Feeds

Group policy for Unix

Quality Unix-based GPO support shock

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Zenworks is actually good for something

Given that the two directory and policy goliaths are Microsoft and Novell, and that Microsoft is Microsoft, this makes the logical place to start looking for decent policy management to be Novell’s SUSE Linux Enterprise Desktop (SLED). When I sat down to discuss SUSE with a fellow sysadmin, who happens to be quite the SUSE evangelist, he told me that - contrary to my previously held beliefs - Zenworks is actually good for something.

Understand that I haven’t really used Zenworks since 2003. The experience was so traumatic that I declined to repeat it. Admittedly, the project was about comparing management of Windows systems at the time, but I found AD and GPOs significantly easier than Novell’s eDirectory and Zenworks. In seven years, it has come a long way.

I was impressed by the Linux management tools. A SUSE Linux Enterprise Server (SLES) and SLED setup running eDirectory and Zenworks looks like it would be a very easy-to-manage network. You could even have Windows clients attached, and it’s far smoother sailing than it was in 2003. It’s limited in OS support however, managing only Windows, SUSE, and Red Hat. Debian and Ubuntu are ignored, and OSX is left out in the cold.

The latest version of SLED ships with a license for something called Likewise Enterprise (LE). LE apparently is an easy-to-use piece of software that lets you join the most popular Unix based distributions, (including OSX) to a Microsoft AD, and push GPOs out them as simply and easily as you would to Windows. After listening to my friend rave about LE, I simply had to see this for myself.

We set up a test lab: four different Unix GPO applications. The first demonstration attached a series of SLED, Fedora, Ubuntu, CentOS and OSX systems to the domain and pushed policies out to them. I was absolutely floored by the number of policies that LE can manage.

In a moment, every objection I have had against Unix operating systems as Enterprise desktops that wasn't about application compatibility was erased. Sometime in the past few years, when I wasn’t looking, Unix based systems caught up.

Random greenhorn sysadmin number forty-two can now cheerfully manage a collection of Unix based systems from the AD as easily as managing Windows. Go try it, and see if any policies you care about are missing. I couldn’t find any.

My buddy wasn’t done with me, and next on the line was Quest (formerly Vintela) Authentication Services (QAS). This talked to all the major flavours of Linux and Unix as well as OSX. At first it is not as easy to use as LE, but I was impressed by the number of policy options. If QAS GPO offerings are behind those of LE, QAS had a demonstrable advantage with a robust Single Sign On (SSO) setup for these operating systems. It was far easier to configure and use than any cross-platform SSO I’ve used to date.

We moved on to a third option called DirectControl offered by Centrify. Having entered into this project with the idea that decent GPO support for Unix was most likely a pipe dream, the fact that there was a third solid offering in this field astonished me. Yet, despite some thorough testing, DirectControl stood up to every requirement I could impose on it.

As we were walking out of the lab, still talking about the products we were testing, we were accosted by a systems administrator and acolyte of the Cult of Apple. We went to his lab and we given a demo of ADmitMac by Thursby Software. While it supports no other Unix based systems apart from OSX, it does a capable job of pushing GPOs out to Macs, and marrying them to Microsoft’s AD.

Having thoroughly geeked out for the evening, we departed to the nearest pub. We learned many lessons, and I’ll use my next article to share the GPO-related ones with you.

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.