Taking Unix Identity and Access Management to the Next Level
|
|
|
- Kristopher Hawkins
- 10 years ago
- Views:
Transcription
1 Taking Unix Identity and Access Management to the Next Level Now that you ve taken care of local users and groups what s next? Written by Quest Software, Inc. TECHNICAL BRIEF
2 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Quest Software, Inc. ( Quest ). The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA [email protected] Refer to our Web site for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight, ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, itoken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest Central, Quest vtoolkit, Quest vworkspace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab, Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vautomator, vcontrol, vconverter, vfoglight, voptimizer, vranger, Vintela, Virtual DBA, VizionCore, Vizioncore vautomation Suite, Vizioncore vbackup, Vizioncore vessentials, Vizioncore vmigrator, Vizioncore vreplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. Other trademarks and registered trademarks used in this guide are property of their respective owners. Technical Brief: Taking Unix Identity and Access Management to the Next Level 1
3 Contents Abstract... 3 The Problem with Unix... 4 Quest Identity Manager for Unix and Quest Authentication Services... 5 Local User and Group Management... 5 Authentication and Single Sign-on... 5 Group Policy... 5 NIS Migration... 6 Strong Authentication... 6 Audit, Alerting, and Change Tracking... 6 Conclusion... 8 Technical Brief: Taking Unix Identity and Access Management to the Next Level 2
4 Abstract One of the biggest challenges facing administrators of Unix and Linux systems is the management of local users and groups. Typically these accounts must be managed individually, on a box-by-box basis, or by using cumbersome and limited tools. Quest Identity Manager for Unix overcomes these deficiencies by providing a web-based console that enables administrators to remotely manage all Unix/Linux users and groups from a single, centralized interface. The benefits of centralized management are obvious, but Identity Manager for Unix extends these benefits to truly simplify identity and access management for Unix systems. This technical brief explains how you can not only move to centralized management of local Unix users and groups, but to full identity and access management without adding infrastructure, relying on obsolete and non-compliant technologies (such as NIS), or deploying cumbersome and limited synchronization solutions. Identity Manager for Unix provides the path to:. Full Kerberos authentication and single sign-on for Unix, Linux, and Mac systems Group Policy-based management of Unix, Linux, and Mac Complete migration from NIS Centralization and consolidation of identities Strong authentication Reporting on Unix-related identity and access information Auditing, alerting, and change tracking Streamlining of identity administration tasks around a single identity and a single administrator action Security and compliance for Unix, Linux, and Mac systems Technical Brief: Taking Unix Identity and Access Management to the Next Level 3
5 The Problem with Unix None of us can survive without our Unix and Linux systems. They host critical data and applications, and the diversity they bring insulates our businesses from being held hostage by any one platform vendor. Unfortunately, Unix systems pose significant challenges when it comes to correlating a single physical user s access with the dozens, hundreds, or even thousands of individual Unix systems that he must access. Typically n an organization with 100 Unix servers, each user could have 100 local accounts (one on each box) and be a member of hundreds of locally-managed groups. This means there could be 100 passwords to be managed, 100 separate provisioning actions, and 100 trips to servers to manually audit the rights and specifics of each user s 100 accounts. Who does all this work? You do. But is that really where you should be spending your time? Or even where you want to be spending your time? Technical Brief: Taking Unix Identity and Access Management to the Next Level 4
6 Quest Identity Manager for Unix and Quest Authentication Services Local User and Group Management Quest Identity Manager for Unix overcomes many of these challenges by providing a centralized, webbased console that makes the management of local Unix users and groups intuitive, convenient, and more cost-effective. But Identity Manager for Unix doesn t stop at the local user and group level. While you were using the tool, you may have noticed its capacity to assess Unix systems for Active Directory bridge readiness. But what does that mean? Active Directory (AD) bridge solutions, such as Quest Authentication Services, enable Unix systems to take advantage of the Kerberos authentication, Group Policy, and centralized identity management capabilities of Microsoft Active Directory. When Unix systems become full citizens in Active Directory through Authentication Services, many, if not