Chat now with support
Chat with Support

Safeguard Authentication Services 4.2 - Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Authentication Services Unix administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing Unix hosts with Group Policy
Authentication Services Group Policy
Group Policy Concepts Unix policies One Identity policies
Display specifiers Troubleshooting

Integrating with other applications

Authentication Services integrates with the following products.

  • InSync
  • One Identity™ Active Roles
  • One IdentityDefender®
  • One Identity™ Privilege Manager for Unix
  • One Identity™ Starling Two-Factor Authentication
  • Quest® Change Auditor
  • Quest® Enterprise Reporter
  • Quest® InTrust®
  • Quest® Recovery Manager for Active Directory

This section includes instructions for integrating Starling Two-Factor Authentication, Defender, and Change Auditor with Authentication Services.

Note: See the One Identity website for information related to the integration of Authentication Services with other products.

One Identity Starling integration

One Identity Starling Two-Factor Authentication is a SaaS solution that provides two-factor authentication on a product enabling organizations to quickly and easily verify a user's identity. This service is provided as part of the One Identity Starling cloud platform. In addition, Starling offers a hybrid service, One Identity Hybrid, that allows you to take advantage of companion features from Starling services, such as Starling Two-Factor Authentication (2FA). Joining One Identity Authentication Services to One Identity Starling allows you to take advantage of these companion features from Starling services.

In order to use Starling 2FA with Authentication Services, you must join Authentication Services to Starling. This is done from the Preferences | Starling Two-Factor Authentication Join pane in the Control Center. This pane also includes the following Help links, which provide assistance with Starling:

  • Visit us Online displays the Starling login page where you can create a new Starling account.
  • Trouble Joining displays the Starling support page with information on the requirements and process for joining with Starling.

Starling Two-Factor Authentication requirements

In order to use Starling Two-Factor Authentication with Authentication Services, you will need the following:

  • A valid license for Authentication Services with One Identity Hybrid subscription included.
  • A Starling Organization Admin account or a Collaborator account associated with the One Identity Hybrid subscription. For more information on Starling, see the One Identity Starling Hosted User Guide.
  • An Active Directory group for Starling users.

    NOTE: All Starling users must have the following defined in order to work with Starling 2FA:

    • Valid email address
    • Valid mobile phone number in E.164 format. (that is, +<country code><area code><phone number>)
    • Be a member of this Starling group dictated by GPO.

    For more information, see Setting up Starling users.

  • One Identity Authentication Services 4.2 (or later)

The following table provides a list of supported platforms for integrating Authentication Services with Starling Two-Factor Authentication.

NOTE: PPC64 and PPC64LE architectures require a kernel greater than 2.6.37.

Table 21: Starling 2FA: Supported platforms




CentOS Linux

5, 6, 7

Current Linux architectures: s390, s390x, PPC64, PPC64le, ia64, x86, x86_64, AARCH64


Current supported releases

x86_64, x86, AARCH64

Fedora Linux

Current supported releases

x86_64, x86, AARCH64


Current supported releases

x86_64, x86, AARCH64

Oracle Enterprise Linux (OEL)

5, 6, 7

Current Linux architectures: s390, s390x, PPC64, PPC64le, ia64, x86, x86_64, AARCH64

Red Hat Enterprise Linux (RHEL)

5, 6, 7

Current Linux architectures: s390, s390x, PPC64, PPC64le, ia64, x86, x86_64, AARCH64





SPARC, x64

SuSE Linux Enterprise Server (SLES)/Workstation

11, 12, 15

Current Linux architectures: s390, s390x, PPC64, PPC64le, ia64, x86, x86_64, AARCH64


Current supported releases

x86_64, x86, AARCH64

Setting up Starling users

A new Group Policy Object has been added to Authentication Services to manage the group file for Starling, which is located in /etc/opt/quest/vas/users.starling.

Sample users.starling file

# This assumes that the host has been joined to the domain.

# To validate the users.starling file, run:

# vastool info acl


# This file controls which user's have Starling appled to them during login based

# on group membership.

# For entries:

# If DOMAIN is omitted ( simple name given )it is assumed to be the joined domain.

# Entries are case insensitive.

# DOMAIN can be either long(fqdn) or short(netbios).

# Apply Starling to members of the sales and engineering groups.

# The entry DOMAIN\SamAccountName format is preferred.



This file can be manually created or set using the GPO.

To enable Starling for users using the GPO

  1. Open your Group Policy management system.
  2. Select the applicable group policy.
  3. Navigate to Computer configuration | Unix Settings | Starling.
  4. Double-click users.starling.
  5. Add the groups that contain the users to be enabled to use Starling 2FA.

It may take up to 90 minutes to apply this configuration change. Use vgptool apply to apply the changes quicker.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating