Sign In Request

Continue

Support Forms Under Maintenance

Submitting forms on the support site are temporary unavailable for schedule maintenance. If you need immediate assistance please contact technical support. We apologize for the inconvenience.

Continue
Chat now with support
Chat with Support
  • Get Live Help

  • Complete Registration

    Sign In

    Request Pricing

    Contact Sales

Please select your product:

You have selected a product bundle. Can you please select the individual product for us to better serve your request.*

There is not a technical support engineer currently available to respond to your chat. For prompt service please submit a case using our case form.

To serve you better, please complete the Purpose of your Chat:
2000 characters remaining

Recommended Solutions for Your Problem

The following articles may solve your issue based on your description.

No Results Found
Close Start Chat
image.logo.print
image.logo
  • Products
    • View all Products
    • Free Trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Customer Stories
    • Documents
    • Events
    • Webcasts
    • Technical Documentation
    • Videos
    • White Papers
  • Trials
  • Services
    • Professional Services
    • One Identity University
    • Support Services
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Defender
      • Identity Manager
      • Identity Manager On Demand
      • Identity Manager On Demand - Starling Edition
      • One Identity Safeguard for Privileged Sessions (Balabit)
      • One Identity Safeguard for Privileged Passwords
      • Password Manager On Demand
      • Password Manager
      • Safeguard Privilege Manager for Windows
      • Safeguard Authentication Services
      • Safeguard for Privileged Passwords On Demand
      • Starling Connect
      • Safeguard for Privileged Sessions On Demand
      • Safeguard Remote Access
      • syslog-ng Premium Edition
      • syslog-ng Store Box
      • TPAM
      • OneLogin
    • Contact Support
      • Contact Us
      • Customer Service
      • Licensing Assistance
      • Renewals Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social
      • Facebook
      • Google+
      • LinkedIn
      • Twitter@OneIdentity
      • Youtube
Sign In

NOTICE! We are upgrading our support telephone services, implementing Genesys, starting the week of May 19, 2025

  • Print
  • My Downloads ()
  • Support
  • Technical Documentation
  • Safeguard Authentication Services 5.0.4
  • Safeguard Authentication Services 5.0.4 - Administration Guide

