Organizations both large and small face remarkably similar challenges as they begin to centralize identity management and access control for their UNIX and Linux environments. In this chalkt...
Organizations both large and small face remarkably similar challenges as they begin to centralize identity management and access control for their UNIX and Linux environments. In this chalktalk you'll learn Centrify's best practices for analyzing UNIX/Linux systems, accounts, groups and business requirements and how Centrify's Zone-based access controls and privilege management for UNIX and Linux can be deployed quickly with a provisioning workflow that meets compliance auditor's requirements.
Running Time: 36 minutes
Speaker Kayne McGladrey, Professional Services Senior Consultant
Moderator David McNeely, Director, Product Management
Common UNIX namespace management challenges faced by both large and small UNIX and Linux environments
Security and compliance risks associated with deprovisioning
How Centrify professional services tools such as ADcheck and Deployment Center accelerate up-front analysis
Translating business analysis of how systems are used into a flexible design for Zones and Active Directory groups
How Centrify DirectAuthorize's role-based approach can provide finer-grained control over access rights and privileges
Best practices for implementing fine-grained access controls in environments which already have a uniform UID namespace
Case study of a current customer's provisioning workflow and how it meets IT auditor's requirements
Centralized management of home directories using Zones
Reasons why flat UNIX namespaces may not be practical or manageable in some environments, and how Zones delivers structured management in those cases