Active Directory and DirectControl

Size: px
Start display at page:

Download "Active Directory and DirectControl"

Transcription

1 WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now the de facto standard in most enterprises for providing authentication, authorization, account access, computer policy and infrastructure management for Windows systems and applications. Active Directory has proven itself to be highly scalable, very secure and resilient under just about any load. However, in many of these enterprises, there is usually no single way for providing these same services to UNIX, Linux, Mac and Javabased environments. Most companies end up managing these systems with a variety of directory solutions, some of which are centralized and some of which are managed at each individual machine. Huge benefits can be gained by consolidating identity, policy and infrastructure management into a single centralized solution, thereby saving time and money in administrative overhead, lowering training requirements and increasing productivity. With the popularity of Active Directory, many companies would like to leverage their Active Directory investment and offer these services beyond their Windows platforms. UNIX, Linux and Mac platforms are the second largest base of systems in many large companies, so integrating these systems into Active Directory would be highly beneficial. Fortunately, there is a solution to meet this need Centrify s DirectControl suite. This paper discusses the drivers for consolidating identity, policy and infrastructure management with Active Directory and accomplishing the integration of UNIX, Linux, Mac and Java with DirectControl.

2 ACTIVE DIRECTORY AND DIRECTCONTROL Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Centrify Corporation. Centrify may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Centrify, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Centrify Corporation. All rights reserved. Centrify and DirectControl are trademarks of Centrify Corporation in the United States and/or other countries. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. WP CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE II

3 ACTIVE DIRECTORY AND DIRECTCONTROL Contents 1 Why centralized directories make sense What is a centralized directory? Benefits of centralized directories Enterprise capabilities of Active Directory Active Directory's unique features and benefits The business case for Active Directory Extending Active Directory with Centrify DirectControl What is Centrify DirectControl? The combined benefits of DirectControl and Active Directory Centralized management and security Ease of use and increased productivity Lower cost Extensible identity and policy management Active Directory and DirectControl the right choice How to contact Centrify... 8 CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE III

4 1 Why centralized directories make sense 1.1 What is a centralized directory? Centralized directories for computing platforms have been around for almost as long as computer networks. The concept behind a directory was to provide a place to put user, and in some cases, computer account information so that a) information about a user, such as the user ID or the user s real name, was stored in a one consistent way and leveraged for each system that the user used, and b) information was stored in a central location instead of being copied or created on multiple different systems. Historically, each computer operating system evolved with its own directory system. On UNIX systems, Sun s Network Information System (NIS) became popular. On Windows systems, Novell s NDS and Microsoft s NT4 domain system were most commonly used in the 1990s. Typical directory situation with multiple identities across different systems In this decade, both UNIX and Windows directories have gradually evolved to favor Lightweight Directory Access Protocol (LDAP)-based technology. These solutions include Sun s Java System Directory Server (formerly known as iplanet or SunOne Directory), edirectory from Novell, OpenLDAP on Linux and Active Directory from CENTRIFY CORPORATION ALL RIGHTS RESERVED. 1

5 Microsoft. The good news for customers was that all these directories had a common underlying structure based on the LDAP protocol, and each system had a similar method for storing user and computer information. However, as is the case with most open systems technology, there were enough differences between each solution that in fact these systems did not fully interoperate. As a result, most organizations still end up maintaining separate directory systems for each operating system platform. Another critical factor that is driving customers to look for a single directory system is the need for tighter centralized security controls over the access of sensitive data. Enterprises want to ensure that users are granted secure access to only the systems, data and applications essential to their day-to-day jobs. Tracking and auditing system access is now a required feature as new rules for customer data protection are imposed on organizations. As the number of directories increased within an organization, the task of managing user access became more complex. The ideal solution would be to have one central, secure directory for all computers, and control user identity, access and policy from that one system. 1.2 Benefits of centralized directories Centralized directory services offer numerous benefits to the administrator and the computer user, including: User accounts can be stored in a single secure database as opposed to being stored and managed at each machine. The result is lower management costs because less time is required to provision or decommission a user s account even for use on multiple machines. Access permissions and policies can be centrally managed, resulting in better security for all systems. Administrators have immediate control over access to machines and no longer need to manage access rights machine by machine. Additionally, policies such as password length or access times can be easily applied to all systems. Centralized password management and consistent user names. Users can have one user ID and one password that work on multiple machines as opposed to having to remember different logins and passwords for each system. Once the decision has been made to consolidate directory services into fewer directory systems, the question arises: Which directory can best serve your organization? CENTRIFY CORPORATION ALL RIGHTS RESERVED. 2

