taking unix identity and access management to the next...

10
TECHNICAL BRIEF Now that you’ve taken care of local users and groups— what’s next? Written by Quest Software, Inc. Taking Unix Identity and Access Management to the Next Level

Upload: others

Post on 10-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

TECHNICAL BRIEF

Now that you’ve taken care of local users and groups— what’s next?

Written byQuest Software, Inc.

Taking Unix Identity and Access Management to the Next Level

Page 2: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 1

© 2010 Quest Software, Inc.

ALL RIGHTS RESERVED.

This document contains proprietary information protected by copyright. No part of this document may be

reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying

and recording for any purpose without the written permission of Quest Software, Inc. (“Quest”).

The information in this document is provided in connection with Quest products. No license, express or

implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in

connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND

CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST

ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR

STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-

INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT,

CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT

LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF

INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF

QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no

representations or warranties with respect to the accuracy or completeness of the contents of this

document and reserves the right to make changes to specifications and product descriptions at any time

without notice. Quest does not make any commitment to update the information contained in this

document.

If you have any questions regarding your potential use of this material, contact:

Quest Software World Headquarters

LEGAL Dept

5 Polaris Way

Aliso Viejo, CA 92656

www.quest.com

E-mail: [email protected]

Refer to our Web site for regional and international office information.

Trademarks

Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix,

AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch,

BridgeTrak, BusinessInsight, ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop

Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin,

Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, iToken, I/Watch, JClass, Jint, JProbe,

LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool,

NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest

Central, Quest vToolkit, Quest vWorkSpace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle

Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab,

Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vAutomator,

vControl, vConverter, vFoglight, vOptimizer, vRanger, Vintela, Virtual DBA, VizionCore, Vizioncore

vAutomation Suite, Vizioncore vBackup, Vizioncore vEssentials, Vizioncore vMigrator, Vizioncore

vReplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of

Quest Software, Inc in the United States of America and other countries. Other trademarks and registered

trademarks used in this guide are property of their respective owners.

Page 3: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 2

Contents Abstract ......................................................................................................................................................... 3

The Problem with Unix .................................................................................................................................. 4

Quest Identity Manager for Unix and Quest Authentication Services ........................................................... 5

Local User and Group Management .......................................................................................................... 5

Authentication and Single Sign-on ............................................................................................................. 5

Group Policy .............................................................................................................................................. 5

NIS Migration ............................................................................................................................................. 6

Strong Authentication................................................................................................................................. 6

Audit, Alerting, and Change Tracking ........................................................................................................ 6

Conclusion..................................................................................................................................................... 8

Page 4: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 3

Abstract One of the biggest challenges facing administrators of Unix and Linux systems is the management of

local users and groups. Typically these accounts must be managed individually, on a box-by-box basis, or

by using cumbersome and limited tools. Quest Identity Manager for Unix overcomes these deficiencies by

providing a web-based console that enables administrators to remotely manage all Unix/Linux users and

groups from a single, centralized interface.

The benefits of centralized management are obvious, but Identity Manager for Unix extends these

benefits to truly simplify identity and access management for Unix systems. This technical brief explains

how you can not only move to centralized management of local Unix users and groups, but to full identity

and access management without adding infrastructure, relying on obsolete and non-compliant

technologies (such as NIS), or deploying cumbersome and limited synchronization solutions. Identity

Manager for Unix provides the path to:

Full Kerberos authentication and single sign-on for Unix, Linux, and Mac systems

Group Policy-based management of Unix, Linux, and Mac

Complete migration from NIS

Centralization and consolidation of identities

Strong authentication

Reporting on Unix-related identity and access information

Auditing, alerting, and change tracking

Streamlining of identity administration tasks around a single identity and a single administrator

action

Security and compliance for Unix, Linux, and Mac systems

.

Page 5: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 4

The Problem with Unix None of us can survive without our Unix and Linux systems. They host critical data and applications, and

the diversity they bring insulates our businesses from being held hostage by any one platform vendor.

Unfortunately, Unix systems pose significant challenges when it comes to correlating a single physical

user’s access with the dozens, hundreds, or even thousands of individual Unix systems that he must

access.

