Chat now with support
Chat with Support

Safeguard Authentication Services 5.0.1 - Upgrade Guide

Privileged Access Suite for Unix Introducing One Identity Safeguard Authentication Services Upgrade the web console Upgrade Windows components Configure Active Directory Configure Unix agent components Upgrade client components manually Getting started with Safeguard Authentication Services
Getting acquainted with the Control Center Learning the basics

Privileged Access Suite for Unix

Unix security simplified

Privileged Access Suite for Unix solves the intrinsic security and administration issues of Unix-based systems (including Linux and macOS) while making satisfying compliance requirements easier. It unifies and consolidates identities, assigns individual accountability, and enables centralized reporting for user and administrator access to Unix. The Privileged Access Suite for Unix combines an Active Directory bridge and root delegation solutions under a unified console that grants organizations centralized visibility and streamlined administration of identities and access rights across their entire Unix environment.

Active Directory bridge

Achieve unified access control, authentication, authorization, and identity administration for Unix, Linux, and macOS systems by extending them into Active Directory (AD) and taking advantage of AD’s inherent benefits. Patented technology allows non-Windows resources to become part of the AD trusted realm, and extends AD’s security, compliance, and Kerberos-based authentication capabilities to Unix, Linux, and macOS. See for more information about the Active Directory Bridge product.

Root delegation

The Privileged Access Suite for Unix offers two different approaches to delegating the Unix root account. The suite either enhances or replaces sudo, depending on your needs.

  • By choosing to enhance sudo, you will keep everything you know and love about sudo while enhancing it with features like a central sudo policy server, centralized keystroke logs, a sudo event log, and compliance reports for who can do what with sudo.

    See for more information about enhancing sudo.

  • By choosing to replace sudo, you will still be able to delegate the Unix root privilege based on centralized policy reporting on access rights, but with a more granular permission and the ability to log keystrokes on all activities from the time a user logs in, not just the commands that are prefixed with "sudo." In addition, this option implements several additional security features like restricted shells, remote host command execution, and hardened binaries that remove the ability to escape out of commands and gain undetected elevated access.

    See for more information about replacing sudo.

Privileged Access Suite for Unix offers two editions: Standard edition and Advanced edition. Both editions include the Management Console for Unix, a common management console that provides a consolidated view and centralized point of management for local Unix users and groups; and Safeguard Authentication Services, patented technology that allows organizations to extend the security and compliance of Active Directory to Unix, Linux, and macOS platforms and enterprise applications. In addition:

  • The Standard edition licenses you for Safeguard for Sudo.
  • The Advanced edition licenses you for Privilege Manager for Unix.

One Identity recommends that you follow these steps:

  1. Install Safeguard Authentication Services on one machine, so you can set up your Active Directory Forest.
  2. Install Management Console for Unix, so you can perform all the other installation steps from the management console.
  3. Add and profile hosts using the management console.
  4. Configure the console to use Active Directory.
  5. Deploy client software to remote hosts.

    Depending on which Privileged Access Suite for Unix edition you have purchased, deploy one of the following:

    • Privilege Manager for Unix software (that is, Privilege Manager Agent packages)


    • Safeguard for Sudo software (that is, Sudo Plugin packages)

About this guide

The Safeguard Authentication Services Upgrade Guide is intended for Windows, Unix*, Linux, and Macintosh system administrators, network administrators, consultants, analysts, and any other IT professionals who will be upgrading Safeguard Authentication Services from a previous release. This guide walks you through one simple approach to upgrading Safeguard Authentication Services, highlighting the changes and enhancements associated with installing and configuring Safeguard Authentication Services using Management Console for Unix.

Of course, you can upgrade and install Safeguard Authentication Services without using Management Console for Unix. You can find those instructions in the Safeguard Authentication Services Installation Guide.

These are the basic Safeguard Authentication Services upgrade steps:

  1. Upgrade the web console
  2. Upgrade Windows components
  3. Configure Active Directory
  4. Configure Unix agent components

* The term "Unix" is used informally throughout the Safeguard Authentication Services documentation to denote any operating system that closely resembles the trademarked system, UNIX.

Introducing One Identity Safeguard Authentication Services

One Identity Safeguard Authentication Services is patented technology that enables organizations to extend the security and compliance of Active Directory to Unix, Linux, and macOS platforms and enterprise applications. It addresses the compliance need for cross-platform access control, the operational need for centralized authentication and single sign-on, and enables the unification of identities and directories for simplified identity and access management.

Upgrade requirements

You can upgrade Safeguard Authentication Services from any existing supported version of the product by installing Safeguard Authentication Services on the computer where the old version was installed.

To upgrade Safeguard Authentication Services, you must have local administrator rights to:

  • create a container and a child container in Active Directory
  • join a Unix host to the Active Directory domain

Note: Have your license available for the Setup wizard.

NOTE: Authentication Services 5.0.1 is stricter about following the default_etypes setting in vas.conf. If the domain is set up to only accept AES encryption types, prior to upgrading:

  1. Open vas.conf.
  2. Navigate to the [libdefaults] section.
  3. Ensure that the default_etypes are set correctly.

    For example:


    default_etypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96

Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating