PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Directory Integration

This article is part of the Information Security magazine issue of September 2006
DIRECTORY INTEGRATION DirectControl Suite REVIEWED BY PETER GIANNACOPOULOS Centrify Price: Starts at $50 per workstation and $300 per server @exb @exe Microsoft Active Directory (AD) has always been able to provide cross-platform authentication services to Unix and Linux hosts via its Kerberos/LDAP implementation, but does not extend its rich Group Policy Objects (GPO) management capabilities to non-Microsoft platforms. Now, Centrify's DirectControl suite puts Unix/Linux platforms under the GPO umbrella and allows *nix hosts to authenticate against AD, so enterprises of all sizes can leverage it to provide a true single sign-on (SSO) environment. Policy Control B+ The management console allows you to create one or more zones, which experienced Unix managers will find conceptually similar to NIS domains. You can, in fact, import and manage existing NIS maps, as well as local /etc/passwd and /etc/group files. You then assign specific users and groups to the appropriate zones and set their basic profile information (default shell, ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Using security information management systems for a posture assessment
For more visibility into your security posture and smoother compliance, picture what a security information management system can do for you.
-
-
Brick By Brick
No budget for an application firewall? Use open-source components to build your own.
-
Content inspection accelerator cards rev up application-layer security
The answer to traffic loading issues may be in the new content-inspection accelerator market.
-
Secure Reads: How technology is endangering your privacy
Read a quick review of the security book, "Privacy Lost: How Technology is Endangering Your Privacy."
-
Proofpoint's Messaging Security Gateway Product Review
In this product review, learn how Proofpoint's Messaging Security Gateway can help to protect against viruses, spam and Trojans. Get tips on product management, configuration and reporting.
-
Data Encryption and IDS / IPS: Getting a better view of network activity
Encryption can to help secure data and meet HIPPA requirements, but the technology blocks sight of network activity by blinding IDSes and IPSes. Learn how to have an effective encryption and IDS/IPSe solution simultaneously.
-
Intrusion Prevention: iPolicy Network's ISM Express 1000
iPolicy Network's ISM Express 1000
Columns in this issue
-
Perspectives: Focus on commonalities in state data breach laws
Examine the similarities in state data breach notification laws and develop a policy that intersects those common areas.
-
Ping: Christopher Ray
Christopher Ray
-
Face-off
Is There Strategic Software?