6 2 Enterprise capabilities of Active Directory While many organizations that use Windows-based systems have moved to Microsoft s Active Directory system, most only use it for managing Windows accounts. This is because Microsoft provides little support for non-windows systems within Active Directory (although a NIS translator for Active Directory is available with the Microsoft Services for UNIX product). Other directories, such as Sun s Java System Directory Server or Novell s edirectory, may seem like more logical choices since they provide better cross-platform support. However, many customers are reluctant to use these products to serve Windows clients because of concerns over compatibility with directorybased Windows applications, such as Microsoft Exchange, SQL Server and Internet Information Services (IIS). Active Directory was designed to work with these applications. Other directory solutions may require substantial customization to work with these applications or, in some cases, may not work at all. In addition, Sun s directory was not designed as a Network Operating System directory for Windows workstations. Active Directory begins with a foundation of capabilities that are common to any enterprise directory. Active Directory provides: Centralized user and group account management, including the ability to maintain manager / worker relationships. Full control over password management including password aging, password complexity, and forced password resetting, as well as the ability to temporarily disable an account. Active Directory can also easily manage hours of use for each user and computer. A distributed model for high availability, increased performance and organizational compartmentalization, including the ability to manage crossdomain relationships and trusts. This means that users in each part of the organization can always access their systems, even in the event of a server failure. Most customers, however, now demand something more than just an enterprise user directory. Complex infrastructure environments, requirements for strong, verifiable security, and regulatory compliance have changed the way people think about identity management so much that the term enterprise authentication infrastructure probably better describes what most customers need. Meeting these additional challenges is where Active Directory really shines. 2.1 Active Directory's unique features and benefits Some of the unique technical features and benefits include: Active Directory is based on proven enterprise-ready technologies LDAP for directory services and Kerberos for secure authentication. Microsoft has uniquely CENTRIFY CORPORATION ALL RIGHTS RESERVED. 3

7 combined the strengths of these two technologies to best leverage the open extensibility of LDAP and the highly secure, ticket-based authentication of Kerberos. For example, a key advantage of Active Directory s ticket-based authentication system is that, once the user has successfully logged into a system, his or her credentials can be used to automatically access other systems and applications based on established security access rights. Microsoft s Group Policy capability extends Active Directory beyond identity and access management to policy and configuration management, which is crucial for meeting regulatory requirements. Administrators have full multi-level control over applying policies to accounts and systems through the Group Policy system. Active Directory further extends its management capabilities by integrating into the directory such key infrastructure services as DNS, VPN, certificate services, remote access services, printer management, Smartcard / biometric security and Radius. This means that different infrastructure services can be enabled for targeted machines and users, and these services can be associated with other services and system policies in a totally integrated way. Other infrastructure solutions such as Microsoft s ISA Server and Identity Integration Server also work within the Active Directory architecture. Additionally, applications can easily leverage the directory s account, computer and management interfaces to provide a seamlessly integrated, secure experience. Microsoft Exchange, IIS and SQL Server are just a few examples of Active Directory-integrated applications. End-users also have easy access to infrastructure information in Active Directory, using features such as looking up other users in the Global Catalog, location-based printer discovery and server browsing all without having to know directory and infrastructure concepts. Active Directory is now a mature, well established technology that has proven to be highly scalable and secure. Active Directory s distributed model automatically replicates information to other sites, even over slow links, thereby ensuring both fault tolerance with automated failover and increased performance through automated discovery of the closest Active Directory server. In addition, Active Directory is one of the easiest-to-use directory / infrastructure solutions in the market based on the familiar Windows look-and-feel and established interfaces such as Windows Wizards and the Microsoft Management Console (MMC). 2.2 The business case for Active Directory The business case for leveraging Active Directory as a true enterprisewide directory / infrastructure solution is also strong: Since Active Directory is an integral part of Windows infrastructure and networking, it has already become a ubiquitous and irreplaceable component within your IT environment. CENTRIFY CORPORATION ALL RIGHTS RESERVED. 4

