Sunteți pe pagina 1din 4

Authentication Services

The next generation of Active Directory bridge technology

Authentication Services provides of integration to meet the needs of Benefits:


enterprise-wide access, authentication the most complex and demanding • Eliminates complexity by allowing
and authorization for Unix, Linux heterogeneous global organizations. Unix, Linux and Mac OS X systems
and Mac OS X systems by using an to participate as “full citizens” in
organization’s existing Active Directory Tools for managing your AD bridge Active Directory
(AD) infrastructure. Authentication Authentication Services has robust and • Consolidates the administration
Services’ patented technology allows flexible Unix utilities, as well as flexible of AD-enabled systems and AD
non-Windows resources to become deployment options. It contains a bridge functionality around a single,
part of the AD trusted realm, and powerful set of tools for creating and powerful console
extends AD’s security, compliance managing your AD bridge, including: • Delivers strong authentication as
and authentication capabilities to Unix, • Product configuration and licensing part of the AD bridge solution
Linux and Mac OS X. • Guidance to help with initial setup and • Expands auditing, alerting and
integrating systems with AD change tracking to AD-enabled Unix,
Authentication Services is the • A broad range of migration and Linux and Mac OS X systems
undisputed leader in the Active deployment options • Provides centralized authentication
Directory bridge market with nearly • Pre-migration assessment and preparation and single sign-on
1,000 customers and more than • NIS migration tools • Facilitates the migration of all
5 million deployed licenses. Only • Group Policy and local Unix users and systems and users to a single Active
Authentication Services provides the groups management tools Directory-based infrastructure
functionality, flexibility and scope • Simplifies security and compliance
• Extends Group Policy to Unix, Linux
and Mac OS X systems

