Identity Broker

Enforce Group Policies for Users and Heterogeneous Systems

Centrify delivers comprehensive support for extending Group Policy management to non-Windows systems. It’s the only solution to provide user and computer policies with advanced features such as group filtering and loopback processing. Group Policy configuration settings are seamlessly integrated into the Centrify UNIX Agent to manage configuration of both the system configuration and user’s environment.

With Centrify you can:

  • Leverage existing Group Policy tools and processes to standardize security configurations across UNIX, Linux and Mac
  • Automate consistent security configuration for systems with Group Policy
  • Standardize User environment configuration (on Linux and Mac)
    • Screen auto-lock after inactivity
    • Desktop environment configuration (Gnome and Mac)
GPO Active Directory, AD group policies, Linux group policy

Enforce Group Policies for users and heterogeneous systems

Consistent configuration across a large, heterogeneous environment can be a significant challenge. Centrify leverages your existing Active Directory infrastructure to simplify management across non-Windows systems through consistent, centrally enforced security and configuration policies.

Centrify manages both user and computer policies, as well as advanced key features such as group filtering and loopback processing. Group Policy functionality is seamlessly integrated with existing Group Policy features in Active Directory so that policies for users, Linux and UNIX systems work like Windows policies.

Identity Broker’s Group Policy Architecture

To enforce Active Directory Group Policies across non-Windows platforms, Identity Broker applies configuration settings to each appropriate managed system and the users logging in to it. For each computer, Centrify contacts Active Directory to determine the relevant policies and copies them to a set of virtual registry files. System files are refreshed in the same way as Windows: On demand, at user log in, on computer restart, and at periodic intervals defined by Group Policy.

Organizations can use group policy to automate firewall and SSH configuration, decide which users are allowed to connect to each system, drop inactive sessions and act as a network based authentication. Centrify provides the only solution that manages authentication, access control, and Group Policy for non-Windows systems through a single agent that can:

  • Reduce IT infrastructure costs and complexity, and streamline operations using your current Active Directory tools for enterprise-wide management.
  • Strengthen security with automated, consistent management of configuration files for individual computers or groups of computers.
  • Centrally configure the policies that the Centrify agent uses to authenticate and authorize.
  • Efficiently control crontab files, firewall settings, screensaver password lock, and other properties.
  • Automatically issue and renew PKI certificates for each computer for stronger identification.
  • Enable security managers to define consistent global policies for diverse systems without specific OS and system information.
  • Leverage ready-to-use Group Policies for Linux and UNIX, with standard administrative templates for policy definition and scripts for client side processing.