Beyondtrust

PowerBroker Identity Services for Active Directory Bridging

Extend Microsoft® Active Directory authentication, single sign-on capabilities and Group Policy configuration management to UNIX, Linux and Mac systems, to improve efficiency, simplify compliance and reduce risk.

Active Directory and Group Policy for Integrating UNIX, Linux and Mac into Windows Environments

PowerBroker Identity Services centralizes authentication for UNIX, Linux and Mac environments by extending Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to non-Windows platforms, PowerBroker provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. [See supported platforms]

  • Allow users to leverage their AD credentials to access UNIX, Linux or Mac systems
  • Attain consistent configuration by extending native group policy management tools to include settings for UNIX, Linux and Mac
  • Audit several events in real time; access results through the PowerBroker console or forward to third-party solutions
  • Transition users from desktops to remote machines or between systems, without requiring them to re-enter credentials
  • Consolidate directories to simplify management of complex environments
PowerBroker Identity Services
Consolidate Credentials, Increase Efficiency
Allows users to log onto UNIX, Linux, or Mac systems using their Active Directory (AD) usernames and passwords, without requiring additional infrastructure or password synchronization. Enables IT to leverage AD group membership to centrally control server and workstation access. Provides a single password policy set in AD to all joined systems, including Kerberos SSO for SAP, Siebel, and other key enterprise applications.
Extend Group Policy to Achieve Compliance
Enables consistent configuration enterprise-wide by extending native Group Policy management tools to include specific group policy settings for UNIX, Linux and Mac. Supports compliance with SOX, PCI, HIPAA, and other regulations across all systems by replacing NIS with an Active Directory infrastructure.
Simplify Administration via Directory Consolidation
Facilitates migration from multiple authentication mechanisms, identities, and directories to a single Active Directory-based infrastructure for all systems and users. This centralizes control and speeds user onboarding and offboarding.
Comprehensive Platform Support
Supports a wide range of UNIX, Linux and Mac platforms including CentOS, Debian, Fedora, FreeBSD, HP-UX, IBM AIX, Oracle Enterprise Linux, Suse, RedHat, Solaris, Ubuntu and others, running on VMs to connect them with Active Directory.

EFFICIENT

  • Empower administrators: Provide a single familiar tool set to manage both Windows and UNIX systems. Perform account maintenance and password updates through a single directory administration tool (Active Directory Users and Computers).
  • Reduce costs: Leverage existing Active Directory deployments to centrally manage heterogeneous workstations and users.
  • Configuration: Enables one-to-many management of UNIX, Linux, and Mac OS X configuration settings.
  • Manage Active Directory from Linux or Mac OS X:  Provides a pluggable framework with an interface similar to Microsoft's Management Console on Linux or Mac OS X.
  • User management: Allow users to use their Active Directory credentials (Username and Password) to gain access to UNIX, Linux and Mac, consolidating various password files, NIS and LDAP repositories into Active Directory and removing the need to manage user accounts separately on Mac workstations and server platforms
  • Extend Mac OS X: Full support for Apple’s Workgroup Manager application, allowing for seamless management and control of Mac system settings
  • Open Source Version Available: Try PowerBroker Identity Services Open for free. With access to the product source code, you can tailor your Active Directory bridging project to your specific needs.

COMPLIANT

  • Extend Active Directory: PowerBroker Identity Services is the only solution that does not have to modify your Active Directory schema to add Linux, UNIX, & Mac OS X systems to your network.
  • Granular Reporting: Effortlessly manage and view access privileges for users and groups through customizable reports. Provide audit details to audit and compliance teams via enterprise-spanning access and authorization reports.
  • Extend Group Policy: Extend the capabilities of native group policy management tools to include specific group policy settings for UNIX, Linux and Mac – achieving a consistent configuration across the enterprise.