Safeguard Authentication Services 5.0.4 - Administration Guide

Table of Contents  
Privileged Access Suite for Unix
About this guide
Introducing One Identity Safeguard Authentication Services
About licenses System requirements
Windows and cloud requirements
Windows components Windows permissions Configure Active Directory
Configuring Active Directory About Active Directory configuration Join the host to AD without the Safeguard Authentication Services application configuration Version 3 Compatibility Mode
Unix agent requirements
Unix components Permissions matrix Encryption types
Network requirements
Unix administration and configuration
Joining the domain
Joining the domain using VASTOOL
Automatically generate user attributes
Unattended joining using Offline Domain Join (ODJ) credentials Joining the domain using VASJOIN script
Using manual pages (man pages) The configuration file Unix login syntax Keytab files Handling platform limitations on user name length Configuring Name Service Switch (NSS)
Using VASTOOL to configure NSS Using NSCD Forcing lowercase names
Configuring PAM
Using VASTOOL to configure PAM Home directory creation Kerberos ticket caches
Configuring AIX
Using VASTOOL to configure AIX
Configuring SELinux
Using VASTOOL to configure SELinux
Enabling diagnostic logging Working with netgroups
Configuring netgroup support with name service Unconfiguring netgroup support with name service
Cache administration
Blackout period Disconnected authentication
Working with read-only domain controllers Cross-forest authentication One-way trust authentication Supporting legacy LDAP applications
Installing the LDAP proxy Configuring the LDAP proxy
IPv6
Identity management
Planning your user identity deployment strategy User and group schema configuration
Configuring a custom schema mapping
Active Directory optimization (Best practice)
Managing Unix user accounts
Managing Unix users with MMC Managing user accounts from the Unix command line Managing users with Windows PowerShell
PowerShell cmdlets
Password management
Changing passwords
Changing passwords with VASTOOL Changing passwords with system utilities
Mapping local users to Active Directory users
Using map files to map users Mapping the root account Enable self-enrollment
Restarting services
Automatically generating Posix user identities
Migrating auto-generated identities to enterprise identities Migrating auto-generated group identities
Unix Personality Management
Unix Personality Management schema extension Joining the domain in Unix Personality Management mode
Overriding Unix account information
Managing Unix group accounts
Nested group support Managing Unix groups with MMC Managing groups from the Unix command line Managing groups with Windows PowerShell Overriding Unix group information
Local account migration to Active Directory AIX extended attribute support Unix Account Import Wizard
Import Source Selection Account matching rules Search base selection Account Association Final Review Results
Unix account management in large environments
User and group search paths Minimizing the size of the user cache
Migrating from NIS
Using Safeguard Authentication Services to augment or replace NIS RFC 2307 overview
RFC classes and attributes Limitations of RFC 2307 as implemented by Microsoft
Installing and configuring the Safeguard Authentication Services NIS components
Installing and configuring the Linux NIS client components Installing and configuring the Oracle Solaris NIS client components Installing and configuring the HP-UX NIS client components Installing and configuring the AIX NIS client components
NIS map search locations Deploying in a NIS environment
Starting the NIS Map Import Wizard
Import RFC 2307 NIS map objects from a local file Import RFC 2307 NIS map objects from an existing NIS server
Using NIS map command line administration utility
passwd, group, and netid maps Specific vs generic maps
The VASYP daemon
Maintaining netgroup data
Managing access control
About host access control Using "Logon To" for access control Setting up access control Configuring local file-based access control Resolving conflicts between the allow and deny files Per-service access control Configuring access control on ESX 4 Configuring Sudo access control
Enabling sudo_vas
Certificate distribution policy
Managing local file permissions
The Ownership Alignment Tool
