tables
|
||||
- **Access Methods:** MySQL/MariaDB protocol
|
||||
|
||||
### Encryption Key
|
||||
- **File Location:** C:\Users\MikeSwanson\claude-projects\shared-data\.encryption-key
|
||||
- **Key:** 319134ddb79fa44a6751b383cb0a7940da0de0818bd6bbb1a9c20a6a87d2d30c
|
||||
- **Generated:** 2026-01-15
|
||||
- **Usage:** AES-256-GCM encryption for credentials in database
|
||||
- **Warning:** DO NOT COMMIT TO GIT
|
||||
|
||||
### JWT Secret
|
||||
- **Secret:** NdwgH6jsGR1WfPdUwR3u9i1NwNx3QthhLHBsRCfFxcg=
|
||||
- **Usage:** JWT token signing for API authentication
|
||||
- **Access Methods:** N/A (internal use)
|
||||
|
||||
### API Server
|
||||
- **External URL:** https://claudetools-api.azcomputerguru.com
|
||||
- **Internal URL:** http://172.16.3.20:8000
|
||||
- **Status:** Pending deployment
|
||||
- **Docker Container:** claudetools-api
|
||||
- **Access Methods:** HTTPS (pending), HTTP (internal)
|
||||
|
||||
### Context Recall Configuration
|
||||
- **Claude API URL:** http://172.16.3.30:8001
|
||||
- **API Base URL:** http://172.16.3.30:8001
|
||||
- **JWT Token:** (empty - get from API via setup script)
|
||||
- **Context Recall Enabled:** true
|
||||
- **Min Relevance Score:** 5.0
|
||||
- **Max Contexts:** 10
|
||||
- **Auto Save Context:** true
|
||||
- **Default Relevance Score:** 7.0
|
||||
- **Debug Context Recall:** false
|
||||
|
||||
---
|
||||
|
||||
## Client Sites - WHM/cPanel
|
||||
|
||||
### IX Server (ix.azcomputerguru.com)
|
||||
- **Service:** cPanel/WHM hosting server
|
||||
- **SSH Host:** ix.azcomputerguru.com
|
||||
- **Internal IP:** 172.16.3.10 (VPN required)
|
||||
- **SSH User:** root
|
||||
- **SSH Password:** Gptf*77ttb!@#!@#
|
||||
- **SSH Key:** guru@wsl key added to authorized_keys
|
||||
- **Role:** cPanel/WHM server hosting client sites
|
||||
- **Access Methods:** SSH, cPanel/WHM web
|
||||
|
||||
### WebSvr (websvr.acghosting.com)
|
||||
- **Service:** Legacy cPanel/WHM server
|
||||
- **Host:** websvr.acghosting.com
|
||||
- **SSH User:** root
|
||||
- **SSH Password:** r3tr0gradE99#
|
||||
- **API Token:** 8ZPYVM6R0RGOHII7EFF533MX6EQ17M7O
|
||||
- **Access Level:** Full access
|
||||
- **Role:** Legacy cPanel/WHM server (migration source to IX)
|
||||
- **Access Methods:** SSH, cPanel/WHM web, API
|
||||
|
||||
### data.grabbanddurando.com
|
||||
- **Service:** Client website (Grabb & Durando Law)
|
||||
- **Server:** IX (ix.azcomputerguru.com)
|
||||
- **cPanel Account:** grabblaw
|
||||
- **Site Path:** /home/grabblaw/public_html/data_grabbanddurando
|
||||
- **Site Admin User:** admin
|
||||
- **Site Admin Password:** GND-Paper123!@#-datasite
|
||||
- **Database:** grabblaw_gdapp_data
|
||||
- **DB User:** grabblaw_gddata
|
||||
- **DB Password:** GrabbData2025
|
||||
- **Config File:** /home/grabblaw/public_html/data_grabbanddurando/connection.php
|
||||
- **Backups:** /home/grabblaw/public_html/data_grabbanddurando/backups_mariadb_fix/
|
||||
- **Access Methods:** Web (admin), MySQL, SSH (via IX root)
|
||||
|
||||
### GoDaddy VPS (Legacy)
|
||||
- **Service:** Legacy hosting server
|
||||
- **IP:** 208.109.235.224
|
||||
- **Hostname:** 224.235.109.208.host.secureserver.net
|
||||
- **Auth:** SSH key
|
||||
- **Database:** grabblaw_gdapp
|
||||
- **Note:** Old server, data migrated to IX
|
||||
- **Access Methods:** SSH (key)
