Learn how One Identity Privileged Management Solutions simplify privileged account management, and let you enable privileged access without putting your entire organization at risk.
Privilege Manager™ for Unix, a powerful member of the Privileged Access Suite for Unix, enhances your access control through detailed, policy-based delegation of privileges of the UNIX root account. This enables organizations to benefit from least-privilege access, keystroke logging and enhanced individual accountability for UNIX root account activity. Plus, its centralized management and reporting capabilities ensure you meet even the most stringent compliance requirements.
Role-based Root and Administrative Account Delegation:
Privilege Manager for Unix enables you to delegate root-account administrative privileges based on individual roles and rights without revealing the root account credentials. Plus, with Privilege Manager you can easily handle third-party applications management, including Oracle and SAP.
Comprehensive Policy Creation and Testing
Privilege Manager for Unix enables you to import third-party policies, as well as build new policies based on user, groups, commands, hosts, time of day, day of the week — and test the impact of those policies before pushing to a production environment.
Secure Centralized Management
Privilege Manager for Unix configuration and management is delivered througha GUI and/orvia command line. Its architecture is fully fault-tolerant withfailover and load-balancing options. Moreover, Privilege Manager encrypts its network traffic andintegrates with Pluggable Authentication Modules for increased security.
Indelible Audit Trail
Privilege Manager’s AuditLogger tracks who has been accessing whichsystems, what commands they executed, what changes they attempted to make to key files and data and ifthey were successful.
Encryption, Authentication and Program Controls
Encrypts network traffic, preventing the storage or execution of unauthorized or destructive programs on your UNIX systems.
Central Management of Heterogeneous Networks
Enjoy a single management interface and full functionality for your multi-platform/OS environment, includingIBM AIX, HP-UX, Sun, SuSE Linux, RedHat Linux, and more.
Before installing Privilege Manager for UNIX 6.0, ensure your system meets the following minimum hardware and software requirements:
|Operating System||Supported Version|
Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 7 (Intel x86/x86 64)
CentOS 5, 6, and 7 (Intel x86/x86 64)
16,17, and 18 (Intel x86/x86 64)
OpenSUSE 10 and 11 (Intel x86/x86 64)
Enterprise Desktop 10 and 11 (Intel x86/x86 64)
Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Debian GNU/Linux 6 (Intel x86/x86 64)
Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)
Oracle Linux 5, 6, and 7 (Intel x86/x86 64)
Oracle VM 2
XenServer 5.6 and 6.0
|VMware ESX Server|
vSphere (ESX 4.0 and 4.1)
|Sun® Solaris||8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)|
11.11, 11.23, 11.31 (PA-RISC 32/64 bit)
11.22, 11.23, 11.31 (IA64 32/64 bit)
|IBM® AIX||5.3, 6.1, and 7.1 (32/64 bit)|
Effectively managing privileged accounts is critical to security and compliance efforts. Read this paper to learn the risk associated with privileged accounts and solutions that can effectively mitigate those risks.
How to develop a three-step plan to stop evil doers from appropriating privileged accounts and damaging your agency. One Identity privileged account management solutions help make you more safe.
How to control and audit superuser access - On the board
The 2017 Gartner Market Guide for Privileged Access Management (PAM) provides a detailed analysis of the PAM market as well as an in-depth examination of the solutions from over 24 different PAM vendors.
Get ready for May 2018 | Our eBook explains the what, why and how of the European Union’s General Data Protection Regulation (GDPR)?
Securing, managing and governing superusers
With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems, Unix-based organizations face many identity and access management (IAM) challenges.
Easily overcome security and admin challenges inherent in UNIX-based systems
Extend the compliance and security of Active Directory to your enterprise
Enhance Sudo 1.8.1 with a central policy server, centralized sudo management and reporting
Enhance security with two-factor authentication.