For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Safeguard for Sudo

Centralized Management and Reporting for the sudoers Policy File

One Identity Safeguard for Sudo Overview 01:34
With One Identity Safeguard for Sudo by Quest, you can centralize management of sudoer policy files. Easily generate reports on sudoer access rights and activities and enable keystroke logging of all activities performed through sudo . The open-source sudo project helps delegate the UNIX root account to achieve privileged account management objectives. Sudo has a proven history of delivering value; however, management of sudo can be cumbersome. Sudo policy is often inconsistently written and executed across multiple servers, and sudo does not have the ability to audit the important super-user access and activities that is so critical to security and compliance.

Key Benefits

Optimize Operations
Improves efficiency and policy consistency with centralized management of sudo across all your UNIX/Linux servers
Simplify Compliance
Quickly provides the information you need with centralized reporting on sudo policy, activities and history
Enhance Security
Increased security with keystroke logging of all sudo activity

Features

Extend Sudo

Leverage plug-ins that extend your current Sudo environment instead of replacing it. Users access the root account the same way they did before there’s no need for additional training minimizing calls to the help desk.

Central Sudo Policy

Use a central service to enforce policy across all of your UNIX/Linux servers. This eliminates the need for administrators to deploy sudoers on every system, reducing administrative effort and improving security.

Keystroke Logging

All keystrokes of activities performed through sudo are logged. The keystroke log report is a comprehensive view of the activities and commands that are executed across all systems. You can filter the log report to quickly find the data you need.

Centralized Reporting

Easily track who, what and when changes were made to sudoers, including versioning. Reports analyze the sudo configuration file, user accounts and group memberships. Plus, you can track who ran specific sudo commands across all systems and whether the commands were accepted or rejected.

Centralized Management

Use the Management Console for UNIX to manage sudo and other One Identity solutions. This greatly simplifies administration and audit-related tasks across your entire UNIX environment.

Separation of Duty Enforcement

Using the Management Console for UNIX, you can enforce separation of duties (SoD) and assign users a specific role, which allows them to only execute a defined set of tasks and no more.

Sudo Offline Policy Cache

Provides your organization with service continuity in the event of a network or server outage.

Script Compatibility

Safeguard for Sudo ensures compatibility of your script files that contain embedded sudo commands across your UNIX environment/infrastructure. This allows your organization to avoid run failures and the expense and effort to test and fix scripts.

Specifications

The Safeguard for Sudo plug-ins require sudo 1.8.1 or later and will run on the following systems that have sudo installed.

The Management Console for Unix is browser-agnostic (supporting Internet Explorer, Firefox or Safari) and can be run from any Windows, Mac, Unix or Linux workstation.

Operating SystemSupported Version
Linux
Red Hat®

Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

Enterprise Linux 7 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

CentOS

CentOS 5 (Intel x86/x86 64)

CentOS 6 (Intel x86/x86 64)

CentOS 7 (Intel x86/x86 64)

Fedora

16,17, and 18 (Intel x86/x86 64)

SUSE® Linux

OpenSUSE 10 and 11 (Intel x86/x86 64)

Enterprise Desktop 10 and 11 (Intel x86/x86 64)

Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

Debian/Ubuntu

Debian GNU/Linux 6 (Intel x86/x86 64)

Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)

Oracle Linux

Oracle Linux 5 and 6 (Intel x86/x86 64)

Oracle VM

Oracle VM 2

XenServer

XenServer 5.6 and 6.0

VMware ESX Server

vSphere (ESX 4.0 and 4.1)

Solaris
Sun® Solaris8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)
HP-UX
HP® HP-UX

11.11, 11.23, 11.31 (PA-RISC 32/64 bit)

11.22, 11.23, 11.31 (IA64 32/64 bit)

AIX
IBM® AIX5.3, 6.1, and 7.1 (32/64 bit)
Mac OSXOSX 10.7 and 10.8

Resources

One Identity Safeguard for Sudo
Datasheet
One Identity Safeguard for Sudo
One Identity Safeguard for Sudo
Centralized management and reporting for the sudoers policy file
Read Datasheet
Securely Managing Your Unix Environment
White Paper
Securely Managing Your Unix Environment
Securely Managing Your Unix Environment
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
Read White Paper
Privileged Management Solutions Simplified
Privileged Management Solutions Simplified

02:35

Video
Privileged Management Solutions Simplified
Learn how Privileged Management Solutions from One Identity simplify privileged account management and let you enable super-user access without putting your entire organization at risk.
Watch Video
Hackers have an effective plan to get to your privileged accounts (Government)
Technical Brief
Hackers have an effective plan to get to your privileged accounts (Government)
Hackers have an effective plan to get to your privileged accounts (Government)
How to develop a three-step plan to stop evil doers from appropriating privileged accounts and damaging your agency. One Identity privileged account management solutions help make you more safe.
Read Technical Brief
Strategies for successfully managing privileged accounts
E-book
Strategies for successfully managing privileged accounts
Strategies for successfully managing privileged accounts
Securing, managing and governing superusers
Read E-book
Risk Management Best Practices for Privileged Access Management
White Paper
Risk Management Best Practices for Privileged Access Management
Risk Management Best Practices for Privileged Access Management
This paper on risk management for PAM gives you the foundation to protect privileged users and critical resources in your organization with a simple 8-step plan.
Read White Paper
2020 Gartner Magic Quadrant for Privileged Access Management
White Paper
2020 Gartner Magic Quadrant for Privileged Access Management
2020 Gartner Magic Quadrant for Privileged Access Management
In the 2020 Gartner Magic Quadrant for Privileged Access Management, Gartner evaluates the market and solutions from expert vendors in the Privileged Access Management (PAM) space.
Read White Paper
What do your peers have to say about One Identity Safeguard? Read this independent report to find out
White Paper
What do your peers have to say about One Identity Safeguard? Read this independent report to find out
What do your peers have to say about One Identity Safeguard? Read this independent report to find out
In the report, you will hear directly from people who have purchased, deployed and managed One Identity Safeguard
Read White Paper

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.