White Paper
Learn how consolidating your Unix, Linux and Mac identities into Active Directory reduces complexity and costs while improving security, compliance and productivity.
Read now »
Quest on the Board: Audit and Keystroke Logging in Unix Environments
Learn to easily implement the audit capabilities in Unix environments required to prove compliance.
Watch now »
Datasheet
Quest Management Xtensions – Configuration Manager extends the power of System Center Configuration Manager 2007 to more than 120 non-Windows systems and devices.
Learn more »
Datasheet
Quest Management Xtensions – Operations Manager extends the power of System Center to heterogeneous environments, network devices, applications and more.
Learn more »

Solutions for Unix

Integrate and Centrally Manage Unix Identities, Access Control and Systems

Many of the most pressing challenges facing complex, heterogeneous organizations lie in effectively addressing the identity, access and systems management challenges presented by the proliferation of Unix platforms. Quest offers a comprehensive set of solutions for Unix to improve core manageability and operational efficiency, enhance security, and help you achieve compliance. Quest also extends Active Directory identity and access control, including password policy, for simplified Unix/Windows integration.

Review the capability categories below to find a solution for your specific IT challenges.

Identity & Access Management (IAM)

Quest One Identity Solutions provide secure identity and access management for Unix by unifying and consolidating identities, as well as controlling and auditing the Unix root account.

Server & Desktop Management

Centrally manage configurations, monitor performance and services and audit changes for Unix servers and desktops.

Browse the technology platform categories below to find solutions for your unique IT challenges.

Identity & Access Management (IAM)

Quest One Identity Solutions provide secure identity and access management for Unix by unifying and consolidating identities, as well as controlling and auditing the Unix root account.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.

Single Sign-on

Enable Unix to "join" AD for "true" SSO, without synchronization or login automation. A single identity in AD and a single AD credential grants appropriate access to the full range of Unix-based systems.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.

Directory Consolidation

Extend Active Directory access control and password policy to Unix.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Local User & Group Management

Centrally manage and report on local users and groups by gathering identity and group data across an entire population of Unix systems.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.

Role Management

Leverage Active Directory roles and their management for Unix and Linux users as those systems "join" AD using Quest One AD-bridge technologies.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Identity Intelligence

Identity intelligence delivers a 360-degree view of all IAM components for Unix, including identities, roles, rules, policies, workflows and attestations.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.
  • Defender
    Quest Defender uses the scalability and security of Active Directory for identity storage and management, enabling administrators to use their existing skill set to manage two-factor authentication and eliminating the costs and time involved in setting up and maintaining proprietary databases.

Multifactor Authentication

Quest One one-time password (OTP) authentication extends seamlessly to all AD-bridge supported Unix platforms to leverage the single AD identity and a single OTP token for multiple, previously disparate systems. Quest One extends existing Windows smart cards to non-Windows systems that participate as “full citizens” in Active Directory through Quest One AD-bridge technologies.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.
  • Password Manager
    Password Manager enables the end user to reset forgotten passwords securely, allowing administrators to implement stronger password policies while reducing the help desk workload.

Password Management

Unify identities with AD and eliminate Unix passwords entirely. AD-based password policy and self-service resets automatically affect Unix systems.

Privileged Account Management

Protect the Unix root account from misuse or abuse through granular delegation and security policy definitions that stipulate who has access to which root function, as well as when and where individuals can perform those functions. In addition, track all activities performed using elevated access (even down to the keystroke level). Password vault functionality also secures those instances where root must be used. Options are available for enterprise-level root delegation as an agent-based solution for the most compliance-demanding servers, proxy-based command control and session audit or as enhancements to Sudo.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.

Provisioning

Unify Unix systems with Active Directory for a single identity and point-of-provisioning, automated and controlled by the Quest One AD-centric provisioning solution.

Server & Desktop Management

Centrally manage configurations, monitor performance and services and audit changes for Unix servers and desktops.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.

Group Policy

Implement policy-based management by extending Windows Group Policy to Unix through Quest One AD-bridge technologies.

  • Spotlight on Unix/Linux
    With Spotlight, you can identify congested areas and quickly respond to performance problems before they impact end users.

Real-time Problem Diagnosis

Reduce end-user downtime by quickly responding to performance problems before they impact end users.

  • InTrust

    InTrust securely collects, stores, reports and alerts on event data from Windows, Unix and Linux systems, helping you comply with external regulations, internal policies and security best practices.

Security Information & Event Management

Securely collect, store, report and alert on event data from Unix systems to comply with external regulations, internal policies and security best practices.

  • NetVault Backup

    Quest NetVault Backup is a cross-platform backup and recovery software solution that safeguards your data and applications in both physical and virtual environments – from one intuitive console.

Data Backup & Recovery

Safeguard your data and applications from one intuitive console with Quest’s scalable, cross-platform data backup and recovery solution.

  • Authentication Services
    Authentication Services to achieves compliance with cross-platform access control, improves operational efficiency with centralized authentication and single sign-on, as well as unify identities and consolidate directories for simplified identity and access management.
  • ChangeAuditor for Active Directory
    ChangeAuditor for AD generates intelligent, in-depth forensics for auditors and management—and reduces the risks associated with day-to-day modifications.

Auditing & Change Tracking

Prove compliance by auditing, alerting and showing detailed change history of Unix systems that are joined to Active Directory through Quest One AD-bridge technologies.

Get the most from your investment with help from our highly rated support team, training programs, and implementation services.