|
||||
|
||||
---
|
||||
|
||||
## Seafile (on Jupiter - Migrated 2025-12-27)
|
||||
|
||||
### Container
|
||||
- **Service:** Seafile file sync server
|
||||
- **Host:** Jupiter (172.16.3.20)
|
||||
- **URL:** https://sync.azcomputerguru.com
|
||||
- **Internal Port:** 8082
|
||||
- **Proxied via:** NPM
|
||||
- **Containers:** seafile, seafile-mysql, seafile-memcached, seafile-elasticsearch
|
||||
- **Docker Compose:** /mnt/user0/SeaFile/DockerCompose/docker-compose.yml
|
||||
- **Data Path:** /mnt/user0/SeaFile/seafile-data/
|
||||
- **Access Methods:** HTTPS
|
||||
|
||||
### Seafile Admin
|
||||
- **Service:** Seafile admin interface
|
||||
- **Email:** mike@azcomputerguru.com
|
||||
- **Password:** r3tr0gradE99#
|
||||
- **Access Methods:** Web
|
||||
|
||||
### Database (MariaDB)
|
||||
- **Service:** Seafile database
|
||||
- **Container:** seafile-mysql
|
||||
- **Image:** mariadb:10.6
|
||||
- **Root Password:** db_dev
|
||||
- **Seafile User:** seafile
|
||||
- **Seafile Password:** 64f2db5e-6831-48ed-a243-d4066fe428f9
|
||||
- **Databases:** ccnet_db (users), seafile_db (data), seahub_db (web)
|
||||
- **Access Methods:** MySQL protocol (container)
|
||||
|
||||
### Elasticsearch
|
||||
- **Service:** Seafile search indexing
|
||||
- **Container:** seafile-elasticsearch
|
||||
- **Image:** elasticsearch:7.17.26
|
||||
- **Notes:** Upgraded from 7.16.2 for kernel 6.12 compatibility
|
||||
- **Access Methods:** HTTP (container)
|
||||
|
||||
### Microsoft Graph API (Email)
|
||||
- **Service:** Seafile email notifications via Graph
|
||||
- **Tenant ID:** ce61461e-81a0-4c84-bb4a-7b354a9a356d
|
||||
- **Client ID:** 15b0fafb-ab51-4cc9-adc7-f6334c805c22
|
||||
- **Client Secret:** rRN8Q~FPfSL8O24iZthi_LVJTjGOCZG.DnxGHaSk
|
||||
- **Sender Email:** noreply@azcomputerguru.com
|
||||
- **Usage:** Seafile email notifications via Graph API
|
||||
- **Access Methods:** Graph API
|
||||
|
||||
### Migration Notes
|
||||
- **Migrated from:** Saturn (172.16.3.21) on 2025-12-27
|
||||
- **Saturn Status:** Seafile stopped, data intact for rollback (keep 1 week)
|
||||
|
||||
---
|
||||
|
||||
## NPM Proxy Hosts Reference
|
||||
|
||||
| ID | Domain | Backend | SSL Cert | Access Methods |
|
||||
|----|--------|---------|----------|----------------|
|
||||
| 1 | emby.azcomputerguru.com | 172.16.2.99:8096 | npm-1 | HTTPS |
|
||||
| 2 | git.azcomputerguru.com | 172.16.3.20:3000 | npm-2 | HTTPS |
|
||||
| 4 | plexrequest.azcomputerguru.com | 172.16.3.31:5055 | npm-4 | HTTPS |
|
||||
| 5 | rmm-api.azcomputerguru.com | 172.16.3.20:3001 | npm-6 | HTTPS |
|
||||
| - | unifi.azcomputerguru.com | 172.16.3.28:8443 | npm-5 | HTTPS |
|
||||
| 8 | sync.azcomputerguru.com | 172.16.3.20:8082 | npm-8 | HTTPS |
|
||||
|
||||
---
|
||||
|
||||
## Tailscale Network
|
||||
|
||||
| Tailscale IP | Hostname | Owner | OS | Notes |
|
||||
|--------------|----------|-------|-----|-------|
|
||||
| 100.79.69.82 | pfsense-1 | mike@ | freebsd | Gateway |
|
||||
| 100.125.36.6 | acg-m-l5090 | mike@ | windows | Workstation |
|
||||
| 100.92.230.111 | acg-tech-01l | mike@ | windows | Tech laptop |
|
||||
| 100.96.135.117 | acg-tech-02l | mike@ | windows | Tech laptop |
|
||||
| 100.113.45.7 | acg-tech03l | howard@ | windows | Tech laptop |
|
||||
| 100.77.166.22 | desktop-hjfjtep | mike@ | windows | Desktop |