Using OAT Installing OAT
Changing file ownership manually
Performing a cross-domain search OAT matching scripts Rollback changes
Changing file ownership using the script OAT file formats
Active Directory User Information file Active Directory Group Information file User map file Group map file Local User Override file Local Group Override file Files to Process List file Files to Exclude List file Processed Files List file
Certificate Autoenrollment
Certificate Autoenrollment on UNIX and Linux Certificate Autoenrollment requirements and setup
Java requirement: Unlimited Strength Jurisdiction Policy Files Installing certificate enrollment web services Configuring Certificate Services Client - Certificate Enrollment Policy Group Policy Configuring Certificate Services Client - Auto-Enrollment Group Policy Configuring Certificate Templates for autoenrollment
Using Certificate Autoenrollment
Configuring Certificate Autoenrollment manually
Configure a machine for Certificate Autoenrollment Configure a user for Certificate Autoenrollment
Trigger machine-based Certificate Autoenrollment
Troubleshooting Certificate Autoenrollment
Certificate Autoenrollment process exited with an error Enable full debug logging Pulse Certificate Autoenrollment processing Manually apply Group Policy
Command line tool
vascert command reference
vascert commands and arguments
Integrating with other applications
One Identity Starling integration
Starling Two-Factor Authentication requirements Setting up Starling users Joining Safeguard Authentication Services with Starling Configuring Starling to use a proxy server Starling Attributes: Configure LDAP attributes for use with push notifications Logging in with Starling Two-Factor Authentication Unjoining from Starling Disabling Starling 2FA for a specific PAM service
Defender integration
Defender installation prerequisites Installing Defender
Change Auditor for Authentication Services integration
Installing Change Auditor for Authentication Services
Application integration
Managing Unix hosts with Group Policy
Safeguard Authentication Services Group Policy
Group Policy
Administrative interface Unix agent technology
Concepts
How Safeguard Authentication Services Group Policy works Group Policy framework for Unix Server-side extensions vgptool Client-side extensions Administrative templates on Unix Apply mode
Setting policy apply mode
Unix policies
Scripts Refresh Scripts policy
Configuring a refresh script
Startup Scripts policy
Configure a startup script
Cron policy
Creating or modifying a crontab file
Configuring a crontab entry
Files policy
Configuring a Files policy Text Replacement Macros
Specifying a text replacement macro
Dynamic File Copy policy Login Prompt policy
Setting the Login Prompt policy
Message of the Day policy
Setting the Message of the Day policy
Samba Configuration policy Symbolic Link policy
Setting a new symbolic link
Syslog policy
Adding a syslog entry
Sudo policy
Adding a Sudo rule
One Identity policies
Quest OpenSSH Configuration policy Licensing policy
Adding a license file
Defender Settings policy
Enabling one-time password authentication for Unix
Privilege Manager for Unix policy
Privilege Manager for Unix policy files
Configuring Privilege Manager policy files
Privilege Manager Configuration policy
Configuring Privilege Manager configuration settings
Safeguard Authentication Services group policies
Group Policy Configuration policy
Configuring Group Policy options
Client-Side Extensions policy
Safeguard Authentication Services policies
Configuration policy Mapped User policy Service Access Control policy Account Override policies
User Account Override policy Group Account Override policy
Host Access Control policy
Configuring a User Allow Entry policy Configure a User Deny Entry policy
Display specifiers
Registering display specifiers Unregistering display specifiers Display specifier registration tables
Troubleshooting
Getting help from technical support Disaster recovery Long startup delays on Windows Pointer Record updates are rejected Resolving preflight failures Resolving DNS problems Time synchronization problems Unable to authenticate to Active Directory Unable to install or upgrade Unable to join the domain Unable to log in Unix Account tab is missing in ADUC vasypd has unsatisfied dependencies
Glossary
  • Viewing Topics 269 - 269 of 269