8 Many organizations have already made investments to migrate to Active Directory and deploy it companywide. It makes good business sense to fully leverage those investments by extending Active Directory to other platforms, versus the cost of trying to maintain different solutions for different platforms. Typically, most of your organization s internal identity information is already stored in Active Directory. Why spend extra time, money and resources to move it or replicate it to another system? With Active Directory built and supported by Microsoft the largest software company in the world there is little risk in deploying an Active Directory solution. Microsoft is firmly committed to Active Directory and continues to invest in enhancing and expanding its capabilities. Given these capabilities, Active Directory would be an excellent choice to provide centralized, cross-enterprise directory and infrastructure services except that it is missing one essential feature it does not include capabilities to easily support non-windows client systems. However, the solution landscape has recently changed, and there is now a way to extend the features and benefits of Active Directory to non-windows systems and applications. Centrify s DirectControl suite includes all of the necessary software to allow UNIX, Linux, Mac and Java environments to use Active Directory as a central user identity, infrastructure and policy engine. 3 Extending Active Directory with Centrify DirectControl 3.1 What is Centrify DirectControl? The Centrify DirectControl suite is the only seamlessly integrated solution that comprehensively extends Microsoft Active Directory's identity management, access control and Group Policy services to your UNIX, Linux, Java and web platforms. Centrify DirectControl is quick and easy to deploy, does not require costly or intrusive changes to existing systems, and uniquely integrates your multiple UNIX/Linux identities into Active Directory. By using DirectControl, administrators no longer need to manage accounts on each individual UNIX, Linux or Mac system, but instead can use Active Directory for identity and policy management. On the Windows side, DirectControl consists of a console for Windows systems that is very similar to the Active Directory Users and Computers Microsoft Management Console. DirectControl enables the storage and management of UNIX user and computer attributes in Active Directory and joins these new attributes to existing user and group accounts. On the UNIX or Linux system, DirectControl consists of a service that controls login authentication and directory lookup services, and vectors those calls back to the Windows Active Directory system. Additionally, utilities are included to join the UNIX system to CENTRIFY CORPORATION ALL RIGHTS RESERVED. 5

9 the Active Directory domain and perform diagnostic tasks. The DirectControl suite is supported on most of the popular UNIX, Linux and Mac platforms in use today. 3.2 The combined benefits of DirectControl and Active Directory With both Active Directory and DirectControl installed, an organization can easily deploy a single directory capable of serving a vast majority of the users and computing platforms in the organization. In addition to the benefits of Active Directory highlighted earlier, the customer can now recognize substantial new benefits with the combination of the two technologies. The following sections describe these new benefits, which now span Windows, UNIX, Linux, Mac and Java platforms Centralized management and security One directory is now used for managing access to Windows and UNIX-based systems, including logon times and permitted users and groups. The administrator can use a central console to temporarily disable access to systems or user accounts to allow for maintenance or security tasks. One single account record is used for each user s identity, password and credential information. The system also manages password policies such as length, complexity, resets, login failure lockouts and aging. Administrators can provision or decommission users for all systems with one account record update. Active Directory s highly secure, token-based authentication, using industry standard Kerberos, can be used across Windows, UNIX, Linux, Mac and Java platforms. This results in a single sign-on experience that spans all Windows, UNIX and Linux systems. DirectControl allows you to map special UNIX accounts such as root to trusted Active Directory users. No longer do administrators have to manage special UNIX accounts machine by machine. Groups can be managed centrally, including the ability to map UNIX groups to Active Directory groups. Using DirectControl Zones, IT managers have the ability to also manage access to systems based on pre-established roles. Access rights for each user, group and computer can easily be mapped and tracked using the tools in DirectControl and Active Directory. In addition, the logging of user logins and system access attempts, for all systems in the domain, is stored in one central location. These reporting tools help with conformance of data access regulations Ease of use and increased productivity Both the Active Directory solution set and the DirectControl suite leverage the same, easy-to-use, Windows-based interface through Wizards and Microsoft Management Consoles. CENTRIFY CORPORATION ALL RIGHTS RESERVED. 6

10 Users now have a single username and password that can be used to access all authorized systems. Users are no longer required to memorize and manage passwords as they move from one platform to the next. Through DirectControl s credential caching feature, UNIX users are now able to log into their systems even if they are disconnected from the central network. This is consistent with the standard Windows client user experience, which supports offline domain user logins Lower cost Companies will see lower management and training costs due to the use of a single consolidated interface for identity, policy and infrastructure management. IT departments no longer need to purchase and maintain directory and user licenses and support contracts for multiple directory systems. The combination of DirectControl and Active Directory leverages your existing investment in Microsoft licenses, support, applications and knowledge Extensible identity and policy management The Group Policy engine can now be leveraged to manage system policies across all platforms. Developers have the ability to extend Active Directory-enabled applications beyond Windows to UNIX and Java-based applications. Centrify s DirectControl is the only solution to offer you the flexibility to maintain multiple UNIX IDs linked to a single Active Directory account using DirectControl Zones. This feature is indispensable for IT managers who are migrating multiple legacy identity systems to Active Directory. 4 Active Directory and DirectControl the right choice The possibility of managing user identity information, security credentials, system policy and infrastructure services across multiple systems from a single enterprise directory has been a goal of IT managers for years. Active Directory is a proven, secure, scalable, highly available distributed infrastructure and identity management solution. Active Directory is backed by the world s largest software vendor Microsoft and is therefore a low risk, well supported, long-term solution. DirectControl is built by a leading identity management firm, and Centrify has established strong partnering relationships with Microsoft and other major enterprise vendors. CENTRIFY CORPORATION ALL RIGHTS RESERVED. 7