|
||||
| 100.101.145.100 | guru-legion9 | mike@ | windows | Laptop |
|
||||
| 100.119.194.51 | guru-surface8 | howard@ | windows | Surface |
|
||||
| 100.66.103.110 | magus-desktop | rob@ | windows | Desktop |
|
||||
| 100.66.167.120 | magus-pc | rob@ | windows | Workstation |
|
||||
|
||||
---
|
||||
|
||||
## SSH Public Keys
|
||||
|
||||
### guru@wsl (Windows/WSL)
|
||||
- **User:** guru
|
||||
- **Sudo Password:** Window123!@#-wsl
|
||||
- **Key Type:** ssh-ed25519
|
||||
- **Public Key:** AAAAC3NzaC1lZDI1NTE5AAAAIAWY+SdqMHJP5JOe3qpWENQZhXJA4tzI2d7ZVNAwA/1u guru@wsl
|
||||
- **Usage:** WSL SSH authentication
|
||||
- **Authorized on:** GuruRMM build server, IX server
|
||||
|
||||
### azcomputerguru@local (Mac)
|
||||
- **User:** azcomputerguru
|
||||
- **Key Type:** ssh-ed25519
|
||||
- **Public Key:** AAAAC3NzaC1lZDI1NTE5AAAAIDrGbr4EwvQ4P3ZtyZW3ZKkuDQOMbqyAQUul2+JE4K4S azcomputerguru@local
|
||||
- **Usage:** Mac SSH authentication
|
||||
- **Authorized on:** GuruRMM build server, IX server
|
||||
|
||||
---
|
||||
|
||||
## MSP Tools
|
||||
|
||||
### Syncro (PSA/RMM) - AZ Computer Guru
|
||||
- **Service:** PSA/RMM platform
|
||||
- **API Key:** T259810e5c9917386b-52c2aeea7cdb5ff41c6685a73cebbeb3
|
||||
- **Subdomain:** computerguru
|
||||
- **API Base URL:** https://computerguru.syncromsp.com/api/v1
|
||||
- **API Docs:** https://api-docs.syncromsp.com/
|
||||
- **Account:** AZ Computer Guru MSP
|
||||
- **Added:** 2025-12-18
|
||||
- **Access Methods:** API
|
||||
|
||||
### Autotask (PSA) - AZ Computer Guru
|
||||
- **Service:** PSA platform
|
||||
- **API Username:** dguyqap2nucge6r@azcomputerguru.com
|
||||
- **API Password:** z*6G4fT#oM~8@9Hxy$2Y7K$ma
|
||||
- **API Integration Code:** HYTYYZ6LA5HB5XK7IGNA7OAHQLH
|
||||
- **Integration Name:** ClaudeAPI
|
||||
- **API Zone:** webservices5.autotask.net
|
||||
- **API Docs:** https://autotask.net/help/developerhelp/Content/APIs/REST/REST_API_Home.htm
|
||||
- **Account:** AZ Computer Guru MSP
|
||||
- **Added:** 2025-12-18
|
||||
- **Notes:** New API user "Claude API"
|
||||
- **Access Methods:** REST API
|
||||
|
||||
### CIPP (CyberDrain Improved Partner Portal)
|
||||
- **Service:** M365 management portal
|
||||
- **URL:** https://cippcanvb.azurewebsites.net
|
||||
- **Tenant ID:** ce61461e-81a0-4c84-bb4a-7b354a9a356d
|
||||
- **API Client Name:** ClaudeCipp2 (working)
|
||||
- **App ID (Client ID):** 420cb849-542d-4374-9cb2-3d8ae0e1835b
|
||||
- **Client Secret:** MOn8Q~otmxJPLvmL~_aCVTV8Va4t4~SrYrukGbJT
|
||||
- **Scope:** api://420cb849-542d-4374-9cb2-3d8ae0e1835b/.default
|
||||
- **CIPP-SAM App ID:** 91b9102d-bafd-43f8-b17a-f99479149b07
|
||||
- **IP Range:** 0.0.0.0/0 (all IPs allowed)
|
||||
- **Auth Method:** OAuth 2.0 Client Credentials
|
||||
- **Updated:** 2025-12-23
|
||||
- **Notes:** Working API client
|
||||
- **Access Methods:** REST API (OAuth 2.0)
|
||||
|
||||
#### CIPP API Usage (Bash)
|
||||
```bash
|
||||
# Get token
|
||||
ACCESS_TOKEN=$(curl -s -X POST "https://login.microsoftonline.com/ce61461e-81a0-4c84-bb4a-7b354a9a356d/oauth2/v2.0/token" \
|
||||
-d "client_id=420cb849-542d-4374-9cb2-3d8ae0e1835b" \
|
||||
-d "client_secret=MOn8Q~otmxJPLvmL~_aCVTV8Va4t4~SrYrukGbJT" \
|
||||
-d "scope=api://420cb849-542d-4374-9cb2-3d8ae0e1835b/.default" \
|
||||
