Unix, Linux and Mac have traditionally been managed as standalone systems – each a silo with its own set of users, groups, access control policies, configuration files and passwords to remember. Managing an environment that includes these silos – plus the Microsoft environment – can lead to inconsistent administration for IT, unnecessary complexity for end users and risk to the business. To overcome these challenges, and to achieve consistent policy configuration compliance, a simpler experience for users and administrators, and less risk from an improperly managed system, organizations typically deploy an Active Directory bridge. Compare Active Directory Bridging as part of Endpoint Privilege Management with our open source AD Bridging tool.