Notice: will be retired soon. Please visit our new site at
White Paper
See how to resolve the privilege management paradox where the highest privileged accounts are controlled and secured the least.
Read now »

Privilege Manager for Unix

Securely manage and control Unix root access

Privilege Manager for Unix, now a part of the Privileged Access Suite for Unix, enhances security by protecting the full power of root access from potential misuse or abuse through fine-grained, policy-based control.

Privilege Manager helps you define a security policy that stipulates who has access to which root function, as well as when and where individuals can perform those functions. It controls access to existing programs as well as any purpose-built utility used for common system administration tasks. With Privilege Manager, you don’t need to worry about someone—whether inadvertently or maliciously—deleting critical files, modifying file permissions or databases, reformatting disks or damaging Unix systems in more subtle ways.

By enabling administrators to define fine-grained security policies, delegate common management tasks and log all Unix root activities down to the keystroke level, Privilege Manager for Unix reduces security risks, increases IT productivity and enables organizations to achieve and sustain compliance in a cost-effective manner.


  • Safe Root Partitioning - Privilege Manager helps you partition system administration tasks without compromising the security of the root account. You can define an elaborate policy that determines whether and when any user requests are accepted or rejected. The feature ensures users perform only the root actions for which they are responsible and authorized.
  • Indelible Audit Trail - Privilege Manager records all activities performed with elevated access, even down to the keystroke level, if required. This power to accurately log root and other account activities in a controlled environment provides a secure system administration policy with an indelible audit trail.

  • Encryption, Authentication and Program Controls - Privilege Manager for Unix encrypts its own network traffic to prevent unauthorized access to highly sensitive information. Security is further enhanced by restricting unauthorized or destructive programs and data maintained, stored and/or executed on Unix systems.
  • Central Management of Heterogeneous Networks - Privilege Manager for Unix provides full functionality for heterogeneous organizations using a single, uniform manager interface to deliver configuration and management.
  • Robust Multi-platform Support - Privilege Manager for Unix supports a wide range of Unix and Linux platforms including IBM AIX,HP-UX, Sun, SuSE Linux, RedHat Linux, Tru64, SGI and more.

Sys Reqs

System Requirements:

Before installing Privilege Manager for UNIX 6.0, ensure your system meets the following minimum hardware and software requirements:

Operating System

Supported Version


Red Hat®

Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)


CentOS 5 and 6 (Intel x86/x86 64)


16,17, and 18 (Intel x86/x86 64)

SUSE® Linux

OpenSUSE 10 and 11 (Intel x86/x86 64)
Enterprise Desktop 10 and 11 (Intel x86/x86 64)
Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)


Debian GNU/Linux 6 (Intel x86/x86 64)
Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)

Oracle Linux

Oracle Linux 5 and 6 (Intel x86/x86 64)

Oracle VM

Oracle VM 2


XenServer 5.6 and 6.0

VMware ESX Server

vSphere (ESX 4.0 and 4.1)


Sun® Solaris

8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)



11.11, 11.23, 11.31 (PA-RISC 32/64 bit)
11.22, 11.23, 11.31 (IA64 32/64 bit)



5.3, 6.1, and 7.1 (32/64 bit)

Language Supported:

  • US English


  • Auditing and Keystroke Logging

    Compliance and security best practices demand accountability for actions taken with elevated privilege accounts (such as Administrator, root, and others). This White Board session presents easily implemented and powerfully thorough opportunities to implement the complete audit capabilities required to prove compliance.

    Watch the white board session »

  • Securing Access to Critical Web Resources

    The Unix root account (and many other administrative accounts) do not natively provide the ability to delegate responsibilities and access rights on a granular level. This White Board session shows how the Quest One Identity Solution adds the granularity and control required to truly improve security and achieve compliance for administrative accounts.

    Watch the white board session »

  • Privileged Account Management White Board

    Learn how to address challenges associated with superuser accounts with Quest One Identity Solutions - the industry’s only comprehensive collection of privileged account solutions.

    Watch the white board session »