Typically n an organization with 100 Unix servers, each user could have 100 local accounts (one on each

box) and be a member of hundreds of locally-managed groups. This means there could be 100

passwords to be managed, 100 separate provisioning actions, and 100 trips to servers to manually audit

the rights and specifics of each user’s 100 accounts.

Who does all this work? You do. But is that really where you should be spending your time? Or even

where you want to be spending your time?

Page 6: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 5

Quest Identity Manager for Unix and Quest Authentication Services Local User and Group Management Quest Identity Manager for Unix overcomes many of these challenges by providing a centralized, web-

based console that makes the management of local Unix users and groups intuitive, convenient, and

more cost-effective. But Identity Manager for Unix doesn’t stop at the local user and group level. While

you were using the tool, you may have noticed its capacity to assess Unix systems for Active Directory

bridge readiness. But what does that mean?

Active Directory (AD) bridge solutions, such as Quest Authentication Services, enable Unix systems to

take advantage of the Kerberos authentication, Group Policy, and centralized identity management

capabilities of Microsoft Active Directory. When Unix systems become “full citizens” in Active Directory

through Authentication Services, many, if not all, of the most pressing Unix identity and access

management challenges disappear.

Recall our example above of the user who has 100 Unix identities, one on each box. Using Authentication

Services, these 100 Unix identities can be retired—the user’s single Active Directory account can provide

the necessary access, authentication, and authorization services to all Unix systems. Imagine the relief

that this will provide to your Unix administrators, not to mention your Unix users! No longer will a user

have 100 passwords that need 100 individual resets from the Unix administration team. When a new user

comes on board, Unix administrators no longer need to physically go to 100 Unix boxes and provision

100 user accounts and grant membership to all necessary groups. And even more important, when a

user leaves the organization, a single AD-based deprovisioning action terminates access across all 100

Unix systems—eliminating the security holes and compliance violations that typically accompany these

events.

In addition to providing these local user and group management capabilities, Identity Manager for Unix

acts as the management console that unlocks the full Authentication Services functionality that truly

simplifies identity and access management. The most important of those capabilities are discussed

below.

Authentication and Single Sign-on Quest Authentication Services provides the necessary integration to enable Unix, Linux, and Mac

systems to act as “full citizens” in Active Directory. The heart of this functionality is centralized

authentication and single sign-on for Unix systems. The solution provides the integration between Unix’s

native PAM and NSS components with the Kerberos and LDAP provided by AD.

From within Identity Manager for Unix, the Join Unix System to AD command moves authentication from

native Unix protocols to the more secure, efficient, and compliant Kerberos capabilities of Active

Directory. This “join” functionality extends from simple mapping of a Unix account to a corresponding AD

account for authentication and password policy, to full migration from Unix identity to an entirely AD-

based, consolidated identity scenario.

For more information, visit us on the web for a deeper discussion of single sign-on through

Authentication Services.

Group Policy One of the biggest benefits of making Unix systems “full citizens” in Active Directory is streamlining

management through Group Policy principles leveraging the Active Directory Group Policy framework.

Quest Authentication Services provides the industry’s most powerful extension of Windows Group Policy

to Unix, Linux, and Mac, including:

Page 7: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 6

Pre-built policies for critical operations (such as configuring and administering elevated privilege

delegation)

A full management interface for Group Policy management of the complete set of Mac

preferences and settings

Management of strong authentication

All the flexibility to leverage Group Policy for virtually any task that may be required

All of the full-featured power of Group Policy is launched, controlled, monitored, and audited through

Identity Manager for Unix on Authentication Services-enabled Unix, Linux, and Mac systems.

To learn more about the powerful Group Policy capabilities of Authentication Services, read the technical

brief “Enterprise Group Policy.”

NIS Migration Quest Authentication Services provides all the tools to migrate Unix identity and access management

from Network Information Service (NIS) into the more secure and compliant Active Directory

infrastructure. The process of migrating from NIS to unified, AD-based IAM requires significant planning,

careful system and identity assessment, and reconciliation of NIS data with the newly-unified AD identity

namespace.