all, of the most pressing Unix identity and access management challenges disappear. Recall our example above of the user who has 100 Unix identities, one on each box. Using Authentication Services, these 100 Unix identities can be retired the user s single Active Directory account can provide the necessary access, authentication, and authorization services to all Unix systems. Imagine the relief that this will provide to your Unix administrators, not to mention your Unix users! No longer will a user have 100 passwords that need 100 individual resets from the Unix administration team. When a new user comes on board, Unix administrators no longer need to physically go to 100 Unix boxes and provision 100 user accounts and grant membership to all necessary groups. And even more important, when a user leaves the organization, a single AD-based deprovisioning action terminates access across all 100 Unix systems eliminating the security holes and compliance violations that typically accompany these events. In addition to providing these local user and group management capabilities, Identity Manager for Unix acts as the management console that unlocks the full Authentication Services functionality that truly simplifies identity and access management. The most important of those capabilities are discussed below. Authentication and Single Sign-on Quest Authentication Services provides the necessary integration to enable Unix, Linux, and Mac systems to act as full citizens in Active Directory. The heart of this functionality is centralized authentication and single sign-on for Unix systems. The solution provides the integration between Unix s native PAM and NSS components with the Kerberos and LDAP provided by AD. From within Identity Manager for Unix, the Join Unix System to AD command moves authentication from native Unix protocols to the more secure, efficient, and compliant Kerberos capabilities of Active Directory. This join functionality extends from simple mapping of a Unix account to a corresponding AD account for authentication and password policy, to full migration from Unix identity to an entirely ADbased, consolidated identity scenario. For more information, visit us on the web for a deeper discussion of single sign-on through Authentication Services. Group Policy One of the biggest benefits of making Unix systems full citizens in Active Directory is streamlining management through Group Policy principles leveraging the Active Directory Group Policy framework. Quest Authentication Services provides the industry s most powerful extension of Windows Group Policy to Unix, Linux, and Mac, including: Technical Brief: Taking Unix Identity and Access Management to the Next Level 5
7 Pre-built policies for critical operations (such as configuring and administering elevated privilege delegation) A full management interface for Group Policy management of the complete set of Mac preferences and settings Management of strong authentication All the flexibility to leverage Group Policy for virtually any task that may be required All of the full-featured power of Group Policy is launched, controlled, monitored, and audited through Identity Manager for Unix on Authentication Services-enabled Unix, Linux, and Mac systems. To learn more about the powerful Group Policy capabilities of Authentication Services, read the technical brief Enterprise Group Policy. NIS Migration Quest Authentication Services provides all the tools to migrate Unix identity and access management from Network Information Service (NIS) into the more secure and compliant Active Directory infrastructure. The process of migrating from NIS to unified, AD-based IAM requires significant planning, careful system and identity assessment, and reconciliation of NIS data with the newly-unified AD identity namespace. Identity Manager for Unix provides intuitive access and powerful control over the entire process of NIS migration, as well as access to all of the Authentication Services capabilities needed to execute the migration in a controlled, transparent, and safe manner. These capabilities include: Mapping and editing existing NIS maps for AD-based IAM Alignment of Unix ownerships Reconciliation of disparate identity information Reporting on identity, access, and migration progress, including what if pre-assessment of planned migration activities Roll-back to previous states For a complete discussion of Authentication Services s tools and capabilities for NIS migration, read the technical brief Quest Authentication Services: A Comprehensive Solution for NIS Migration. Strong Authentication Every installation of Authentication Services 4.0 includes strong authentication through Quest Defender (25 user licenses and 25 one-time password tokens). This empowers organizations to add a deeper level of security to Unix authentication. You can use Identity Manager for Unix to configure and manage the two-factor solution for Authentication Services-enabled Unix systems, and control it through Group Policy. To learn more about Quest Defender and its strong authentication capabilities, visit Audit, Alerting, and Change Tracking In addition to the local Unix user and group reporting and AD-bridge readiness assessments available in Identity Manager for Unix, Authentication Services provides full auditing, alerting, and change tracking for Unix systems that participate as full citizens in Active Directory. This expanded audit functionality is available through Quest ChangeAuditor, which is included with each Authentication Services 4.0 installation. Available information includes: NIS object settings and changes Personality object settings and changes Technical Brief: Taking Unix Identity and Access Management to the Next Level 6
