Feeds

Group policy for Unix

Quality Unix-based GPO support shock

  • alert
  • submit to reddit

Application security programs and practises

Zenworks is actually good for something

Given that the two directory and policy goliaths are Microsoft and Novell, and that Microsoft is Microsoft, this makes the logical place to start looking for decent policy management to be Novell’s SUSE Linux Enterprise Desktop (SLED). When I sat down to discuss SUSE with a fellow sysadmin, who happens to be quite the SUSE evangelist, he told me that - contrary to my previously held beliefs - Zenworks is actually good for something.

Understand that I haven’t really used Zenworks since 2003. The experience was so traumatic that I declined to repeat it. Admittedly, the project was about comparing management of Windows systems at the time, but I found AD and GPOs significantly easier than Novell’s eDirectory and Zenworks. In seven years, it has come a long way.

I was impressed by the Linux management tools. A SUSE Linux Enterprise Server (SLES) and SLED setup running eDirectory and Zenworks looks like it would be a very easy-to-manage network. You could even have Windows clients attached, and it’s far smoother sailing than it was in 2003. It’s limited in OS support however, managing only Windows, SUSE, and Red Hat. Debian and Ubuntu are ignored, and OSX is left out in the cold.

The latest version of SLED ships with a license for something called Likewise Enterprise (LE). LE apparently is an easy-to-use piece of software that lets you join the most popular Unix based distributions, (including OSX) to a Microsoft AD, and push GPOs out them as simply and easily as you would to Windows. After listening to my friend rave about LE, I simply had to see this for myself.

We set up a test lab: four different Unix GPO applications. The first demonstration attached a series of SLED, Fedora, Ubuntu, CentOS and OSX systems to the domain and pushed policies out to them. I was absolutely floored by the number of policies that LE can manage.

In a moment, every objection I have had against Unix operating systems as Enterprise desktops that wasn't about application compatibility was erased. Sometime in the past few years, when I wasn’t looking, Unix based systems caught up.

Random greenhorn sysadmin number forty-two can now cheerfully manage a collection of Unix based systems from the AD as easily as managing Windows. Go try it, and see if any policies you care about are missing. I couldn’t find any.

My buddy wasn’t done with me, and next on the line was Quest (formerly Vintela) Authentication Services (QAS). This talked to all the major flavours of Linux and Unix as well as OSX. At first it is not as easy to use as LE, but I was impressed by the number of policy options. If QAS GPO offerings are behind those of LE, QAS had a demonstrable advantage with a robust Single Sign On (SSO) setup for these operating systems. It was far easier to configure and use than any cross-platform SSO I’ve used to date.

We moved on to a third option called DirectControl offered by Centrify. Having entered into this project with the idea that decent GPO support for Unix was most likely a pipe dream, the fact that there was a third solid offering in this field astonished me. Yet, despite some thorough testing, DirectControl stood up to every requirement I could impose on it.

As we were walking out of the lab, still talking about the products we were testing, we were accosted by a systems administrator and acolyte of the Cult of Apple. We went to his lab and we given a demo of ADmitMac by Thursby Software. While it supports no other Unix based systems apart from OSX, it does a capable job of pushing GPOs out to Macs, and marrying them to Microsoft’s AD.

Having thoroughly geeked out for the evening, we departed to the nearest pub. We learned many lessons, and I’ll use my next article to share the GPO-related ones with you.

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.