Learn how One Identity Privilege Manager for Sudo helps UNIX/Linux users enhance sudo privileged account management with a centralized policy server and quick access control reporting.
Privilege Manager for Sudo, part of the Privileged Access Suite for Unix, enables centralized management for sudoer policy files. Easily generate reports on sudoer access rights and activities, and keystroke logging of activities performed through sudo. With Privilege Manager for Sudo plug-ins, your organization can take privileged account management through sudo to the next level across a number of Unix/Linux servers.
Leverage plug-ins that extend your current Sudo environment instead of replacing it. As users access the root account the same way they did before there’s no need for additional training minimizing calls to the help desk and enabling you to realize a faster time to value.
Central sudo policy
Use a central service to enforce policy across any number of UNIX/Linux servers. This eliminates the need for administrators to deploy sudoers on every system, reducing administrative effort and improving security.
Use the Management Console for Unix to manage sudo and you get a single point of administration for multiple One Identity solutions. This greatly simplifies administration and audit-related tasks across your entire UNIX environment.
When you use Privilege Manager for Sudo, your organization can centralize sudo reporting. With the Management Console for Unix, you can track who, what and when changes were made to sudoers, including versioning (even reverting back to a previous version). It also delivers access and privilege reports that analyze the sudo configuration file, user accounts and group memberships. Plus, you can track who ran specific sudo commands across all managed systems and whether the commands were accepted or rejected.
Using the Privilege Manager for Sudo Keystroke Logging plug-in, all keystrokes of activities performed through sudo are logged. The keystroke log report is a comprehensive view of the activities and commands that are executed across all systems. You can filter the log report to quickly find the data you need.
Separation of duty enforcement
Using the Management Console for Unix, you can enforce the concept of separation of duty (SoD) and assign users a role, which allows them to only execute a defined set of tasks and no more.
Sudo Offline Policy Cache
Provides your organization with service continuity in the event of a network or server outage.
Privilege Manager for Sudo ensures compatibility of your script files that contain embedded sudo commands across your UNIX environment/infrastructure. This allow your organization to avoid run failures and the expense and effort to test and fix scripts.
The Privilege Manager for Sudo plug-ins require sudo 1.8.1 or later and will run on the following systems that have sudo installed.
The Management Console for Unix is browser-agnostic (supporting Internet Explorer, Firefox or Safari) and can be run from any Windows, Mac, Unix or Linux workstation.
|Operating System||Supported Version|
Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 7 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
CentOS 5 (Intel x86/x86 64)
CentOS 6 (Intel x86/x86 64)
CentOS 7 (Intel x86/x86 64)
16,17, and 18 (Intel x86/x86 64)
OpenSUSE 10 and 11 (Intel x86/x86 64)
Enterprise Desktop 10 and 11 (Intel x86/x86 64)
Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Debian GNU/Linux 6 (Intel x86/x86 64)
Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)
Oracle Linux 5 and 6 (Intel x86/x86 64)
Oracle VM 2
XenServer 5.6 and 6.0
|VMware ESX Server|
vSphere (ESX 4.0 and 4.1)
|Sun® Solaris||8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)|
11.11, 11.23, 11.31 (PA-RISC 32/64 bit)
11.22, 11.23, 11.31 (IA64 32/64 bit)
|IBM® AIX||5.3, 6.1, and 7.1 (32/64 bit)|
|Mac OSX||OSX 10.7 and 10.8|
Privileged Management Solutions Simplified
The 2017 Gartner Market Guide for Privileged Access Management (PAM) provides a detailed analysis of the PAM market as well as an in-depth examination of the solutions from over 24 different PAM vendors.
Get ready for May 2018 | Our eBook explains the what, why and how of the European Union’s General Data Protection Regulation (GDPR)?
How to develop a three-step plan to stop evil doers from appropriating privileged accounts and damaging your agency. One Identity privileged account management solutions help make you more safe.
Securing, managing and governing superusers
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
This white paper discusses 10 universal truths that, if allowed to influecne decisions, can dramatically imporve your IAM approach.
Easily overcome security and admin challenges inherent in UNIX-based systems
Extend the compliance and security of Active Directory to your enterprise
Define policies for root function access, as well as when and where this access is performed
Enhance security with two-factor authentication.