Skip to main content

Logging on to Unix, Linux and Mac Os X systems with Windows credentials

BeyondTrust Active Directory Bridge centralises user management for Unix, Linux and Mac OSX environments. The solution extends Kerberos authentication in Active Directory and provides the ability to log in with AD credentials and use group policies on non-Windows platforms.

Features and options

Active Directory authentication

The BeyondTrust Active Directory Bridge solution allows users to use Active Directory credentials (username and password) to access Unix, Linux and Mac OSX systems.

Group policies

By extending the functionality of the native group policy management tools, it is possible to take into account settings for Unix, Linux and Mac OSX, and achieve a consistent configuration across the entire infrastructure.

Control and reporting

The centralised reporting module contains hundreds of built-in reports.

Access control

Central management of access to non-Windows systems, by indicating which users can log on to which systems via Active Directory.

Single set of credentials

Migrate users from desktops to virtual machines or between systems, without the need to continually re-enter credentials. Use of Kerberos, the Active Directory authentication protocol, facilitates user authentication, regardless of platform.

Solution features

Make the most of AD

Use a single set of tools to manage users on both Windows and Unix/Linux systems.

Compliance

Give security teams access to audit data and centrally manage group policies.

Greater security

Use AD for single sign-on and to define the access rule for file resources on non-Windows systems.

Business benefits

Optimisation

  • Use of AD credentials for access to Unix, Linux and Mac OSX systems.
  • Account maintenance and password updates using ADUC.
  • Unification of policies and simplification of user propagation.

Compliance

  • Audit information and authentication reports across the infrastructure.
  • Consistent definition of users and policies across the organisation.

Security

  • Single sign-on to any Kerberos or LDAP-enabled application.
  • Unified access to shared file resources.
  • Centralised control over access to non-Windows systems.