For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Safeguard for Sudo

Centralized Management and Reporting for the sudoers Policy File

One Identity Safeguard for Sudo Overview 01:34
With One Identity Safeguard for Sudo by Quest, you can centralize management of sudoer policy files. Easily generate reports on sudoer access rights and activities and enable keystroke logging of all activities performed through sudo . The open-source sudo project helps delegate the UNIX root account to achieve privileged account management objectives. Sudo has a proven history of delivering value; however, management of sudo can be cumbersome. Sudo policy is often inconsistently written and executed across multiple servers, and sudo does not have the ability to audit the important super-user access and activities that is so critical to security and compliance.

Key Benefits

Optimize Operations
Improves efficiency and policy consistency with centralized management of sudo across all your UNIX/Linux servers
Simplify Compliance
Quickly provides the information you need with centralized reporting on sudo policy, activities and history
Enhance Security
Increased security with keystroke logging of all sudo activity

Features

Extend Sudo

Leverage plug-ins that extend your current Sudo environment instead of replacing it. Users access the root account the same way they did before there’s no need for additional training minimizing calls to the help desk.

Central Sudo Policy

Use a central service to enforce policy across all of your UNIX/Linux servers. This eliminates the need for administrators to deploy sudoers on every system, reducing administrative effort and improving security.

Keystroke Logging

All keystrokes of activities performed through sudo are logged. The keystroke log report is a comprehensive view of the activities and commands that are executed across all systems. You can filter the log report to quickly find the data you need.

Centralized Reporting

Easily track who, what and when changes were made to sudoers, including versioning. Reports analyze the sudo configuration file, user accounts and group memberships. Plus, you can track who ran specific sudo commands across all systems and whether the commands were accepted or rejected.

Centralized Management

Use the Management Console for UNIX to manage sudo and other One Identity solutions. This greatly simplifies administration and audit-related tasks across your entire UNIX environment.

Separation of Duty Enforcement

Using the Management Console for UNIX, you can enforce separation of duties (SoD) and assign users a specific role, which allows them to only execute a defined set of tasks and no more.

Sudo Offline Policy Cache

Provides your organization with service continuity in the event of a network or server outage.

Script Compatibility

Safeguard for Sudo ensures compatibility of your script files that contain embedded sudo commands across your UNIX environment/infrastructure. This allows your organization to avoid run failures and the expense and effort to test and fix scripts.

Specifications

For detailed system requirements and supported platforms please review the latest release notes.

Resources

One Identity Safeguard for Sudo
Datasheet
One Identity Safeguard for Sudo
One Identity Safeguard for Sudo
Centralized management and reporting for the sudoers policy file
Read Datasheet
Securely Managing Your Unix Environment
White Paper
Securely Managing Your Unix Environment
Securely Managing Your Unix Environment
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
Read White Paper
Privileged Management Solutions Simplified
Privileged Management Solutions Simplified

02:35

Video
Privileged Management Solutions Simplified
Learn how Privileged Management Solutions from One Identity simplify privileged account management and let you enable super-user access without putting your entire organization at risk.
Watch Video
Hackers have an effective plan to get to your privileged accounts (Government)
Technical Brief
Hackers have an effective plan to get to your privileged accounts (Government)
Hackers have an effective plan to get to your privileged accounts (Government)
How to develop a three-step plan to stop evil doers from appropriating privileged accounts and damaging your agency. One Identity privileged account management solutions help make you more safe.
Read Technical Brief
Strategies for successfully managing privileged accounts
E-book
Strategies for successfully managing privileged accounts
Strategies for successfully managing privileged accounts
Securing, managing and governing superusers
Read E-book
Executive Brief: Global Survey Results 2020 – Identity Governance and Administration (IGA) for the New Computing Normal
White Paper
Executive Brief: Global Survey Results 2020 – Identity Governance and Administration (IGA) for the New Computing Normal
Executive Brief: Global Survey Results 2020 – Identity Governance and Administration (IGA) for the New Computing Normal
To get a sense of how the sudden switch to remote-working has impacted the IT industry, particularly in the info-security, and identity governance and administration (IGA) sectors read survey results.
Read White Paper
Full Results of our 2020 Global Survey – Identity Governance and Administration (IGA) for the New Computing Normal
White Paper
Full Results of our 2020 Global Survey – Identity Governance and Administration (IGA) for the New Computing Normal
Full Results of our 2020 Global Survey – Identity Governance and Administration (IGA) for the New Computing Normal
Global Survey findings on the impact of the swift transition to remote working on IT and Identity Governance and Administration sectors.
Read White Paper
Learn Five Reasons to Invest in Next-Gen Privileged Access Management
Technical Brief
Learn Five Reasons to Invest in Next-Gen Privileged Access Management
Learn Five Reasons to Invest in Next-Gen Privileged Access Management
Are you still using traditional privileged access management (PAM) solutions – or don’t yet have an effective PAM strategy? Then, it’s time to start looking at a Next-Gen PAM solution. Read this TechBrief to learn more.
Read Technical Brief

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.