BeyondTrust Active Directory Bridge - Onefede
Onefede > Products > BeyondTrust Active Directory Bridge

BeyondTrust Active Directory Bridge

Sold by: BeyondTrust Categories: ,

BeyondTrust Active Directory Bridge centralizes authentication and configuration management for Unix, Linux, and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on and Group Policy capabilities to these platforms.

Report Abuse

Description

BeyondTrust Active Directory Bridge centralizes authentication and configuration management for Unix, Linux, and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on and Group Policy capabilities to these platforms.

Features and Capabilities
  • Active Directory Authentication: Enable users to use their Active Directory credentials (username and password) to gain access to Unix, Linux, and Mac.
  • Group Policy: Extend the capabilities of native group policy management tools to include specific group policy settings for Unix, Linux, and Mac — achieving a consistent configuration across the enterprise.
  • Auditing and Reporting: Leverage a centralized and secure reporting module with hundreds of built-in regulatory-specific reports.
  • Access Control: Centrally control access to non-Windows systems by defining which users are permitted to log on to which systems via Active Directory.
  • Single Sign-On: Seamlessly transition users from desktop to remote machines, or between systems, without the need to constantly re-enter credentials. By leveraging Kerberos, Active Directory’s authentication protocol, single sign-on is easy, regardless of platform.
  • Remote Smart Card Authentication: Perform smart card authentication without having to be physically next to the server to insert the smart card.
Business Benefits

Improved Efficiency

  • Use AD credentials to gain access to Unix, Linux, and Mac.
  • Perform account maintenance and password updates through ADUC.
  • Unify policies and simplify deployments and upgrades.

Easier Compliance

  • Provide audit details to audit and compliance teams via enterprise-spanning access and authorization reports.
  • Achieve a consistent configuration across the enterprise.

Enhanced Security

  • Single sign-on for any enterprise application that sup- ports Kerberos or LDAP.
  • Support for Remote Network file share access.
  • Centrally control access to non-Windows systems.

Vendor Information

Description

Trusted Protector of What Matters Most

Almost every cyberattack today involves privileged access and identities, either to gain initial access or to move laterally within an environment – and the stakes are higher than ever. We are focused on addressing the most urgent cybersecurity challenges, including zero trust, ransomware, vendor and employee remote access, cloud security, as well as compliance and cyber insurance requirements.

Who we are?

What we do?

Our innovative solution portfolio protects all identities, access, and endpoints across your entire environment. Our integrated platform delivers fast time-to-value with solutions that are not only simple to deploy but which also enable a superior user experience.

Our Culture and Values

As a global and diverse company, our core values are essential to creating a sense of belonging and community. BeyondTrust has earned a number of prestigious industry awards that recognize our exceptional workplace culture and employee experience.

Your Trusted Partner

We are a customer-driven organization with industry-leading customer satisfaction scores driven by our exceptional customer support and commitment to customer success. We are the trusted partner for more than 20,000 customers in over 100 countries, including 75% of the Fortune 100, and a global partner community.

Product Inquiry

Item added To cart