11 With Centrify s DirectControl and Microsoft s Active Directory, you can now extend the directory you already own to UNIX, Linux, Mac and Java environments and realize substantial benefits for your organization through lower costs, better security, simplified management and increased productivity. Single identity and policy directory using DirectControl and Active Directory 5 How to contact Centrify Centrify Corporation 444 Castro St., Suite 1100 Mountain View, CA U.S. Sales Office: +1 (650) Enquiries: info@centrify.com Web site: CENTRIFY CORPORATION ALL RIGHTS RESERVED. 8

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution

More information

Centrify-Enabled Samba

Centrify-Enabled Samba CENTRIFY CORP. Centrify-Enabled Samba DECEMBER 2009 The easy-to-manage enterprise solution for Active Directory-enabled Samba file sharing ABSTRACT Samba is one of the most popular open source technologies

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

How To Use Directcontrol With Netapp Filers And Directcontrol Together

How To Use Directcontrol With Netapp Filers And Directcontrol Together Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl

More information

Centrify's Solution for Migrating UNIX Directories to Active Directory

Centrify's Solution for Migrating UNIX Directories to Active Directory WHITE PAPER CENTRIFY CORP. JANUARY 2007 Centrify's Solution for Migrating UNIX Directories to Active Directory Leveraging Centrify s DirectControl and Zone Technology to Simplify Migration ABSTRACT Microsoft

More information

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

Managing UNIX Generic and Service Accounts with Active Directory

Managing UNIX Generic and Service Accounts with Active Directory APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer

More information

Windows Security and Directory Services for UNIX using Centrify DirectControl

Windows Security and Directory Services for UNIX using Centrify DirectControl SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory

More information

Major Retailer Achieves Compliance With the PCI Data Security Standard

Major Retailer Achieves Compliance With the PCI Data Security Standard Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting

More information

Centrify Identity and Access Management for Cloudera

Centrify Identity and Access Management for Cloudera Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization

More information

Centralized Mac Home Directories with ExtremeZ-IP

Centralized Mac Home Directories with ExtremeZ-IP APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most

More information

Virtualization Case Study

Virtualization Case Study INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Author: Manny Vellon VP, Product Development Centeris Corporation Abstract This document describes how Centeris Likewise Identity improves the

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

Mac OS X and Directory Services Integration

Mac OS X and Directory Services Integration Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India setia_neha@yahoo.co.in 2 Assistant Professor, CBS

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Automating Cloud Security with Centrify Express and RightScale

Automating Cloud Security with Centrify Express and RightScale QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start

More information

Samsung KNOX: An Overview for Business Customers

Samsung KNOX: An Overview for Business Customers CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms

More information

Office 365 Single Sign-On: High Availability Without High Complexity

Office 365 Single Sign-On: High Availability Without High Complexity WHITE PAPER Office 365 Single Sign-On: High Availability Without High Complexity WWW.CENTRIFY.COM Office 365 Single Sign-On: High Availability without High Complexity Contents Abstract 3 Introduction 4

More information

Using Apple Remote Desktop to Deploy Centrify DirectControl

Using Apple Remote Desktop to Deploy Centrify DirectControl APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management

More information

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity

More information

Microsoft and Novell - A Case Study in Identity Federation

Microsoft and Novell - A Case Study in Identity Federation Boosting interoperability and collaboration across mixedtechnology environments Standards-based identity federation solutions from Microsoft and Novell May 2009 Executive summary Despite remarkable gains

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Active Directory Compatibility with ExtremeZ-IP

Active Directory Compatibility with ExtremeZ-IP Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP

More information

Best Practices for Adding Macs to Microsoft Networks

Best Practices for Adding Macs to Microsoft Networks WHITE PAPER Best Practices for Adding Macs to Microsoft Networks WWW.CENTRIFY.COM Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge

More information

Single Sign-On for Kerberized Linux and UNIX Applications

Single Sign-On for Kerberized Linux and UNIX Applications Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Centralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic

Centralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic Centralizing Mac Home Directories on Windows Servers Live Webinar David McNeely Centrify Geordie Korper Group Logic Agenda EDA Overview Centrify DirectControl Group Logic ExtremeZ-IP Centralizing Home

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

PeopleSoft Enterprise Directory Interface

PeopleSoft Enterprise Directory Interface PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective

More information

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite The Centrify Suite is an integrated

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

How the Quest One Identity Solution Products Enhance Each Other

How the Quest One Identity Solution Products Enhance Each Other Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary

More information

Centrify Suite 2012 Express

Centrify Suite 2012 Express Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms

More information

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide

More information

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1 Lab Answer Key for Module 9: Active Directory Domain Services Table of Contents Lab 1: Exploring Active Directory Domain Services 1 Information in this document, including URL and other Internet Web site

More information

Macintosh Printer Management using Centrify DirectControl Group Policies

Macintosh Printer Management using Centrify DirectControl Group Policies WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

Integrated Authentication

Integrated Authentication Integrated Authentication Information Security Introduction Information security has become an increasingly visible and important topic to companies. Driven by a number of highly publicized security breaches

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

Centrify Server Suite 2014

Centrify Server Suite 2014 Centrify Server Suite 2014 Administrator s Guide for Linux and UNIX June 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Utilizing LDAP for User Profile and Corporate Structure Integration

Utilizing LDAP for User Profile and Corporate Structure Integration ISI SOLUTIONS WHITE PAPER Utilizing LDAP for User Profile and Corporate Structure Integration By: Mitchell Weiss Director of Product Strategy ISI Telemanagement Solutions, Inc. At A Glance: In cases where

More information

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure

More information

Host Access Management and Security Server

Host Access Management and Security Server Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.

More information

White Paper. Software version: 5.0 www.wmsoftware.com

White Paper. Software version: 5.0 www.wmsoftware.com Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management

More information

ADMT v3 Migration Guide

ADMT v3 Migration Guide ADMT v3 Migration Guide Microsoft Corporation Published: November 2006 Abstract This guide explains how to use the Active Directory Migration Tool version 3 (ADMT v3) to restructure your operating environment.

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl

Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. APRIL 2006 Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl Centrify DirectControl delivers secure access control and centralized

More information

Management Reporter Integration Guide for Microsoft Dynamics GP

Management Reporter Integration Guide for Microsoft Dynamics GP Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics GP July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565

More information

Active Directory and Linux Identity Management

Active Directory and Linux Identity Management Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information

More information

ProxySG TechBrief LDAP Authentication with the ProxySG

ProxySG TechBrief LDAP Authentication with the ProxySG ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned

More information

Using Centrify s DirectControl with Mac OS X

Using Centrify s DirectControl with Mac OS X WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.

More information

Module 1: Introduction to Active Directory Infrastructure

Module 1: Introduction to Active Directory Infrastructure Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19

More information

Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide

Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step

More information

IBM Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and

More information

Windows Authentication on Microsoft SQL Server

Windows Authentication on Microsoft SQL Server Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication

More information

Microsoft Windows Server 2003 and Tecplot Software

Microsoft Windows Server 2003 and Tecplot Software Microsoft Windows Server 2003 Customer Solution Case Study Visualization Software Company Extends Windows-based Security Model and Management Tools to Linux Systems Overview Country or Region: United States

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Stop Password Sprawl with SaaS Single Sign-On via Active Directory CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

SmoothWall Virtual Appliance

SmoothWall Virtual Appliance SmoothWall Virtual Appliance Quick Start Guide Quick Deployment Guide Quick Start Guide Winfrasoft SmoothWall Appliance Quick Start Guide Published: May 2013 Applies to: Winfrasoft Gateway Appliance Web

More information

Migrating Active Directory to Windows Server 2012 R2

Migrating Active Directory to Windows Server 2012 R2 Migrating Active Directory to Windows Server 2012 R2 Windows Server 2012 R2 Hands-on lab In this lab, you will complete a migration of a Windows Server 2008 R2 domain environment to Windows Server 2012

More information

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,

More information

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Copyright and Trademark Notices Use of the product documented herein is subject to your prior acceptance of the End

More information

Microsoft Hyper-V Server 2008 R2 Getting Started Guide

Microsoft Hyper-V Server 2008 R2 Getting Started Guide Microsoft Hyper-V Server 2008 R2 Getting Started Guide Microsoft Corporation Published: July 2009 Abstract This guide helps you get started with Microsoft Hyper-V Server 2008 R2 by providing information

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

etoken TMS (Token Management System) Frequently Asked Questions

etoken TMS (Token Management System) Frequently Asked Questions etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information