Glossary

Glossary
access control
A set of procedures performed by hardware, software, and administrators to monitor access, identify users requesting access, record access attempts, and grant or deny access. Compare with authorization. See also ACL.
Access Control List (ACL)
A set of data that informs a computer's operating system which permissions, or access rights, that each user or group has to a specific system object, such as a directory or file. Each object has a unique security attribute that identifies which users have access to it, and the ACL is a list of each object and user access privileges such as read, write, or execute.
ACE
Acronym for Access Control Entry.
ACL
Acronym for Access Control List.
ACL Filtering
Access Control Lists can be applied to Group Policy objects that determine whether or not the policy will be applied on a system.
Active Directory
Microsoft's network directory service for computers.
ADAM
Active Directory Application Mode, a Windows 2003 service in which LDAP runs as a user service rather than as a system service.
ADSI
Active Directory Services Interface, an editor (browser), scripting language, and so on.
ADUC
Active Directory Services Interface, an editor (browser), scripting language, and so on.
affinity
With respect to a directory, the organization of the accounts relies on properties they have in common. This similarity may be due to departmental structure or geographical location of the people that use the accounts.
ARC4
See RC4.
ARCFOUR
See RC4.
ARS
ActiveRoles Server is a product installed on a Windows server that uses SQL Server for configuring data and publishing itself as a connection point object within Active Directory. It is a cross-platform, roles-based provisioning system that allows additional attributes to be stored for an object. For example, ARS can put a newly hired engineer into all the appropriate groups on all platforms relevant to their job description.
authentication
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten. Logically, authentication precedes authorization (although they may often seem to be combined).
authoritative source
In migrating identities from disparate NIS domains, identities from the first source repository are migrated without any changes to their internal identity (ID) and the first repository becomes the authoritative source. In case of ID conflict or mismatch, IDs in all remaining sources are changed to match those in the first source.
authorization
Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so on). Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session. Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system administrator and the actual checking of the permission values that have been set up when a user is getting access. Logically, authorization is preceded by authentication.
Block Inheritance
When Block Inheritance is set on a GPO link, all GPOs above the link level are excluded from GPO processing unless the GPO is enforced.
CAC
Common Access Card, a smart card issued by the United States Department of Defense (DoD) for active-duty military, civilian employees and contractors.
Cadence
[[[Undefined variable TemplateGuideVariables.OneIdentityNameShort]]] font that contains standard icons used in the user interfaces for various [[[Undefined variable TemplateGuideVariables.OneIdentityNameShort]]] products.
canonical name
Essentially the distinguished name in reverse; generally, a software-internal representation, such as acme.com/engineering/jim.
CIFS
Common Internet File System, a Microsoft technology. See also SMB.
CN
Common Name, a component of a distinguished name (DN).
COM
Component Object Model, a Microsoft technology that enables components to communicate, used by developers to create reusable software components, link components together to build applications, and take advantage of Windows services like Active Directory.
credential
A proof of qualification or competence attached to a user or session, an object verified during an authentication transaction. In Kerberos parlance, a message containing the random key along with a service name and the user's long-term key.
DC
Domain Controller.
DES
Data Encryption Standard is a cypher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976. It is characterized by a relatively short key length (56 bits) and is considered less secure for many application environments than some alternatives.
disconnected authentication
Provisory authentication based on prior login and used in case of network failure. The maximum duration of a stored password hash is configurable.
DN
Distinguished Name.
domain
In Active Directory, a centrally-managed group of computers.
domain controller (DC)
The server that responds to security authentication requests in the Active Directory domain.
Drop-down
Flare default style, that can be used to group content within a topic. It is a resource to structure and collapse content especially in non-print outputs.
DSE
Directory-specific entry in an LDAP environment.
Enforced
If a GPO is enforced, then it will be applied regardless of block inheritance settings.
firewall
A piece of hardware, software, or both that sets rules about what network traffic can cross it. These rules can focus on the protocols used by the traffic and ports in use. Authentication Services, for instance, requires a set of ports by which it implements its services. Those ports must not be blocked. However, if a host has access to Active Directory, to its domain controllers, and so on, then the ports needed by Authentication Service are open. For Authentication Services specifically, this means 88 (TCP/UDP for Kerberos ticket services), 389 (LDAP queries and ping), 464 (TCP/UDP for Kerberos passwords), and 3268 (TCP for Global Catalog access); optionally, 53 (UDP for DNS SRV records) and 123 (UDP for time-synchronization with Active Directory). For Authentication Services Group Policy, port 445 (TCP for Microsoft DS).