Identity Manager for Unix provides intuitive access and powerful control over the entire process of NIS

migration, as well as access to all of the Authentication Services capabilities needed to execute the

migration in a controlled, transparent, and safe manner. These capabilities include:

Mapping and editing existing NIS maps for AD-based IAM

Alignment of Unix ownerships

Reconciliation of disparate identity information

Reporting on identity, access, and migration progress, including “what if” pre-assessment of

planned migration activities

Roll-back to previous states

For a complete discussion of Authentication Services’s tools and capabilities for NIS migration, read the

technical brief “Quest Authentication Services: A Comprehensive Solution for NIS Migration.”

Strong Authentication Every installation of Authentication Services 4.0 includes strong authentication through Quest Defender

(25 user licenses and 25 one-time password tokens). This empowers organizations to add a deeper level

of security to Unix authentication. You can use Identity Manager for Unix to configure and manage the

two-factor solution for Authentication Services-enabled Unix systems, and control it through Group Policy.

To learn more about Quest Defender and its strong authentication capabilities, visit

http://www.quest.com/defender/.

Audit, Alerting, and Change Tracking In addition to the local Unix user and group reporting and AD-bridge readiness assessments available in

Identity Manager for Unix, Authentication Services provides full auditing, alerting, and change tracking for

Unix systems that participate as “full citizens” in Active Directory. This expanded audit functionality is

available through Quest ChangeAuditor, which is included with each Authentication Services 4.0

installation.

Available information includes:

NIS object settings and changes

Personality object settings and changes

Page 8: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 7

Computer object and attribute settings and changes

GPO settings and changes

The state of Unix GECOS, User, Group, Name, Directory, Login , ID, Shell, etc., as well as

changes to all of these

To learn more about Quest ChangeAuditor, visit http://www.quest.com/changeauditor-for-active-

directory/.

Page 9: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

Technical Brief: Taking Unix Identity and Access Management to the Next Level 8

Conclusion Integrating Unix, Linux, and Mac systems with AD has quickly become mainstream since Quest

introduced the first AD bridge solution with Authentication Services in 2004. In fact, more than 2,000

companies have adopted Active Directory-bridge technologies, according to a 2009 Burton Group report.

But today’s Unix organization demands more than simple AD-based authentication. With Identity

Manager for Unix, Quest brings the path to AD bridge to the masses. This freeware web console provides

powerful, centralized management of local Unix users and groups and readiness assessments for moving

to AD bridge through Authentication Services. Identity Manager for Unix also provides a simple path to a

full AD bridge by launching the full range of Authentication Services capabilities to Authentication

Services-enabled systems.

To try Authentication Services for yourself, download a free trial, watch a recorded demo, or take the

solution for a QuestDrive.

Page 10: Taking Unix Identity and Access Management to the Next Levelmedia.govtech.net/Digital_Communities/Quest...In addition to providing these local user and group management capabilities,

5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | E-MAIL [email protected]

If you are located outside North America, you can find your local office information on our Web site

TECHNICAL BRIEF

About Quest Software, Inc.

Now more than ever, organizations need to work smart and improve efficiency. Quest Software

creates and supports smart systems management products—helping our customers solve

everyday IT challenges faster and easier. Visit www.quest.com for more information.

Contacting Quest Software

PHONE 800.306.9329 (United States and Canada)

If you are located outside North America, you can find your

local office information on our Web site.

E-MAIL [email protected]

MAIL Quest Software, Inc.

World Headquarters

5 Polaris Way

Aliso Viejo, CA 92656

USA

WEB SITE www.quest.com

Contacting Quest Support

Quest Support is available to customers who have a trial version of a Quest product or who

have purchased a commercial version and have a valid maintenance contract.

Quest Support provides around-the-clock coverage with SupportLink, our Web self-service.

Visit SupportLink at https://support.quest.com.

SupportLink gives users of Quest Software products the ability to:

• Search Quest’s online Knowledgebase

• Download the latest releases, documentation, and patches for Quest products

• Log support cases

• Manage existing support cases

View the Global Support Guide for a detailed explanation of support programs, online services,

contact information, and policies and procedures.

© 2010 Quest Software, Inc. ALL RIGHTS RESERVED.

Quest Software is a registered trademark of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBW_UnixIAM_Peterson_US_MJ-20100604