-d "grant_type=client_credentials" | python3 -c "import sys, json; print(json.load(sys.stdin).get('access_token', ''))")
|
||||
|
||||
# Query endpoints (use tenant domain or tenant ID as TenantFilter)
|
||||
curl -s "https://cippcanvb.azurewebsites.net/api/ListLicenses?TenantFilter=sonorangreenllc.com" \
|
||||
-H "Authorization: Bearer ${ACCESS_TOKEN}"
|
||||
```
|
||||
|
||||
#### Old CIPP API Client (DO NOT USE)
|
||||
- **App ID:** d545a836-7118-44f6-8852-d9dd64fb7bb9
|
||||
- **Status:** Authenticated but all endpoints returned 403
|
||||
|
||||
### Claude-MSP-Access (Multi-Tenant Graph API)
|
||||
- **Service:** Direct Graph API access for M365 investigations
|
||||
- **Tenant ID:** ce61461e-81a0-4c84-bb4a-7b354a9a356d
|
||||
- **App ID (Client ID):** fabb3421-8b34-484b-bc17-e46de9703418
|
||||
- **Client Secret:** ~QJ8Q~NyQSs4OcGqHZyPrA2CVnq9KBfKiimntbMO
|
||||
- **Secret Expires:** 2026-12 (24 months)
|
||||
- **Sign-in Audience:** Multi-tenant (any Entra ID org)
|
||||
- **Purpose:** Direct Graph API access for M365 investigations and remediation
|
||||
- **Admin Consent URL:** https://login.microsoftonline.com/common/adminconsent?client_id=fabb3421-8b34-484b-bc17-e46de9703418&redirect_uri=https://login.microsoftonline.com/common/oauth2/nativeclient
|
||||
- **Permissions:** User.ReadWrite.All, Directory.ReadWrite.All, Mail.ReadWrite, MailboxSettings.ReadWrite, AuditLog.Read.All, Application.ReadWrite.All, DelegatedPermissionGrant.ReadWrite.All, Group.ReadWrite.All, SecurityEvents.ReadWrite.All, AppRoleAssignment.ReadWrite.All, UserAuthenticationMethod.ReadWrite.All
|
||||
- **Created:** 2025-12-29
|
||||
- **Access Methods:** Graph API (OAuth 2.0)
|
||||
|
||||
#### Usage (Python)
|
||||
```python
|
||||
import requests
|
||||
|
||||
tenant_id = "CUSTOMER_TENANT_ID" # or use 'common' after consent
|
||||
client_id = "fabb3421-8b34-484b-bc17-e46de9703418"
|
||||
client_secret = "~QJ8Q~NyQSs4OcGqHZyPrA2CVnq9KBfKiimntbMO"
|
||||
|
||||
# Get token
|
||||
token_resp = requests.post(
|
||||
f"https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/token",
|
||||
data={
|
||||
"client_id": client_id,
|
||||
"client_secret": client_secret,
|
||||
"scope": "https://graph.microsoft.com/.default",
|
||||
"grant_type": "client_credentials"
|
||||
}
|
||||
)
|
||||
access_token = token_resp.json()["access_token"]
|
||||
|
||||
# Query Graph API
|
||||
headers = {"Authorization": f"Bearer {access_token}"}
|
||||
users = requests.get("https://graph.microsoft.com/v1.0/users", headers=headers)
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Client - MVAN Inc
|
||||
|
||||
### Microsoft 365 Tenant 1
|
||||
- **Service:** M365 tenant
|
||||
- **Tenant:** mvan.onmicrosoft.com
|
||||
- **Admin User:** sysadmin@mvaninc.com
|
||||
- **Password:** r3tr0gradE99#
|
||||
- **Notes:** Global admin, project to merge/trust with T2
|
||||
- **Access Methods:** Web (M365 portal)
|
||||
|
||||
---
|
||||
|
||||
## Client - BG Builders LLC
|
||||
|
||||
### Microsoft 365 Tenant
|
||||
- **Service:** M365 tenant
|
||||
- **Tenant:** bgbuildersllc.com
|
||||
- **CIPP Name:** sonorangreenllc.com
|
||||
- **Tenant ID:** ededa4fb-f6eb-4398-851d-5eb3e11fab27
|
||||
- **Admin User:** sysadmin@bgbuildersllc.com
|
||||
- **Password:** Window123!@#-bgb
|
||||
- **Added:** 2025-12-19
|
||||
- **Access Methods:** Web (M365 portal)
