For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Safeguard Security Suite for Unix / Linux

Simplify UNIX/Linux access management and security and meet compliance 

One Identity Safeguard Authentication Services Overview 04:48
Easily overcome security and administration challenges inherent in UNIX/Linux-based systems — and achieve compliance — with the Safeguard Privileged Security Suite for Unix. A one-stop shop for UNIX/Linux access management and security, this powerful suite combines an Active Directory bridge with the enhanced auditing and reporting of Sudo activities. It consolidates and unifies UNIX, Linux and Mac OS X identities. Plus, it assigns, records and audits all Sudo keystroke activity, as well as centralizes access reporting of the UNIX root account. You get complete visibility, and streamlined identity administration and access-rights management for UNIX/Linux environments

Key benefits

Eliminate Complexity
Single source for Windows, UNIX and Linux authentication 
Improve Efficiency
Improves efficiency and policy consistency with centralized management of sudo across all your UNIX/Linux servers
Simplify Compliance
Quickly see the information you need with centralized reporting on sudo policy, activities and history
Enhance Security
Increased security with Kerberos authentication, single sign-on and keystroke logging of all sudo activity

Features

Active Directory for UNIX, Linux and Mac

Extend the authentication, authorization and administration infrastructure of Active Directory to the rest of your enterprise. This enables UNIX, Mac OS X and Linux systems to operate as full citizens within Active Directory.

Extend Sudo

Leverage plug-ins that extend your current Sudo environment instead of replacing it. Users access the root account the same way they did before there’s no need for additional training minimizing calls to the help desk.

Audit, alerting and change tracking

Authentication Services enables you to alert on, audit and show in-depth change history of UNIX-centric information being managed by Active Directory.

Central sudo policy

Use a central service to enforce policy across all of your UNIX/Linux servers. This eliminates the need for administrators to deploy sudoers on every system, reducing administrative effort and improving security.

Keystroke logging

All sudo keystrokes are logged. The keystroke log report is a comprehensive view of the activities and commands executed across all systems. You can filter the log report to quickly find the data you need.

Group Policy for UNIX, Linux and Mac

Extend policy-based management (through Windows Group Policy) to non-Windows systems, including Group Policy for Mac OS X using the product’s patented framework.

Centralized reporting

Easily track who, what and when changes were made to sudoers, including versioning. Reports analyze the sudo configuration file, user accounts and group memberships. Plus, you can track who ran specific sudo commands across all systems and whether the commands were accepted or rejected.

Single sign-on (SSO)

Implement ‘Kerberized’ and LDAP SSO to UNIX, Linux and Mac OS X systems in the same way they’re used in Windows. You also get out-of-the-box single sign-on for a variety of applications, including Siebel, SAP and DB2.

Sudo Offline Policy Cache

Provides your organization with service continuity in the event of a network or server outage.

Script compatibility

Safeguard for Sudo ensures compatibility of your script files that contain embedded sudo commands across your UNIX environment/infrastructure. With this, you can avoid run failures, and the expense and effort to test and fix scripts.

Resources

Privileged Access Suite for Unix
Datasheet
Privileged Access Suite for Unix
Privileged Access Suite for Unix
Simplify UNIX/Linux access management to enhance security and compliance.
Read Datasheet
Securely Managing Your Unix Environment
White Paper
Securely Managing Your Unix Environment
Securely Managing Your Unix Environment
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
Read White Paper
University of East Anglia: UK university cuts IT burden with Unix/Linux single sign-on
Case Study
University of East Anglia: UK university cuts IT burden with Unix/Linux single sign-on
University of East Anglia: UK university cuts IT burden with Unix/Linux single sign-on
University of East Anglia achieves 100 percent ROI in just nine months with Authentication Services.
Read Case Study
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
White Paper
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution
AD bridge solutions address this problem by enabling Unix, Linux, and Mac OS X systems to participate as “full citizens” in Active Directory.
Read White Paper
Learn how to enable privileged management with One Identity solutions
Learn how to enable privileged management with One Identity solutions

02:32

Video
Learn how to enable privileged management with One Identity solutions
This video will show you how to centrally manage privileged accounts, using the policy-based workflows provided by One Identity solutions.
Watch Video
Next-Gen Privileged Access Management is here!
E-book
Next-Gen Privileged Access Management is here!
Next-Gen Privileged Access Management is here!
Read how seven unique organizations are boosting security, gaining efficiency and experiencing agility. That's next-gen PAM!
Read E-book
Why Privileged Access Management Should Matter to You
Infographic
Why Privileged Access Management Should Matter to You
Why Privileged Access Management Should Matter to You
Why Privileged Access Management Should Matter to You
View Infographic
PAM - Choosing the Right Form Factor for You
Technical Brief
PAM - Choosing the Right Form Factor for You
PAM - Choosing the Right Form Factor for You
This technical brief is designed to outline some key considerations when considering the ideal type of PAM solution for your organization
Read Technical Brief

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.