Secured Single Sign-on with SecureCRT 5.0

 

Click here to read PDF

 

Introduction

 

Centrify Server Suite integrates Unix systems into Active Directory to enable centralized management of user authentication and authorization. Most users will have already authenticated to their Windows workstation and need to access the Unix system remotely over the Enterprise network. One of the benefits of using Active Directory and Server Suite is the ability to leverage the built-in Kerberos infrastructure to securely authenticate a user from one computer to the next as they need to access resources without requiring the user to re-submit authentication credentials.

 

SecureCRT 5.0 from VanDyke Software provides native support for both SSH and Kerberos, enabling Windows users to seamlessly and securely access remote Unix systems that have been integrated into Active Directory with Server Suite and that are running a Kerberized version of an SSH server such as OpenSSH. This application note guides you through the configuration of SecureCRT in order to seamlessly access a Unix system using Kerberos and SSH.

Using the Centrify Server Suite NIS Service

 

Click here to read PDF 

 

An Active Directory-Based NIS Service that Enables Secure Distribution of NIS Maps

 

The Centrify Server Suite NIS Service enables UNIX admins to securely store, distribute, and deploy NIS maps through Active Directory, ensuring that all systems within a Zone share a common set of maps. The Server Suite NIS Service is fully integrated with the adclient daemon and vectors all NIS-related requests to Active Directory via Server Suite. The NIS service can fulfill requests both locally and from other machines on the network. For example, a network attached storage (NAS) device may be "hardwired" to only work with NIS. By configuring the NAS device to use the Server Suite NIS Service, this device can now use Active Directory as its central server for validating users. In this way, systems that need specific NIS functionality, such as automount map information, can continue to function but now are serviced through the centralized Active Directory system rather than a separate NIS service infrastructure

Secure, Active Directory-Based Single Sign-On with AbsoluteTelnet/SSH and Centrify

 

Click here to read PDF

 

Introduction 

 

This single sign-on solution via AbsoluteTelnet/SSH requires that the target UNIX systems be joined to Active Directory using Centrify Server Suite. To see for yourself how Server Suite enables you to centrally control access to UNIX, Linux and Mac systems from Active Directory:

 

AbsoluteTelnet 5.0 from Celestial Software integrates with Active Directory to provide single sign-on to UNIX hosts running both Server Suite and OpenSSH servers by leveraging a user's existing credentials. Windows users running AbsoluteTelnet accessing UNIX systems running Server Suite and OpenSSH can be controlled centrally through Active Directory.

Centrify Server Suite and SSH Tectia

 

Click here to read PDF

 

SSH Tectia, from SSH Communications, is based on the SSH Secure Shell and SSH's other industry-leading technologies. It enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent strong encryption and authentication, and are available for all key enterprise platforms, including Windows, UNIX, Linux and mainframes, to easily integrate into heterogeneous network environments.

Centrify and SSH Communications have tested and verified interoperability of Centrify Server Suite and SSH Tectia on all platforms they share in common. By implementing SSH Tectia and Centrify Server Suite in tandem, enterprises can enable secure communications across diverse platforms while centralizing the administration of passwords and identities in Microsoft Active Directory.

 

Centrify Server Suite allows an administrator to leverage Kerberos and Active Directory for single sign-on to non- Microsoft platforms. SSH Tectia, with the broadest platform support of any Secure Shell solution on the market today, enables enterprises to implement secure encrypted file transfer, system administration and application connectivity throughout heterogeneous environments. Together, SSH Tectia and Server Suite help IT managers deliver seamless and secure cross-platform communications for both internal and external users, easing the burden placed on valuable IT resources

Using Hummingbird Host Explorer with DirectControl

 

Click here to read PDF

 

Introduction 

 

Centrify Server Suite integrates Unix systems into Active Directory to enable centralized management of user authentication and authorization. Most users will have already authenticated to their Windows workstation and need to access the Unix system remotely over the Enterprise network. One of the benefits of using Active Directory and Server Suite is the ability to leverage the built-in Kerberos infrastructure to securely authenticate a user from one computer to the next as they need to access resources without requiring the user to re-submit authentication credentials.

 

Host Explorer from Hummingbird provides support for Kerberos security through the addition of Hummingbird Connectivity Secure Shell, which provides the Kerberos support to enable Windows users to use Host Explorer to seamlessly and securely access remote Unix systems that have been integrated into Active Directory with Server Suite and that are running Kerberized telnet servers. The following instructions will guide you through configuring and connecting to a Unix computer using Host Explorer from a Windows computer.

Using Reflections for Secure Unix 13.0.1

 

Click here to read PDF

 

Introduction

 

Centrify Server Suite integrates Unix systems into Active Directory to enable centralized management of user authentication and authorization. Most users will have already authenticated to their Windows workstation and need to access the Unix system remotely over the Enterprise network. One of the benefits of using Active Directory and Server Suite is the ability to leverage the built-in Kerberos infrastructure to securely authenticate a user from one computer to the next as they need to access resources without requiring the user to re-submit authentication credentials.

 

Reflections for Unix 13.0.1 from AttachmateWRQ provides native support for both SSH and Kerberos enabling Windows users to seamlessly and securely access remote Unix systems that have been integrated into Active Directory with Server Suite and that are running either a Kerberized version of an SSH server such as OpenSSH or a Kerberized telnet server. The following instructions will guide you through configuring and connecting to a Unix computer using Reflections for Unix from a Windows computer.

Using WRQ Reflection for Secure IT 6.0.1

 

Click here to read PDF

 

Introduction

 

Centrify Server Suite integrates Unix systems into Active Directory to enable centralized management of user authentication and authorization. Most users will have already authenticated to their Windows workstation and need to access the Unix system remotely over the Enterprise network. One of the benefits of using Active Directory and Server Suite is the ability to leverage the built-in Kerberos infrastructure to securely authenticate a user from one computer to the next as they need to access resources without requiring the user to re-submit authentication credentials.

 

Reflections for Secure IT 6.0.1 from AttachmateWRQ provides native support for both SSH and Kerberos enabling Windows users to seamlessly and securely access remote Unix systems that have been integrated into Active Directory with Server Suite and that are running a Kerberized version of an SSH server such as OpenSSH. The following instructions will guide you through configuring and connecting to a Unix computer using Reflections for Secure IT from a Windows computer.

Using the DirectControl Kerberos Tools

Kerberos-enabled services, utilities and development components

 

Click here to view PDF

 

Published: October 3, 2005

 

Introduction

 

Centrify DirectControl uses Kerberos technology to authenticate UNIX sessions with Active Directory credentials. One of the advantages of using Kerberos is that it enables applications and many common network tools to be used without having to re-enter user and password information. Since Kerberos is built into DirectControl, it is possible to use standard Kerberos tools to leverage secure, authenticated, ticket-based, single sign-on sessions.

 

Centrify has compiled an optional package that includes Kerberos-based development components as well as Kerberized utilities and services. These are based on the latest Kerberos distribution from MIT and the tools can be used with the standard DirectControl product. This Application Note describes how to install, configure and use the components included with the Centrify DirectControl Kerberos Tools package.

Showing results for 
Search instead for 
Do you mean 
Labels

Community Control Panel