|
||||
|
||||
### Security Investigation (2025-12-22) - RESOLVED
|
||||
- **Compromised User:** Shelly@bgbuildersllc.com (Shelly Dooley)
|
||||
- **Symptoms:** Suspicious sent items reported by user
|
||||
- **Findings:**
|
||||
- Gmail OAuth app with EAS.AccessAsUser.All (REMOVED)
|
||||
- "P2P Server" app registration backdoor (DELETED by admin)
|
||||
- No malicious mailbox rules or forwarding
|
||||
- Sign-in logs unavailable (no Entra P1 license)
|
||||
- **Remediation:**
|
||||
- Password reset: `5ecwyHv6&dP7` (must change on login)
|
||||
- All sessions revoked
|
||||
- Gmail OAuth consent removed
|
||||
- P2P Server backdoor deleted
|
||||
- **Status:** RESOLVED
|
||||
|
||||
---
|
||||
|
||||
## Client - Dataforth
|
||||
|
||||
### Network
|
||||
- **Subnet:** 192.168.0.0/24
|
||||
- **Domain:** INTRANET (intranet.dataforth.com)
|
||||
|
||||
### UDM (Unifi Dream Machine)
|
||||
- **Service:** Gateway/firewall
|
||||
- **IP:** 192.168.0.254
|
||||
- **SSH User:** root
|
||||
- **SSH Password:** Paper123!@#-unifi
|
||||
- **Web User:** azcomputerguru
|
||||
- **Web Password:** Paper123!@#-unifi
|
||||
- **2FA:** Push notification enabled
|
||||
- **Role:** Gateway/firewall, OpenVPN server
|
||||
- **Access Methods:** SSH, Web (2FA)
|
||||
|
||||
### AD1 (Domain Controller)
|
||||
- **Service:** Primary domain controller
|
||||
- **IP:** 192.168.0.27
|
||||
- **Hostname:** AD1.intranet.dataforth.com
|
||||
- **User:** INTRANET\sysadmin
|
||||
- **Password:** Paper123!@#
|
||||
- **Role:** Primary DC, NPS/RADIUS server
|
||||
- **NPS Ports:** 1812/1813 (auth/accounting)
|
||||
- **Access Methods:** RDP, WinRM
|
||||
|
||||
### AD2 (Domain Controller)
|
||||
- **Service:** Secondary domain controller
|
||||
- **IP:** 192.168.0.6
|
||||
- **Hostname:** AD2.intranet.dataforth.com
|
||||
- **User:** INTRANET\sysadmin
|
||||
- **Password:** Paper123!@#
|
||||
- **Role:** Secondary DC, file server
|
||||
- **Access Methods:** RDP, WinRM
|
||||
|
||||
### NPS RADIUS Configuration
|
||||
- **Client Name:** unifi
|
||||
- **Client IP:** 192.168.0.254
|
||||
- **Shared Secret:** Gptf*77ttb!@#!@#
|
||||
- **Policy:** "Unifi" - allows Domain Users
|
||||
- **Access Methods:** RADIUS protocol
|
||||
|
||||
### D2TESTNAS (SMB1 Proxy)
|
||||
- **Service:** DOS machine SMB1 proxy
|
||||
- **IP:** 192.168.0.9
|
||||
- **Web/SSH User:** admin
|
||||
- **Web/SSH Password:** Paper123!@#-nas
|
||||
- **Role:** DOS machine SMB1 proxy
|
||||
- **Added:** 2025-12-14
|
||||
- **Access Methods:** Web, SSH
|
||||
|
||||
### Dataforth - Entra App Registration (Claude-Code-M365)
|
||||
- **Service:** Silent Graph API access to Dataforth tenant
|
||||
- **Tenant ID:** 7dfa3ce8-c496-4b51-ab8d-bd3dcd78b584
|
||||
- **App ID (Client ID):** 7a8c0b2e-57fb-4d79-9b5a-4b88d21b1f29
|
||||
- **Client Secret:** tXo8Q~ZNG9zoBpbK9HwJTkzx.YEigZ9AynoSrca3
|
||||
- **Permissions:** Calendars.ReadWrite, Contacts.ReadWrite, User.ReadWrite.All, Mail.ReadWrite, Directory.ReadWrite.All, Group.ReadWrite.All
|
||||
- **Created:** 2025-12-22
|
||||
- **Access Methods:** Graph API
|
||||
|
||||
---
|
||||
|
||||
## Client - CW Concrete LLC
|
||||
|
||||
### Microsoft 365 Tenant
|
||||
- **Service:** M365 tenant
|
||||
- **Tenant:** cwconcretellc.com
|
||||
- **CIPP Name:** cwconcretellc.com
|
||||
