sb-as logo
Story image

One Identity launches authentication services for Unix systems

26 Feb 2019

One Identity has announced the availability of Authentication Services 4.2, a solution that extends the authentication, authorisation and administration of Active Directory (AD) to Unix, Linux and Mac environments.

Authentication Services 4.2 includes several new security measures, including unlimited use of One Identity’s SaaS-based two-factor authentication (2FA) solution, as well as increased support for Kerberos and smart cards.

It also provides additional platform support for ARM processors, Microsoft Azure AD Domain Services and FreeBSD.

With Authentication Services 4.2, customers can extend the security and administration of Microsoft AD.

One Identity product management VP Jackson Shaw says, “The latest release of Authentication Services shows our continued commitment to ensuring our customers can provide unified identity and access management across their heterogeneous environments.”

“Including our SaaS-based two-factor authentication solution to enhance security makes it easy for our customers to increase their security for Unix-based systems.”

Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.

Because native Unix-based systems are not linked to one another, each server or OS instance requires its own source of authentication and authorisation.

In addition, some Unix-based systems use NIS for authentication, which is much less secure than other authentication protocols like Kerberos.

Without a way to effectively secure and manage identities across Unix systems, organisations are left with disjointed, inefficient and highly inconsistent management — and they risk potentially catastrophic security lapses.

To reduce the risk and achieve compliance, organisations must be able to solve these inherent security and administration issues of Unix-based systems.

Authentication Services, part of the Privileged Access Suite for Unix, extends the unified authentication and authorisation of AD to Unix, Linux and Mac OS systems using an AD bridge.

Authentication Services removes the stand-alone authentication and authorisation requirement of native Unix in favour of the single identity, one account, single point of management available through AD for Windows systems.

With Authentication 4.2, organisations can quickly and easily verify a user’s identity with One Identity 2FA, bolstering security and user productivity, and extend AD administration across heterogeneous architectures.

One Identity has a combination of offerings including a portfolio of identity governance, access management and privileged management, and identity-as-a-service that help organisations reach their full potential, unimpeded by security yet safeguarded against threats.

More than 7,500 customers worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their data -- wherever it might reside.

Story image
Interview: ThreatQuotient champions threat intelligence through virtual 'situation rooms'
To understand what it involves and some of the collaboration challenges that come with distributing threat intelligence amongst specialised security teams, we spoke to ThreatQuotient APJC regional director Anthony Stitt.More
Download image
How to leverage both hardware and software in authentication
When it comes to authentication solutions, pros and cons abound. A Crypto-of-Things solution delivers a strong security guarantee - without compromise.More
Story image
Almost 10,000 unsecured databases with more than 10 billion credentials exposed
Research has identified a total of 9,517 unsecured databases containing 10,463,315,645 entries with such data as emails, passwords, and phone numbers.More
Story image
Attivo Networks improves EDN solution with advanced features
“By detecting unauthorised ingress and egress connections both at the source and at the destination, security defenders gain real-time visibility along with conclusive detection alerts.”More
Story image
Interview: Microsoft's Ann Johnson on digital empathy and zero trust
“Digital empathy means creating an environment and rolling out tools that are forgiving of employee mistakes,” Johnson explains.More
Story image
Interview: Acronis co-founder on going all-in for DLP
Data-loss prevention (DLP) strategies are a cornerstone of wider cybersecurity ecosystems, especially to counter the risks of remote working. Acronis co-founder Stas Protassov explains its significance and why it acquired a DLP powerhouse.More