Active Desktop comes to Unix and Mac

Powered by SC Magazine
 

Access control and identity management firm Centrify has unveiled what it claims to be the first platform to offer Microsoft Active Directory-based authentication and access control to over 100 versions of Unix, Linux and Mac OS.

The latest release of Centrify DirectControl adds over 25 new supported versions of Unix and Linux, includes enhanced Group Policy-based Apple Mac OS X desktop lockdown capabilities, and delivers the ability to leverage Group Policy to enable bulk configuration of distributed OpenSSH deployments.

DirectControl allows users to secure and streamline their heterogeneous environments by centralising identity and policy management within their existing Microsoft Active Directory infrastructure.

"By extending its authentication and access control to the widest range of non-Microsoft operating systems, Centrify has made Microsoft Active Directory an appealing directory in which to centralise identity management in a multi-platform environment," said Jon Oltsik, senior analyst, Enterprise Strategy Group.

Centrify DirectControl effectively turns a non-Microsoft server, workstation or device into an Active Directory client, enabling an organisation to secure that system using the same authentication, access control and Group Policy services currently deployed for its Windows systems.

DirectControl supports popular Linux distributions such Red Hat Linux, Novell SUSE Linux, Fedora Core and Debian Linux, as well as popular Unix platforms such as Sun Solaris, IBM AIX, HP HP-UX, and Silicon Graphics IRIX, plus VMware ESX and Mac OS X.

Copyright ©v3.co.uk


Active Desktop comes to Unix and Mac
 
 
 
Top Stories
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 300

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 113

Vote