SECURE

  • SSO: Get single sign-on for any enterprise application that supports Kerberos or LDAP, including Samba, Apache, SSH, Websphere, JBoss, Tomcat, Oracle, and MySQL.
  • File sharing: Support for Remote Network file share access for Mac and Linux systems.
  • Access control: Centrally control access to non-Windows systems by defining which users are permitted to log onto which systems via Active Directory.

Datasheet

PowerBroker Identity Services

PowerBroker Identity Services

Download this overview document containing capabilities, highlights and competitive advantages of PowerBroker Identity Services. PowerBroker Identity Services centralizes authentication for UNIX, Linux and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. The solution also provides centralized configuration management across a heterogeneous environment by extending Group Policy to these non-Windows platforms.

Documentation

PowerBroker Identity Services

PowerBroker Identity Services 8.2: Supported Platforms

This document lists the the operating systems supported for PowerBroker Identity Services 8.2.

BeyondTrust Webcast: “The Privileged Identity Management Health Check” with guest speaker Andras Cser

8/12/2014

BeyondTrust recently hosted a webcast presentation featuring Andras Cser, VP and Principal Analyst with Forrester Research, Inc., on “The Privileged Identity Management Health Check.” Below is a summary of key takeaways from the webcast, plus an on-demand video recording of the full presentation. Cser shares his perspective on why Privileged Identity Management (PIM) is such... more

Comparing Active Directory Auditing Solutions? Here are 7 Things You Can’t Afford to Overlook

5/15/2014

If you’re responsible for your organization’s Active Directory environment, you probably know how time-consuming it can be to audit and recover AD changes. Maybe there was a particular incident where manually tracking down an errant change and putting things back in order involved too much blood, sweat and tears – or maybe you’ve simply spent... more

Top 8 Security Insights for 2014

12/23/2013

Recently our VP of Marketing, Mike Yaffe, wrote an insightful piece, Top 8 Security Insights for 2014, which was featured on a few publications last week. This was a “what we’re predicting in 2014″ type of article that goes into predictions and expectations for the new year around security and privilege. An excerpt and link to the... more

Privilege gone wild! Our latest survey finds privileged users are out of control.

10/22/2013

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention? As our latest security survey proves, insider threats continue to be a... more

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

7/31/2013

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless... more

Controlling User Accounts and Regulatory Compliance

7/15/2013

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can... more

School is in Session

7/1/2013

We’re proud to announce that we’ve scheduled the next installments of BeyondTrust University. BeyondTrust’s commitment to our customer’s success goes beyond the typical vendor/client relationship. To better serve our customers and partners who rely upon our privilege identity and vulnerability management solutions, we have developed a world-class training curriculum to complement our award-winning security and... more

Our Newest Product Release: PowerBroker Identity Services 7.5

6/26/2013

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management.... more

Did you know? – Native tool integration

5/29/2013

Did you know about the native tool integration feature in the PowerBroker Management Suite?  PowerBroker solution functionality is available through the native Microsoft administration tools referred to as Remote Server Administration Tools (RSAT).  These are the tools that administrators use on a day to day basis to manage their environment. What is it? – It’s... more

See all PowerBroker Identity Services blog posts

VMware Plug-in for Retina

The industry's first and only vulnerability management solution directly integrated into vCenter.

DATASHEET VMWARE SURVEY Watch Video

Retina CS Enterprise Vulnerability Management

Delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Cofiguration Compliance Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Patch Management Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina CS Enterprise Vulnerability Management

The Regulatory Reporting Module can be purchased as an add-on to Retina CS, which delivers large-scale, cross-platform vulnerability assessment and remediation.

Learn More Request a Free Trial

Retina Network Security Scanner

Integrated network, web & virtual vulnerability assessment. Retina is the security industry’s most respected and industry-validated security scanner and serves as the engine for our vulnerability management solutions. There is no better option for securing your network from vulnerabilities.

Learn More Request a Free Trial

Retina Web Security Scanner

Rapidly and accurately scan large, complex web sites and web applications to tackle web-based vulnerabilities including cross-site scripting (XSS) and SQL injection.

Learn More Request a Free Trial

PowerBroker Event Vault

Automate and streamline the collection and management of standard Windows event log data and provide scalable and flexible centralized storage in the PowerBroker event database.

Learn More Request a Free Trial

PowerBroker Identity Services

Quickly and easily integrate your Linux and UNIX servers into your Active Directory infrastructure.

Learn More Request a Free Trial

PowerBroker Identity Services Open Edition

Available as a free and open source version of PowerBroker Identity Services, giving you the access and flexibility to tailor your Active Directory bridging project

Download Now

PowerBroker UNIX & Linux

Quickly and easily manage root access on UNIX and Linux servers, without ever disclosing the system password.

Learn More Request a Free Trial

PowerBroker for Windows

Implement least privilege for your Windows desktop environment, reducing attack surface and driving down costs.

Learn More Request a Free Trial

PowerBroker Auditor
for Active Directory

Track unauthorized changes to Active Directory and Group Policy configurations.

Learn More Request a Free Trial

PowerBroker Auditor
for Exchange

Tracks and reports all changes made to all Exchange Server configurations, groups, mailbox policies, information store changes, and permissions in a centralized audit log.

Learn More Request a Free Trial

PowerBroker Auditor
for File System

Enables tighter security and control over file system resources, including real-time tracking, interactive analysis, and flexible reporting on all key share, file, and folder changes.

Learn More Request a Free Trial

PowerBroker Auditor
for SQL Server

Monitor and review privileged user changes on SQL servers. Easily map your SQL activities with regulatory mandates such as GLBA, SOX, HIPAA, and PCI through consistent auditing and reporting.

Learn More Request a Free Trial

PowerBroker Privilege Explorer

Provides a centralized view of access and privileges, so you can be sure that users have access to the resources they need to do their jobs, and only those resources.

Learn More Request a Free Trial

PowerBroker Endpoint Protection Platform

Formerly known as "Blink", multi-layered security and attack prevention for windows desktops and servers.

Learn More Request a Free Trial

PowerBroker Recovery
for Active Directory

Advanced continuous data protection for Active Directory, providing unparalleled visibility and change control.

Learn More Request a Free Trial

PowerBroker Servers Enterprise

Combine the power of our UNIX/Linux root delegation and our AD bridging for an enterprise approach to server compliance

Learn More Request a Free Trial

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure.

Learn More Request a Free Trial

BeyondSaaS

A cloud-based, external vulnerability assessment solution that conducts fast, affordable security assessments of your public-facing network infrastructure and web applications.

Learn More Request a Free Trial

BeyondInsight

Merge privileged account management and vulnerability management solutions into a single, contextual lens through which to view and address user and asset risk.

Learn More Request a Free Trial

Retina Protection Agent

Close the security gap created by systems that can't be reached with remote vulnerability assessments alone with this lightweight agent for local vulnerability assessment, continuous zero-day vulnerability monitoring, and intrusion prevention.

Learn More

Configuration Compliance Module

This Retina CS add-on module defines and manages security policies to monitor compliance with industry and internally developed benchmarks such as Microsoft, NIST, USBCG, and DISA STIGs.

Learn More

Patch Management Module

This Retina CS add-on module seamlessly integrated, automated, agentless Windows patch management closes the loop on unpatched vulnerabilities.

Learn More

Regulatory Reporting Module

This Retina CS add-on module contains automated solutions to help navigate complex corporate policies, government regulations, and industry standards such as SOX, PCI, FISMA, and ISO.

Learn More

Vulnerability Management

Identifying, prioritizing, remediating, and mitigating
computer and network vulnerabilities.

Privileged Account Management

Managing user authorization to prevent internal data
breaches and meet compliance regulations.

Fusing
PAM & VM For
Stronger IT Security