- **Tenant ID:** dfee2224-93cd-4291-9b09-6c6ce9bb8711
|
||||
- **Default Domain:** NETORGFT11452752.onmicrosoft.com
|
||||
- **Notes:** De-federated from GoDaddy 2025-12, domain needs re-verification
|
||||
- **Access Methods:** Web (M365 portal)
|
||||
|
||||
### Security Investigation (2025-12-22) - RESOLVED
|
||||
- **Findings:**
|
||||
- Graph Command Line Tools OAuth consent with high privileges (REMOVED)
|
||||
- "test" backdoor app registration with multi-tenant access (DELETED)
|
||||
- Apple Internet Accounts OAuth (left - likely iOS device)
|
||||
- No malicious mailbox rules or forwarding
|
||||
- **Remediation:**
|
||||
- All sessions revoked for all 4 users
|
||||
- Backdoor apps removed
|
||||
- **Status:** RESOLVED
|
||||
|
||||
---
|
||||
|
||||
## Client - Valley Wide Plastering
|
||||
|
||||
### Network
|
||||
- **Subnet:** 172.16.9.0/24
|
||||
|
||||
### UDM (UniFi Dream Machine)
|
||||
- **Service:** Gateway/firewall
|
||||
- **IP:** 172.16.9.1
|
||||
- **SSH User:** root
|
||||
- **SSH Password:** Gptf*77ttb123!@#-vwp
|
||||
- **Role:** Gateway/firewall, VPN server, RADIUS client
|
||||
- **Access Methods:** SSH, Web
|
||||
|
||||
### VWP-DC1 (Domain Controller)
|
||||
- **Service:** Primary domain controller
|
||||
- **IP:** 172.16.9.2
|
||||
- **Hostname:** VWP-DC1
|
||||
- **User:** sysadmin
|
||||
- **Password:** r3tr0gradE99#
|
||||
- **Role:** Primary DC, NPS/RADIUS server
|
||||
- **Added:** 2025-12-22
|
||||
- **Access Methods:** RDP, WinRM
|
||||
|
||||
### NPS RADIUS Configuration
|
||||
- **RADIUS Server:** 172.16.9.2
|
||||
- **RADIUS Ports:** 1812 (auth), 1813 (accounting)
|
||||
- **Clients:** UDM (172.16.9.1), VWP-Subnet (172.16.9.0/24)
|
||||
- **Shared Secret:** Gptf*77ttb123!@#-radius
|
||||
- **Policy:** "VPN-Access" - allows all authenticated users (24/7)
|
||||
- **Auth Methods:** All (PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP)
|
||||
- **User Dial-in:** All VWP_Users set to Allow
|
||||
- **AuthAttributeRequired:** Disabled on clients
|
||||
- **Tested:** 2025-12-22, user cguerrero authenticated successfully
|
||||
- **Access Methods:** RADIUS protocol
|
||||
|
||||
---
|
||||
|
||||
## Client - Khalsa
|
||||
|
||||
### Network
|
||||
- **Subnet:** 172.16.50.0/24
|
||||
|
||||
### UCG (UniFi Cloud Gateway)
|
||||
- **Service:** Gateway/firewall
|
||||
- **IP:** 172.16.50.1
|
||||
- **SSH User:** azcomputerguru
|
||||
- **SSH Password:** Paper123!@#-camden (reset 2025-12-22)
|
||||
- **Notes:** Gateway/firewall, VPN server, SSH key added but not working
|
||||
- **Access Methods:** SSH, Web
|
||||
|
||||
### Switch
|
||||
- **User:** 8WfY8
|
||||
- **Password:** tI3evTNBZMlnngtBc
|
||||
- **Access Methods:** Web
|
||||
|
||||
### Accountant Machine
|
||||
- **IP:** 172.16.50.168
|
||||
- **User:** accountant
|
||||
- **Password:** Paper123!@#-accountant
|
||||
- **Added:** 2025-12-22
|
||||
- **Notes:** VPN routing issue
|
||||
- **Access Methods:** RDP
|
||||
|
||||
---
|
||||
|
||||
## Client - Scileppi Law Firm
|
||||
|
||||
### DS214se (Source NAS - Migration Source)
|
||||
- **Service:** Legacy NAS (source)
|
||||
- **IP:** 172.16.1.54
|
||||
- **SSH User:** admin
|
||||
- **Password:** Th1nk3r^99
|
||||
- **Storage:** 1.8TB (1.6TB used)
|
||||
- **Data:** User home folders (admin, Andrew Ross, Chris Scileppi, Samantha Nunez, etc.)