forest
The collection of all objects and their attributes and rules in Active Directory. It is named "forest" because it holds one or more trust-linked trees, allowing users in one domain to access resources in another domain.
FQDN
Fully Qualified Domain Name; a domain name specified exhaustively, such as CN=jim,OU=engineering,DC=acme,DC=com.
FSMO
Flexible Single Master Operations; a multi-master-enabled database such as Active Directory that provides the flexibility of allowing changes at any domain controller in the enterprise, but also gives rise to the possibility of conflicts and the need to resolve them, especially for certain tasks. Collectively, FSMO tasks are used where standard data transfer and update methods on multiple peer domain controllers are ill-adapted to multi-master replication, for example: schema update and modification domain naming (addition or removal of domains in the forest), relative ID assignment (including SIDs), infrastructure (security) maintenance (including GUIDs, SIDs, and reference object DN in cross-domain references), and <a href="#PDC">PDC</a> emulation. These tasks are handled in a single master model by Windows 2000/2003.
GC
Global Catalog.
GECOS
(also in lower case) A field in the Unix /etc/passwd file that contains general information about the user including things like full name, telephone number, and so on, depending completely on the host implementation.
gid
group identity, standard C library object, represented by gid_t, identifying a group.
GID
Group identity; broad term referring to the underlying number that identifies a group of users or other objects in a directory service.
Glossary
List of short definitions of product specific terms.
GPMC
Group Policy Management Console; a Microsoft tool.
GPO
Group Policy Object; an actual directory object tied to system volume instance. The group policy object is a collection of settings that define what a system looks like and how it behaves for a defined group of users. A GPO is created, using the Group Policy Management Console when there are such settings. GPOs are associated with a container such as a site, domain, or organizational unit (OU). GPOs are very powerful and can be used to distribute software and updates such as Tivoli (IBM). See also group policy.
group policy
A Microsoft technology that reduces the cost of supporting Windows users by providing centralized management of computers and user in Active Directory. Group Policy controls various aspects of an object including security policy, software installation, login, folder redirection, and software settings. Such policies are stored on group policy objects (GPOs).
GSS
Generic Security Service; security services provided atop underlying, alternative cryptographic mechanisms such as Kerberos. According to RFC 2744, the GSS API allows a caller application to authenticate a principal identity associated with a peer application to delegate rights to another peer, and to apply security services such as confidentiality and integrity on a per-message basis.
GUID
Globally Unique Identifier; a number, address, or other cookie used to represent an object uniquely in a directory service, file system, and so on. In Active Directory, the GUID is a unique, unchanging 128-bit string used for search and replication.
joining
Describes the action of a Unix or Linux workstation being incorporated into an Active Directory domain by means of the vastool join command.
KDC
The Key Distribution Center in Kerberos. Part of a cryptosystem to reduce the intrinsic risk of exchanging keys, basically consisting of the authentication server (AS) and the ticket-granting server (TGS).
Kerberized application
A software application that requires or performs Kerberos authentication.
Kerberos
A computer network authentication protocol that proves the identity of intercommunicating points on an insecure network like a LAN or the Internet in a secure manner. Guards against eavesdropping and replay attacks. There are different Kerberos encryptions including DES and ARC4, the latter being more secure as well as the default in Authentication Services since release 2.6 SP4.
Kerberos authentication
An authentication system developed at the Massachusetts Institute of Technology (MIT). Kerberos is designed to enable two parties to exchange private information across an otherwise open network. It works by assigning a unique key, called a ticket, to each user that logs on to the network. The ticket is then embedded in messages to identify the sender of the message.
keytab
A file containing authentication credentials used, usually in place of a password, for authentication.
LAM
Loadable Authentication Module, IBM's precursor to PAM on the AIX (Unix) operating system. Authentication Services provides a LAM-based implementation on AIX. LAMs are configured in /usr/lib/security/methods.cfg.
LDAP
Lightweight directory access protocol, a networking protocol for working with a directory service running over TCP/IP. Such a directory service would usually adhere to X.500, a tree of entries each possessing attributes and values for those attributes. LDAP deployments typically use DNS for simple structure most useful for casual access, but full-scale directory services are more complex with hierarchical organizational units and wide-ranging services from printers and documents themselves to groups of people, company divisions, groups, etc.
LDIF
LDAP Data Interchange Format. See also Lightweight Directory Access Protocol (LDAP).
libvas
Prefix associated with Authenticaiton Services runtime libraries and interfaces.
Lightweight Directory Access Protocol (LDAP)
