For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Safeguard Security Suite for Unix/Linux

Simplify access management with Active Directory for Linux/Unix

Overcome cybersecurity challenges and get control with Active Directory for Linux and Unix systems. Safeguard Privileged Security Suite for Unix is a one-stop shop for Unix/Linux access management and security. This powerful suite combines an Active Directory bridge with the enhanced auditing and reporting of Sudo activities. It consolidates and unifies Unix, Linux and macOS identities. Plus, it assigns, records and audits all Sudo keystroke activity, as well as centralizes access reporting of the Unix root account. You get complete visibility, streamlined identity administration and access-rights management for Unix/Linux environments.

One Identity Safeguard Authentication Services Overview 04:48

Key Benefits

Eliminate Complexity

Leverage Active Directory for Linux and Unix systems; plus, integrate macOS with Active Directory for complete authentication coverage

Improve Efficiency

Improve efficiency and policy consistency with centralized management of sudo across all your Unix/Linux servers

Simplify Compliance

Quickly see the information you need with centralized reporting on sudo policy, activities and history

Enhance Security

Increase security with Kerberos authentication, single sign-on and keystroke logging of all sudo activity

Features

Active Directory for Unix, Linux and Mac

Extend the authentication, authorization and administration infrastructure of Active Directory to the rest of your enterprise. This enables Unix, macOS and Linux systems to operate as AD full citizens.

Integrate macOS with Active Directory

Consolidate control to a single tool by including those loyal Mac users in your identity-security strategy.

Extend Sudo

Leverage plug-ins that extend your current sudo environment instead of replacing it. Users access the root account the same way they did before there’s no need for additional training minimizing calls to the help desk.

Audit, alerting and change tracking

Receive alerts and show in-depth change history of Unix systems managed by Active Directory.

Central sudo policy

Use a central service to enforce policy across all your Unix/Linux servers. This eliminates the need for administrators to deploy sudoers on every system, reducing administrative effort and improving security.

Keystroke logging

All sudo keystrokes are logged. The keystroke log report is a comprehensive view of the activities and commands executed across all systems. You can filter the log report to quickly find the data you need.

Group Policy for Unix, Linux and Mac

When you extend Active Directory for Linux, Unix and macOS systems, you get policy-based management far beyond your Windows environment.

Centralized reporting

Easily track who, what and when changes were made to sudoers, including versioning. Reports analyze the sudo configuration file, user accounts and group memberships. Plus, you can track who ran specific sudo commands across all systems and whether the commands were accepted or rejected.

Single sign-on (SSO)

Implement ‘Kerberized’ and LDAP SSO to Unix, Linux and Mac OS X systems in the same way they’re used in Windows. You also get out-of-the-box single sign-on for a variety of applications, including Siebel, SAP and DB2.

Sudo Offline Policy Cache

Provides your organization with service continuity in the event of a network or server outage.

Script compatibility

Safeguard for Sudo ensures compatibility of your script files that contain embedded sudo commands across your Unix environment/infrastructure. With this, you can avoid run failures, and the expense and effort to test and fix scripts.

University of East Anglia: UK university cuts IT burden with Unix/Linux single sign-on

The benefits we’ve realised mean that Authentication Services has already paid for itself. Over time, the ROI will continue to rise as Authentication Services continues to add value.

Jon Woodley Head of Systems, UEA

UkrSibbank feels the difference after installing Active Directory on Unix systems

Overall, the installation of One Identity software products has reduced downtime and saved the bank around 100 staff-days of work each year.

Alexander Nesterenko Deputy Head of the IT Support Department Read Case Study

Resources

White Paper

Securely Managing Your Unix Environment

With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the fu...
White Paper

The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution

AD bridge solutions address this problem by enabling Unix, Linux, and Mac OS X systems to participate as “full citizens” in Act...
Video

Learn how to enable privileged management with One Identity solutions

This video will show you how to centrally manage privileged accounts, using the policy-based workflows provided by One Identity...
E-book

eBook: Strategies for successfully managing privileged accounts

One of the most important aspects of an identity security program is the management and governance of the accounts belonging to...
White Paper

Privileged Access Management and DevOps: Integrating Security into the CI/CD Pipeline

Discover the cybersecurity challenges within the DevOps CI/CD pipeline and uncover effective solutions through the integration ...
White Paper

Unveiling the True Potential of Identity: Strengthening security through complimentary practices

Learn how utilizing a complimentary approach to identity security with identity governance and Privileged Access Management can...
White Paper

Controlling and Managing Privileged Access

Effectively managing privileged accounts is critical to security and compliance efforts. Read this paper to learn the risk asso...
E-book

Security Starts Here - Privileged Access Management

Read this e-book for essential information on the common security issues with privileged access management, and learn how you c...

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.