Figure 1. The Authentication Services Control Center


• Simplified and compliant auditing immediate compliance with no impact on
“Dell has more than and reporting the Active Directory schema.
• Strong authentication for non-Windows • Unix Personality Management creates
800 customers systems alternate Unix “personalities” to define
using its AD bridge profiles in AD for different systems, using
Strong authentication standard schema attributes based on the
product. One Authentication Services includes licenses default AD schema definition.
particular reference for powerful AD-based, one-time • Ownership Alignment Tool simplifies the
password (OTP), strong authentication time-consuming final step of resolving
customer has 65,000 across all supported Unix, Linux and user-ID conflicts at the end of a migration.
Unix servers under Mac OS X platforms. In addition, It provides a flexible tool set for aligning the
Authentication Services extends ownership of conflicting files; this allows
management, which Windows-based smart cards to Unix you to quickly realign user namespace
is five times larger and Linux and supports third-party conflicts before, during or after your
OTP solutions. primary migration to AD.
than any of the other • Full RFC 2307 NIS Map Support provides
AD bridge vendors’ Audit, alerting and change tracking full support for users migrating their NIS
Only Authentication Services gathers infrastructure into Active Directory’s
largest deployments.” the vital data demanded by auditors. RFC 2307 NIS maps, enabling them
Authentication Services enables you to to completely retire their existing NIS
Active Directory Bridge audit, alert and provide a detailed change infrastructure. RFC 2307 is supported with
Products: Getting More Value history of Unix-centric information advanced NIS map import wizards, NIS
from the Windows Infrastructure managed by Active Directory. map editors for Windows, and full RFC
Mark Diodati
2307 support in the Authentication Services
Burton Group Compliance NIS proxy.
Authentication Services uses the same • Unix Account Import Wizard imports users
industry standards as AD to provide a and groups to personalities from sources
compliant alternative to multiple identity such as NIS, local files or remote shells. It
stores and points of authentication, as also enables you to choose sophisticated
well as non-compliant directories, such matching criteria (for linking to account
as NIS. It also quickly and easily gathers principal) from pop-ups. This greatly
the critical information demanded by simplifies the tedious work of migrating
auditors, and seamlessly facilitates strong users into AD.
authentication for non-Windows systems.
Enterprise Group Policy
Migration Authentication Services provides an
Ideally, most heterogeneous easily implemented, infinitely scalable,
organizations want to consolidate and natively integrated extension of the
into one secure and robust directory Windows Rights Management Service
for all of their systems. Authentication Group Policy to Unix, Linux and Mac OS
Services can help you quickly achieve systems. Through this framework, you
that goal by streamlining the process can leverage the existing Group Policy
of integrating Unix, Linux and Mac OS extensions built into the product, or
X systems and users to the AD domain. develop your own based on the simple
It also facilitates a fast and accurate ADM template methodology, or the
migration from multiple authentication more capable client-side extensions.
mechanisms, identities and directories Authentication Services includes generic
into a single AD-based infrastructure. scripting, file copying and customization,
Capabilities include: as well as a collection of powerful
• Mapped User Mode provides an elegant prepackaged Group Policies and flexible
alternative to a full migration. It allows policy management. In addition, the
the migration to proceed at its own pace product leverages existing Windows
while quickly resolving the most pressing security policies, making AD entirely
compliance requirements. Mapped User authoritative for Unix, Linux and Mac OS
Mode enables organizations to achieve X access control. Authentication Services
includes a powerful Group Policy Centralized authentication and
Authentication interface for Mac OS X systems that single sign-on
provides control over the entire range of Authentication Services natively
Services natively Mac policy and preferences, including implements Kerberos and LDAP on
integrates Unix, support for third-party applications Unix, Linux and Mac OS X systems in
through Preference Manifest integration. the same way they are implemented in
Linux and Mac OS Authentication Services also audits and Windows. In addition, it provides single
X systems to allow tracks changes to Group Policy Objects. sign-on for many applications (including
SAP and Siebel), a powerful application
them to act as full Active Directory for Unix, Linux programming interface (API) that allows
citizens within and Mac OS X you to add single sign-on to internally
Authentication Services seamlessly developed applications and guidance
AD and benefit extends an existing AD infrastructure to for creating single sign-on to a number
from AD’s security the rest of the enterprise. Authentication of popular applications (such as DB2,
Services natively integrates Unix, Linux PuTTY, Samba and Apache).
and compliance and Mac OS X systems to allow them to
advantages. act as full citizens within AD and benefit Centralized access control
from AD’s security and compliance Authentication Services enables you
advantages. Key capabilities include: to configure access rules using
• Extends AD password policy to Unix, Linux several options:
and Mac OS X • Local, file-based access lists that determine
• Supports the most complex AD what users can access on the Unix and
environments including multiple domains, Linux machines (down to the level of the
cross-forest trusts, and nested groups individual services). These can then be
• Leverages AD’s ARC4 strong encryption centrally managed through Group Policy.
(128-bit keys) for Unix, Linux and Mac OS X • Unix Personality Management helps control
to enhance security access by defining the user namespace for
• Synchronizes Unix system clocks with AD a given set of computer hosts
• Supports the RFC 2307 schema definition as • Windows security policies and the User
implemented in Windows Server 2003 (R2) Workstation features can provide granular,
• Supports custom schema configuration as per-user access control to Unix computer
well as implementation options for pre-R2 objects in AD.
schemas without extension.

Figure 2. Authentication Services natively implements Kerberos, LDAP and single sign-on
for Unix, Linux and Mac OS X systems in the same way they are implemented in Windows.
Simplified identity management Extensive cross-platform support
Authentication Services enables you to Authentication Services provides
simplify identity management based centralized authentication support for
on your existing AD investment. Using the widest range of Unix, Linux and Mac
Authentication Services, AD-based OS X platforms including Solaris, IBM AIX,
identity management solutions— HP-UX, SuSE, RedHat, Fedora, VMware,
including those for provisioning, and others. For a complete list of
password management, strong supported platforms refer to http://www.
authentication, privileged account quest.com/authentication-services/
management, and auditing and supported-platforms.aspx
reporting—from Dell and other vendors
can be naturally extended to non- About Dell
Windows systems. Authentication Dell Inc. (NASDAQ: DELL) listens to
Services can also work with an existing customers and delivers worldwide
IAM framework to reduce the number of innovative technology, business
systems that require custom integration solutions and services they trust
and individually managed connectors. and value. For more information,
visit www.dell.com.

Dell Software
5 Polaris Way, Aliso Viejo, CA 92656 | www.dell.com © 2013 Dell, Inc. ALL RIGHTS RESERVED. Dell, Dell Software, the Dell Software logo and products—as
If you are located outside North America, you can find local identified in this document—are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries.
office information on our Web site. All other trademarks and registered trademarks are property of their respective owners.
Datasheet-QAuthServices-GP4Mac-US-KS-2013-03-01

S-ar putea să vă placă și