The following table details the encryption types used in Authentication Services.
|Encryption types||Specification||Active Directory version||Authentication Services version|
|HMAC-SHA1-96-AES128||RFC 3961||Windows Server 2008 +||3.3.2+|
|HMAC-SHA1-96-AES256||RFC 3961||Windows Server 2008 +||3.3.2+|
One Identity recommends that you install One Identity Management Console for Unix, a separate One Identity product that provides a mangement console that is a powerful and easy-to-use tool that dramatically simplifies deployment of Authentication Services agents to your clients. The mangement console streamlines the overall management of your Unix, Linux, and Mac OS X hosts by enabling centralized management of local Unix users and groups and providing granular reports on key data and attributes.
Prior to installing Management Console for Unix, ensure your system meets the minimum hardware and software requirements for your platform.
Can be installed on the following configurations:
The Management Console for Unix server requires Java 8 (also referred to as JRE 8, JDK 8, JRE 1.8, and JDK 1.8).
|Managed Host Requirements||
Click www.oneidentity.com/products/authentication-services/ to view a list of Unix, Linux, and Mac platforms that support Authentication Services.
Click www.oneidentity.com/products/privilege-manager-for-unix/ to review a list of Unix and Linux platforms that support Privilege Manager for Unix.
Click www.oneidentity.com/products/privilege-manager-for-sudo/ to review a list of Unix, Linux, and Mac platforms that support Privilege Manager for Sudo.
|Default memory requirement||
Authentication Services must be able to communicate with Active Directory, including domain controllers, global catalogs, and DNS servers using Kerberos, LDAP, and DNS protocols. The following table summarizes the network ports that must be open and their function.
|389||Used for LDAP searches against Active Directory Domain Controllers. TCP is normally used, but UDP is used when detecting Active Directory site membership.|
|3268||Used for LDAP searches against Active Directory Global Catalogs. TCP is always used when searching against the Global Catalog.|
|88||Used for Kerberos authentication and Kerberos service ticket requests against Active Directory Domain Controllers. TCP is used by default.|
|464||Used for changing and setting passwords against Active Directory using the Kerberos change password protocol. Authentication Services always uses TCP for password operations.|
|53||Used for DNS. Since Authentication Services uses DNS to locate domain controllers, DNS servers used by the Unix hosts must serve Active Directory DNS SRV records. Both UDP and TCP are used.|
|123||UDP only. Used for time-synchronization with Active Directory.|
|445||CIFS port used to enable the client to retrieve configured group policy.|
Note: Authentication Services, by default, operates as a client, initiating connections. It does not require any firewall exceptions for incoming traffic.
This section explains Authentication Services administration and configuration details relevant to administrators who are integrating Unix hosts with Active Directory.
A separate Administration Guide for Mac OS X is available on the distribution media. While many of the concepts covered in this guide apply to Mac OS X it is recommended that you refer to the Authentication ServicesMac OS X/macOS Administration Guide first when working with Mac OS X.