8 Computer object and attribute settings and changes GPO settings and changes The state of Unix GECOS, User, Group, Name, Directory, Login, ID, Shell, etc., as well as changes to all of these To learn more about Quest ChangeAuditor, visit Technical Brief: Taking Unix Identity and Access Management to the Next Level 7
9 Conclusion Integrating Unix, Linux, and Mac systems with AD has quickly become mainstream since Quest introduced the first AD bridge solution with Authentication Services in In fact, more than 2,000 companies have adopted Active Directory-bridge technologies, according to a 2009 Burton Group report. But today s Unix organization demands more than simple AD-based authentication. With Identity Manager for Unix, Quest brings the path to AD bridge to the masses. This freeware web console provides powerful, centralized management of local Unix users and groups and readiness assessments for moving to AD bridge through Authentication Services. Identity Manager for Unix also provides a simple path to a full AD bridge by launching the full range of Authentication Services capabilities to Authentication Services-enabled systems. To try Authentication Services for yourself, download a free trial, watch a recorded demo, or take the solution for a QuestDrive. Technical Brief: Taking Unix Identity and Access Management to the Next Level 8
10 TECHNICAL BRIEF About Quest Software, Inc. Now more than ever, organizations need to work smart and improve efficiency. Quest Software creates and supports smart systems management products helping our customers solve everyday IT challenges faster and easier. Visit for more information. Contacting Quest Software PHONE (United States and Canada) If you are located outside North America, you can find your local office information on our Web site. MAIL Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA WEB SITE Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around-the-clock coverage with SupportLink, our Web self-service. Visit SupportLink at SupportLink gives users of Quest Software products the ability to: Search Quest s online Knowledgebase Download the latest releases, documentation, and patches for Quest products Log support cases Manage existing support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policies and procedures. 5 Polaris Way, Aliso Viejo, CA PHONE WEB [email protected] If you are located outside North America, you can find your local office information on our Web site 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Quest Software is a registered trademark of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBW_UnixIAM_Peterson_US_MJ
10.2. Auditing Cisco PIX Firewall with Quest InTrust
10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.
An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with
Direct Migration from SharePoint 2003 to SharePoint 2010
Direct Migration from SharePoint 2003 to SharePoint 2010 It s Easy with Quest Migration Manager for SharePoint Written By Alexander Kirillov, Quest Software TECHNICAL BRIEF 2010 Quest Software, Inc. ALL
Eight Best Practices for Identity and Access Management
Eight Best Practices for Identity and Access Management BUSINESS BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this
Go Beyond Basic Up/Down Monitoring
Go Beyond Basic Up/Down Monitoring Extending the Value of SCOM with Spotlight on SQL Server Enterprise and Foglight Performance Analysis for SQL Server Introduction Microsoft Systems Center Operations
Secure and Efficient Log Management with Quest OnDemand
Secure and Efficient Log Management with Quest OnDemand TECHNICAL BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of
Migrating Your Applications to the Cloud
Migrating Your Applications to the Cloud How to Overcome the Challenges and Reduce the Costs Written By Quest Software, Inc. Contents Abstract... 2 Introduction... 3 What is the Cloud?... 3 Current and
Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference
Quest ChangeAuditor For Windows File Servers 5.0 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Using Stat with Custom Applications
Using Stat with Custom Applications Written by Quest Software Inc. TECHNICAL BRIEF 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright.
Key Methods for Managing Complex Database Environments
Key Methods for Managing Complex Database Environments Written by Dave Pearson Senior Project Manager Quest Software, Inc. WHITE PAPER Contents Abstract... 4 Introduction... 5 Balancing Key Business Needs...
Foglight 5.5.4.5 for SQL Server
Foglight 5.5.4.5 for SQL Server Managing SQL Server Database Systems 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Proactive Performance Management for Enterprise Databases
Proactive Performance Management for Enterprise Databases Written by Dave Pearson, Senior Product Manager, Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document
Quest Management Agent for Forefront Identity Manager
Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
Quest One Privileged Account Appliance
Quest One Privileged Account Appliance Security Architecture Written By Quest Software, Inc. Contents Abstract... 2 Introduction... 3 Enhanced Privileged Account Management with Quest One... 3 About this
The Case for Quest One Identity Manager
The Case for Quest One Identity Manager How Four Organizations Simplified and Transformed Identity and Access Management BUSINESS BRIEF 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Six Steps to Achieving Data Access Governance. Written By Quest Software
Six Steps to Achieving Data Access Governance Written By Quest Software Contents Abstract... 2 It s the Wild West Out There... 3 The Problems with Current Practices... 4 Inefficiency... 4 Ineffectiveness...
Toad for Oracle Compatibility with Windows 7 Revealed
Toad for Oracle Compatibility with Windows 7 Revealed Written by John Pocknell Quest Software TECHNICAL BRIEF Contents Contents... 1 Abstract... 2 Introduction... 3 Testing... 4 Possible Issues... 5 Issue
An Innovative Approach to SOAP Monitoring. Written By Quest Software
An Innovative Approach to SOAP Monitoring Written By Quest Software Contents Introduction...2 SOAP Overview...3 The SOAP Monitoring Challenge...6 From the Service Consumer Perspective...6 From the Service
Enterprise Single Sign-On 8.0.3
For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary
Top Seven Tips and Tricks for Group Policy in Windows 7
Top Seven Tips and Tricks for Group Policy in Windows 7 Written by Jeremy Moskowitz, Microsoft Group Policy MVP, GPanswers.com WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel
l 10.3 1.0 Installation Auditing and Configuration Microsoft ISA Server Guide How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS RESERVED.
6.0. Planning for Capacity in Virtual Environments Reference Guide
6.0 Planning for Capacity in Virtual Environments 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Quest Application Performance Monitoring Implementation Methodology
Quest Application Performance Monitoring Implementation Methodology 02-03-11 1 Contents Contents... 2 Objectives... 3 Quest APM Implementation Phases... 4 Phase I: Business Requirements Assessment... 4
Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide
Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains
Choosing the Right Active Directory Bridge Solution
Choosing the Right Active Directory Bridge Solution Written by Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by
How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel
l 10.3 1.0 Auditing Installation and and Monitoring Configuration Microsoft Guide IIS How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS
The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?
The Active Directory Recycle Bin: The End of Third-Party Recovery Tools? Written by Don Jones Microsoft MVP White Paper 2009 Quest Software, Inc. All rights reserved. This guide contains proprietary information,
Are You Spending More than You Realize on Active Directory Management?
Are You Spending More than You Realize on Active Directory Management? Curbing Costs with Unified AD Management Written By Jeffery D. Hicks Principal Consultant JDH Information Technology Solutions, Inc.
Achieving ISO/IEC 27001 Compliance with Quest One Solutions for Privileged Access. Written By Quest Software, Inc.