|
||||
- **Access Methods:** SSH, Web
|
||||
|
||||
### Unraid (Source - Migration)
|
||||
- **Service:** Legacy Unraid (source)
|
||||
- **IP:** 172.16.1.21
|
||||
- **SSH User:** root
|
||||
- **Password:** Th1nk3r^99
|
||||
- **Role:** Data source for migration to RS2212+
|
||||
- **Access Methods:** SSH, Web
|
||||
|
||||
### RS2212+ (Destination NAS)
|
||||
- **Service:** Primary NAS (destination)
|
||||
- **IP:** 172.16.1.59
|
||||
- **Hostname:** SL-SERVER
|
||||
- **SSH User:** sysadmin
|
||||
- **Password:** Gptf*77ttb123!@#-sl-server
|
||||
- **SSH Key:** claude-code@localadmin added to authorized_keys
|
||||
- **Storage:** 25TB total, 6.9TB used (28%)
|
||||
- **Data Share:** /volume1/Data (7.9TB - Active, Closed, Archived, Billing, MOTIONS BANK)
|
||||
- **Notes:** Migration and consolidation complete 2025-12-29
|
||||
- **Access Methods:** SSH (key + password), Web, SMB
|
||||
|
||||
### RS2212+ User Accounts (Created 2025-12-29)
|
||||
| Username | Full Name | Password | Notes |
|
||||
|----------|-----------|----------|-------|
|
||||
| chris | Chris Scileppi | Scileppi2025! | Owner |
|
||||
| andrew | Andrew Ross | Scileppi2025! | Staff |
|
||||
| sylvia | Sylvia | Scileppi2025! | Staff |
|
||||
| rose | Rose | Scileppi2025! | Staff |
|
||||
| (TBD) | 5th user | - | Name pending |
|
||||
|
||||
### Migration/Consolidation Status - COMPLETE
|
||||
- **Completed:** 2025-12-29
|
||||
- **Final Structure:**
|
||||
- Active: 2.5TB (merged Unraid + DS214se Open Cases)
|
||||
- Closed: 4.9TB (merged Unraid + DS214se Closed Cases)
|
||||
- Archived: 451GB
|
||||
- MOTIONS BANK: 21MB
|
||||
- Billing: 17MB
|
||||
- **Recycle Bin:** Emptied (recovered 413GB)
|
||||
- **Permissions:** Group "users" with 775 on /volume1/Data
|
||||
|
||||
---
|
||||
|
||||
## SSH Config File
|
||||
|
||||
**File:** ssh-config
|
||||
**Generated from:** credentials.md
|
||||
**Last updated:** 2025-12-16
|
||||
|
||||
### Key Status
|
||||
- **gururmm, ix:** Mac + WSL keys authorized
|
||||
- **jupiter, saturn:** WSL key only (need to add Mac key)
|
||||
- **pfsense, owncloud:** May need key setup
|
||||
|
||||
### Host Aliases
|
||||
- **jupiter:** 172.16.3.20:22 (root)
|
||||
- **saturn:** 172.16.3.21:22 (root)
|
||||
- **pfsense:** 172.16.0.1:2248 (admin)
|
||||
- **owncloud / cloud:** 172.16.3.22:22 (root)
|
||||
- **gururmm / rmm:** 172.16.3.30:22 (root)
|
||||
- **ix / whm:** ix.azcomputerguru.com:22 (root)
|
||||
- **gitea / git.azcomputerguru.com:** 172.16.3.20:2222 (git)
|
||||
|
||||
### Default Settings
|
||||
- **AddKeysToAgent:** yes
|
||||
- **IdentitiesOnly:** yes
|
||||
- **IdentityFile:** ~/.ssh/id_ed25519
|
||||
|
||||
---
|
||||
|
||||
## Multi-Tenant Security App Documentation
|
||||
|
||||
**File:** multi-tenant-security-app.md
|
||||
**Purpose:** Reusable Entra app for quick security investigations across client tenants
|
||||
|
||||
### Purpose
|
||||
Guide for creating a multi-tenant Entra ID app for MSP security investigations. This app provides:
|
||||
- Quick consent mechanism for client tenants
|
||||
- PowerShell investigation commands
|
||||
- BEC detection scripts
|
||||
- Mailbox forwarding rule checks
|
||||
- OAuth consent monitoring
|
||||
|
||||
### Recommended Permissions
|
||||
| API | Permission | Purpose |
|
||||
|-----|------------|---------|
|
||||
| Microsoft Graph | AuditLog.Read.All | Sign-in logs, risky sign-ins |
|
||||
| Microsoft Graph | Directory.Read.All | User enumeration, directory info |
|
||||
| Microsoft Graph | Mail.Read | Read mailboxes for phishing/BEC |
|
||||
| Microsoft Graph | MailboxSettings.Read | Detect forwarding rules |
|
||||
| Microsoft Graph | User.Read.All | User profiles |
|
||||
| Microsoft Graph | SecurityEvents.Read.All | Security alerts |
|
||||
| Microsoft Graph | Policy.Read.All | Conditional access policies |
|
||||
| Microsoft Graph | RoleManagement.Read.All | Check admin role assignments |
|
||||
| Microsoft Graph | Application.Read.All | Detect suspicious app consents |
|
||||
|
||||
### Admin Consent URL Pattern
|
||||
```
|
||||
https://login.microsoftonline.com/{CLIENT-TENANT-ID}/adminconsent?client_id={YOUR-APP-ID}
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Permission Exclusion Files
|
||||
|
||||
### file_permissions_excludes.txt
|
||||
**Purpose:** Exclude list for file permission repairs using ManageACL
|