A software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate intranet. LDAP is a "lightweight" version of Directory Access Protocol (DAP), which is part of X.500, a standard for directory services in a network. Netscape includes it in its latest Communicator suite of products. Microsoft includes it as part of what it calls Active Directory in a number of products including Outlook Express. The Novell NetWare Directory Services inter-operates with LDAP. Cisco also supports it in its networking products.
Mapped Users
Mapped User allows Authentication Services to authenticate against Active Directory while taking identity and Unix attributes from local files. It is implemented by replacing the 'x' placeholder in /etc/passwd with the user principal name (UPN) (Linux and Unix only), or by creating a local-to-AD user map file and specifying the location of that file in /etc/opt/quest/vas/vas.conf (Linux, Unix, or Mac).
MIIS
Microsoft Identity Integration Server; a server that manages the flow of data between all connected data sources and automates the process of updating identity information (for example, of employees, and so on) in the implementing environment.
MMC
Microsoft Management Console, for which Authentication Services has a snap-in used when browsing users or groups and getting their properties.
NAS
Network-Attached Storage; file-level data storage connected, often remote, but not appearing as a local volume/disk. This is in opposition to SAN.
Native Mode
Native Active Directory mode refers to a network being serviced completely by either Windows 2000 or Windows 2003 servers, but not both. If servers from both versions are present, the services offered can only be a common subset of the two. If all servers are running Windows 2003 Server, then all the features that this operating system offers over its predecessor are available. Not being in native mode has ramifications for various components, that is, local groups are not added to the PAC of the Kerberos ticket; group membership is not available.
NIS
Network Information Services; a Unix client-server directory service protocol, originally Sun Microsystems' "Yellow Pages." It provides centralized control over many types of network objects including users, groups, and network services like printers. NIS arose as a solution to each Unix host having its own /etc/passwd and groups files as the resident authority on users and groups when these notions needed to be extended over a network. NIS domains are flat (no hierarchy), use no authentication and the NIS map files are limited to 1024 bytes in size.
Note
Circumstance, that needs special attention.
nscd
Name service caching daemon; provides a cache for the most common name service request on Linux and Unix from the passwd, group, and hosts databases through standard C library interfaces including getpwnam, getpwuid, getgrnam, getgrgid, gehostbyname, and others. The configuration file is /etc/nscd.conf.
NSS
Name Service Switch; interface to nsswitch.conf that controls how look-ups are done for users (/etc/passwd), groups (/etc/grps), hosts (/etc/hosts), and so on. For example, getpwnam goes through NSS, which is extensible and configurable (just as is PAM), to reach variably passwd, vasd, NIS, or LDAP.
NTP
Network Time Protocol, as implemented by a server that keeps time on the network and is accessible to other nodes for the purpose of all keeping the same notion of time.
Organizational Unit (OU)
An Active Directory container object used within domains. An organizational unit is a logical container into which users, groups, computers, and other organizational units are placed. It can contain objects only from its parent domain. An organizational unit is the smallest scope to which a group policy object can be linked, or over which administrative authority can be delegated.
OU
Organization Unit. See also Personality container.
Override
If a GPO specifies a policy and another GPO further down in the GPO application chain is allowed to overwrite the previously specified policy, then the policy supports override.
PAC
Privileged Attribute Certificates, used by Kerberized applications for fine-grained access control to services, a feature of Microsoft's Kerberos implementation.
PAM
Pluggable Authentication Module; an architecture and shared libraries created by Sun Microsystems for the Solaris operating system that permits intervention into and specialization of the authentication process. PAMs are configured in /etc/pam.conf or in individual files off /etc/pam.d/.
PDC
Primary Domain Controller; an NT concept, emulated on Windows 2000/2003, that performs a number of crucial tasks in an enterprise including time synchronization, password replication, recording of password failures, account lock-out, and modification or creation of GPOs.
Personality container
An Active Directory organization unit (OU) designated to contain user and group personalities. Unix clients specify a Unix personality container (vastool join -p) in order to join the domain in Unix Personality Management (UPM) mode.
Personality scope
Consists of a primary Personality container, along with any secondary Personality containers. Only the Personalities, Active Directory users, and Active Directory groups that reside within that Personality scope will be usable on the Unix system.
PKI
Public Key Infrastructure; a way to ensure secure transactions over the wire; an arrangement providing for third-party vetting of user identities typically placing any keys within a certificate. Not yet a standard; there are myriad implementations.
POSIX
Portable Operating System Interface; the open operating interface standard accepted worldwide. It is produced by IEEE and recognized by ISO and ANSI.
principal
In Kerberos, this is basically a simple account including name, password, and other information stored in the database and encrypted using a master key.
provisioning
