BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment.
Provide a single familiar tool set to manage both Windows and Unix/Linux systems.
Provide thorough audit details to Audit and Compliance teams and manage group policies centrally.
Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems.
Empower Administrators: Provide a single familiar tool set to manage both Windows and Unix systems. Perform account maintenance and password updates through a single directory administration tool (Active Directory Users and Computers).
Configuration: Enables one-to-many management of Unix and Linux configuration settings.
Reduce Costs: Leverage existing AD deployments to centrally manage heterogeneous workstations and users.
User Management: Allow users to use AD credentials to access Unix & Linux. Consolidate password files, NIS, and LDAP repositories into Active Directory and remove the need to manage user accounts separately.
Extend Active Directory: BeyondTrust AD Bridge does not have to modify Active Directory schema to add Unix and Linux systems to the network.
Granular Reporting: Effortlessly manage and view access privileges for users and groups through customizable reports. Provide audit details to audit and compliance teams via enterprise-spanning access and authorization reports.
Extend Group Policy: Extend native group policy management tools to include Unix and Linux—achieving a consistent configuration across the enterprise.
SSO: Get single sign-on for any enterprise application that supports Kerberos or LDAP, including Samba, Apache, SSH, Websphere, JBoss, Tomcat, Oracle, and MySQL.
File Sharing: Support for Remote Network file share access for Unix and Linux systems.
Access Control: Centrally control access to non-Windows systems by defining which users are permitted to log onto which systems via Active Directory.