Achieving ISO/IEC 27001 Compliance with Quest One Solutions for Privileged Access Written By Quest Software, Inc. Contents Abstract... 2 Introduction... 3 About BS ISO/IEC 27001:2005... 3 About ISO 27001
2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer
6.5 User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Protecting and Auditing Active Directory with Quest Solutions
Protecting and Auditing Active Directory with Quest Solutions Written by Randy Franklin Smith CEO, Monterey Technology Group, Inc. Publisher of UltimateWindowsSecurity.com TECHNICAL BRIEF 2010 Quest Software,
Unified and Intelligent Identity and Access Management
Unified and Intelligent Identity and Access Management Authors Jackson Shaw Quest Software, Inc. WHITE PAPER 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information
6.5. Web Interface. User Guide
6.5 Web Interface User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard
Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard Written by Keith Ridings, Product Manager, GroupWise Migration Dan Gauntner, Product Marketing
Extending Native Active Directory Capabilities to Unix and Linux
Extending Native Active Directory Capabilities to Unix and Linux Quest Authentication Services is the Foundation for an Enterprise-wide, Active Directory-based, Identity Management Strategy Written by
Quest Support: vworkspace Troubleshooting Guide. Version 1.0
Quest Support: vworkspace Troubleshooting Guide Version 1.0 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
The Quest Cloud Automation Platform
The Quest Cloud Automation Platform Written by Dave Malcom Vice President and Chief Technologist, Virtualization and Cloud, Quest Software, Inc. BUSINESS BRIEF Contents Abstract... 3 Introduction... 4
Exchange 2010 and Your Audit Strategy
Exchange 2010 and Your Audit Strategy Authors Valentine Boiarkine Software Architect, Blade Contributors Jamie Manuel Product Marketing Manager, Quest Software Keith Bick Editor, Blade WHITE PAPER 2010
Quest Solutions for PCI Compliance
Quest Solutions for PCI Compliance Effective Data Access Controls and Data Protection Management for Complying with the Payment Card Industry Data Security Standard Written by Quest Software, Inc. TECH
Top Five Reasons to Choose Toad Over SQL Developer
Top Five Reasons to Choose Toad Over SQL Developer Written By: John Pocknell Senior Product Manager Quest Software Contents Abstract... 2 Introduction... 3 Toad for Oracle... 5 SQL Developer... 7 Top Five
Foglight 5.2.0. Foglight Experience Viewer (FxV) Upgrade Field Guide
Foglight 5.2.0 Foglight Experience Viewer (FxV) 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is
Best Practices for SharePoint Development and Customization
Best Practices for SharePoint Development and Customization Written By: Mario Fulan, MCM, Account Technology Strategist, Microsoft Ricardo Wilkins, SharePoint Practice Lead, Improving Enterprises Contents
Controlling & Managing Super User Access
Controlling & Managing Super User Access A Primer on Privileged Account Management Written by Kris Zupan Chief Architect Quest Software WHITE PAPER 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document
Defender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Migrating Lotus Notes Applications to Microsoft Office 365 and SharePoint Online
Migrating Lotus Notes Applications to Microsoft Office 365 and SharePoint Online Author Steve Walch Senior Product Manager Quest Software WHITE PAPER 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
Authentication Services 4.1. Authentication Services Single Sign-on for SAP Integration Guide
Authentication Services 4.1 Authentication Services Single Sign-on for SAP Integration Guide Copyright 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
Benchmark Factory for Databases 6.5. User Guide
Benchmark Factory for Databases 6.5 User Guide Copyright 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
Quest ActiveRoles Server
Quest ActiveRoles Server Deployment Best Practices Written by Quest Software, Inc. TECH BRIEF 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Foglight. Managing Java EE Systems Supported Platforms and Servers Guide
Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Quest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
How the Quest One Identity Solution Products Enhance Each Other
Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary
Data Center Consolidation Strategies for the Federal CIO
Data Center Consolidation Strategies for the Federal CIO Written by Quest Software, Inc. WHITE PAPER Contents Abstract... 3 Introduction... 4 The Role of the CIO in Consolidation... 6 Taking the Strategic
System Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
Defender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Enterprise Single Sign-On 8.0.3. Getting Started with SSOWatch
Enterprise Single Sign-On 8.0.3 Getting Started with SSOWatch Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected by
Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide
Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
Quest One Password Manager
Quest One Password Manager Version 5.0 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
Quest Software Product Guide
Quest Software Product Guide Quest Software knows the expectations customers have for IT investments are not always met. That s why we develop innovative products that help our customers get more performance
for Oracle 7.5.3 User Guide
Quest SQL Optimizer for Oracle 7.5.3 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is
Enterprise Single Sign-On 8.0.3 User Guide
Enterprise Single Sign-On 8.0.3 User Guide Advanced Login for Windows Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected
Quest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
Quest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management
Data center and cloud management Enabling data center modernization and IT transformation while simplifying IT management 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information
Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide
Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
Quest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Quest Migration Manager 3.2
Quest Migration Manager 3.2 for SharePoint User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described
2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions
4.9 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