The process of providing customers or clients with accounts, the appropriate access to those accounts, all the rights associated with those accounts, and all of the resources necessary to manage the accounts. When used in reference to a client, provisioning can be thought of as a form of customer service.
QAS
Quest Authentication Services.
RC4
(pronounced "arcfour") The most widely used stream cipher in such popular protocols as secure sockets layer (SSL). RC4 generates a pseudo random stream of bits XOR'd with the clear-text password, for example. RC4 is more secure than DES.
realm
A Kerberos term that usually maps to an Active Directory domain, not because they are the same thing, but because for implementation, it is a natural alignment.
SaaS
Software-as-a-Service.
Samba
A free software implementation of Microsoft's networking protocol that runs on *nix systems and is capable of integrating with an Active Directory (Windows) domain as either a primary domain controller or as a domain member. See also SMB.
SAN
Storage Area Network; an architecture for attaching remote storage devices (disk arrays, tape libraries, optical jukeboxes, and so on) to servers in such a way that to the operating system these appear as locally attached. This is in opposition to NAS where it is clear that the storage is remote.
Sarbanes Oxley Act (SOX)
Reference to legislation enacted in response to recent and spectacular financial scandals, to protect shareholders and the general public from accounting errors and fraudulent practices. The act is administered by the Securities and Exchange Commission, which sets deadlines for compliance and publishes rules on requirements. SOX defines which records are to be stored and for how long. It also affects IT departments whose job it is to store electronic records.
schema master
A domain controller that holds the schema operations master role in Active Directory. The schema master performs write operations to the directory schema and replicates updates to all other domain controllers in the forest. At any time, the schema master role can be assigned to only one domain controller in the forest.
Secure Sockets Layer (SSL)
The Secure Sockets Layer (SSL) is a commonly used protocol for managing the security of message transmission on the Internet. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most web server products. Developed by Netscape, SSL also gained the support of Microsoft and other Internet client/server developers, becoming the de facto standard until evolving into Transport Layer Security (TLS). The sockets part of the term refers to the sockets method of passing data back and forth between a client and a server program in a network or between program layers in the same computer. SSL uses the public/private key encryption system from RSA, which also includes the use of a digital certificate.
security principal
An entity that can be positively identified and verified by means of a technique known as authentication.
Simple and Protected GSS-API Negotiation Mechanism (SPNEGO)
A GSSAPI mechanism that allows the secure negotiation of the mechanism to be used by two different GSSAPI implementations. In essence, SPNEGO defines a universal but separate mechanism, solely for the purpose of negotiating the use of other security mechanisms. SPNEGO itself does not define or provide authentication or data protection, although it can allow negotiators to determine if the negotiation has been subverted, once a mechanism is established.
Single Sign-On (SSO)
An authentication process in a client/server relationship where the user, or client, can enter one name and password and have access to more than one application or access to a number of resources within an enterprise. Single sign-on removes the need for the user to enter further authentications when switching between applications.
Skin
Used to design the online output window.
SMB
Server Message Block; a protocol that exists primarily for trust relationships, the concept upon which NetBIOS is based and hence, used by DOS and Windows. The message format is used for sharing files, directories and devices. CIFS (Common Internet File System) is a synonym for SMB. See also Samba.
Snippet
Flare file type that can be used to reuse content. The One Identity Safeguard Authentication Services contains various default snippets.
Tattooing
When files or settings are left on the system after group policy has been un-applied, the files and settings are said to be tattooed. Unless otherwise documented a policy should remove all associated settings and files when the policy is unlinked. A policy that supports non-tattooing will not leave any files or settings behind after it is un-applied.
TGS
Ticket-granting server, part of a key-distribution server (KDC).
TGT
Ticket-granting ticket, the initial ticket given by the Kerberos authentication server permitting the TGS to be contacted
Ticket
A voucher that isn't easily forged and proves that the bearer has properly applied for authentication to a service. In Kerberos parlance, a message containing a random key, the same one that was passed in the credential, plus the user's name, the whole being encrypted using the service's long-term key. Tickets obviate the inconvenience of using a password in that they can be supplied to different services rather than performing separate authentication of the password with each service. See credential.
Tip
Additional, usefull information.
UID
User identity, broad term referring to the underlying number that identifies a user in a directory.
VAS
Vintela Authentication Services.
vas.conf
Configuration file on the path /etc/opt/quest/vas/vas.conf that is Authenticaiton Services' equivalent (and more) to Kerberos' krb5.conf.
vasd
The name of the Autentication Service daemon.
VGP
Quest Group Policy, Unix group policy product.
  •  Previous
  • Viewing Topics 269 - 269 of 269
  • Next 

 Welcome to One Identity Support

You can find online support help for*product* on an affiliate support site. Click continue to be directed to the correct support content and assistance for *product*.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating

Company
  • About Us
  • Buy
  • Contact Us
  • Careers
  • News
Resources
  • Customer Stories
  • Documents
  • Events
  • Videos
  • Blogs
Related
  • Technical Documentation
  • One Identity University
  • Professional Services
  • Renew Support
  • Licensing Assistance
Social
  • Facebook
  • Instagram
  • Twitter
  • LinkedIn
  • Youtube
대한민국 web site version is selected
  • Albania
  • Angola
  • Anguilla
  • Antigua & Barbuda
  • Argentina
  • Aruba
  • Australia
  • Austria
  • Azerbaijan
  • Bahamas
  • Bahrain
  • Barbados
  • Belgium
  • Belize
  • Benin
  • Bermuda
  • Bolivia
  • Bosnia-Herzegovina
  • Botswana
  • Brazil
  • British Virgin Islands
  • Bulgaria
  • Burkina Faso
  • Burundi
  • Cameroon
  • Canada
  • Cape Verde
  • Cayman Islands
  • Central African Republic
  • Chad
  • Chile
  • 中国
  • Colombia
  • Comros
  • Congo
  • Costa Rica
  • Croatia (Hrvatska)
  • Cyprus
  • Czech Republic
  • Democratic Republic of Congo
  • Denmark
  • Djibouti
  • Dominica
  • Dominican Republic
  • Ecuador
  • Egypt
  • El Salvador
  • Estonia
  • Ethiopa
  • Finland
  • France
  • French Guiana
  • French Overseas Territories
  • French Polynesia
  • Gabon
  • Gambia
  • Germany
  • Ghana
  • Greece
  • Grenada
  • Guadeloupe
  • Guatemala
  • Guinea
  • Guyana
  • Haiti
  • Honduras
  • Hong Kong
  • Hungary
  • Iceland
  • India
  • Ireland
  • Israel
  • Italy
  • Ivory Coast
  • Jamaica
  • 日本
  • Jordan
  • Kenya
  • 대한민국
  • Kuwait
  • Latvia
  • Lesotho
  • Liberia
  • Libya
  • Lithuania
  • Luxembourg
  • Macedonia
  • Madagascar
  • Malawi
  • Malaysia
  • Mali
  • Malta
  • Martinique
  • Mauritania
  • Mauritius
  • Mayotte
  • Mexico
  • Monaco
  • Montenegro
  • Montserrat
  • Mozambique
  • Namibia
  • Netherlands
  • New Caledonia
  • New Zealand
  • Nicaragua
  • Niger
  • Nigeria
  • Norway
  • Oman
  • Panamá
  • Paraguay
  • Peru
  • Philippines
  • Poland
  • Portugal
  • Puerto Rico
  • Qatar
  • Reunion
  • Romania
  • Russian Federation
  • Rwanda
  • Saudi Arabia
  • Senegal
  • Serbia
  • Seychelles
  • Sierra Leone
  • Singapore
  • Slovakia
  • Slovenia
  • Somalia
  • South Africa
  • Spain
  • St. Kitts & Nevis
  • St. Lucia
  • St. Vincent & Grenadines
  • Suriname
  • Swaziland
  • Sweden
  • Switzerland
  • Taiwan
  • Tanzania
  • Thailand
  • Togo
  • Trinidad y Tobago
  • Turkey
  • Turks & Caicos Islands
  • Uganda
  • Ukraine
  • United Kingdom
  • United States
  • Uruguay
  • US Virgin Islands
  • Venezuela
  • Yemen
  • Zambia
  • Zimbabwe
대한민국
한국어 | English

© 2025 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center

OK Go to My Account

IE 8, 9, & 10 No longer supported

The One Identity Portal no longer supports IE8, 9, & 10 and it is recommended to upgrade your browser to the latest version of Internet Explorer or Chrome.

Upgrade to IE 11 Click here

Upgrade to Chrome Click here

If you continue in IE8, 9, or 10 you will not be able to take full advantage of all our great self service features.

Close