||||
**Filters:**
|
||||
- `$Recycle.Bin`
|
||||
- `System Volume Information`
|
||||
- `RECYCLER`
|
||||
- `documents and settings`
|
||||
- `Users`
|
||||
- `pagefile.sys`
|
||||
- `hiberfil.sys`
|
||||
- `swapfile.sys`
|
||||
- `WindowsApps`
|
||||
|
||||
### file_permissions_profiles_excludes.txt
|
||||
**Purpose:** Exclude list for profiles folder in Windows (currently empty)
|
||||
**Note:** Main file permission repairs target all folders except profiles, then profiles repair runs separately with different permissions
|
||||
|
||||
### reg_permissions_excludes.txt
|
||||
**Purpose:** Exclude list for registry permission repairs using SetACL
|
||||
**Filters:**
|
||||
- `bcd00000000`
|
||||
- `system\controlset001`
|
||||
- `system\controlset002`
|
||||
- `classes\appx`
|
||||
- `wow6432node\classes`
|
||||
- `classes\wow6432node\appid`
|
||||
- `classes\wow6432node\protocols`
|
||||
- `classes\wow6432node\typelib`
|
||||
- `components\canonicaldata\catalogs`
|
||||
- `components\canonicaldata\deployments`
|
||||
- `components\deriveddata\components`
|
||||
- `components\deriveddata\versionedindex`
|
||||
- `microsoft\windows nt\currentversion\perflib\009`
|
||||
- `microsoft\windows nt\currentversion\perflib\currentlanguage`
|
||||
- `tweakingtemp`
|
||||
|
||||
---
|
||||
|
||||
## Quick Reference Commands (from credentials.md)
|
||||
|
||||
### NPM API Auth
|
||||
```bash
|
||||
curl -s -X POST http://172.16.3.20:7818/api/tokens \
|
||||
-H "Content-Type: application/json" \
|
||||
-d '{"identity":"mike@azcomputerguru.com","secret":"Paper123!@#-unifi"}'
|
||||
```
|
||||
|
||||
### Gitea API
|
||||
```bash
|
||||
curl -H "Authorization: token 9b1da4b79a38ef782268341d25a4b6880572063f" \
|
||||
https://git.azcomputerguru.com/api/v1/repos/search
|
||||
```
|
||||
|
||||
### GuruRMM Health Check
|
||||
```bash
|
||||
curl http://172.16.3.20:3001/health
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Summary Statistics
|
||||
|
||||
### Credential Counts
|
||||
- **SSH Servers:** 17 (infrastructure + client sites)
|
||||
- **Web Applications:** 7 (Gitea, NPM, Cloudflare, CIPP, etc.)
|
||||
- **Databases:** 5 (PostgreSQL x2, MariaDB x2, MySQL x1)
|
||||
- **API Keys/Tokens:** 12 (Gitea, Cloudflare, WHM, Syncro, Autotask, CIPP, GuruRMM, etc.)
|
||||
- **Microsoft Entra Apps:** 5 (GuruRMM SSO, Seafile Graph, Claude-MSP-Access, Dataforth Claude-Code, CIPP)
|
||||
- **SSH Keys:** 3 (guru@wsl, azcomputerguru@local, gururmm-build-server)
|
||||
- **Client Tenants:** 5 (MVAN, BG Builders, Dataforth, CW Concrete, Valley Wide Plastering, Khalsa)
|
||||
- **Client Networks:** 4 (Dataforth, Valley Wide, Khalsa, Scileppi)
|
||||
- **Tailscale Nodes:** 10
|
||||
- **NPM Proxy Hosts:** 6
|
||||
|
||||
### Infrastructure Components
|
||||
- **Unraid Servers:** 2 (Jupiter primary, Saturn secondary)
|
||||
- **Domain Controllers:** 3 (Dataforth AD1/AD2, VWP-DC1)
|
||||
- **NAS Devices:** 4 (Scileppi RS2212+, DS214se, Unraid, D2TESTNAS)
|
||||
- **Network Gateways:** 4 (pfSense, Dataforth UDM, VWP UDM, Khalsa UCG)
|
||||
- **Build Servers:** 1 (GuruRMM/GuruConnect)
|
||||
- **Container Hosts:** 1 (Jupiter)
|
||||
- **VMs:** 1 (OwnCloud)
|
||||
|
||||
### Service Categories
|
||||
- **Self-Hosted:** Gitea, NPM, GuruRMM, GuruConnect, ClaudeTools, Seafile
|
||||
- **MSP Tools:** Syncro, Autotask, CIPP
|
||||
- **Cloud Services:** Cloudflare, Microsoft 365/Entra ID, Tailscale
|
||||
- **Client Hosting:** WHM/cPanel (IX, WebSvr)
|
||||
|
||||
---
|
||||
|
||||
## Notes
|
||||
|
||||
- **All passwords are UNREDACTED** for context recovery purposes
|
||||
- **File locations are preserved** for easy reference
|
||||
- **Access methods documented** for each service
|
||||
- **Last updated dates included** where available in source
|
||||
- **Security incidents documented** with resolution status
|
||||
- **Migration statuses preserved** for historical reference
|
||||
- **SSH keys include full public key text** for verification
|
||||
- **API tokens include full values** for immediate use
|
||||
- **Database connection strings** can be reconstructed from provided credentials
|
||||
|
||||
**WARNING:** This file contains sensitive credentials and should be protected accordingly. Do not commit to version control or share externally.
|
||||
Reference in New Issue
Block a user