Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home IT Management
    • IT Management
    • Networking

    Likewise Integrates Alien Systems into Microsoft’s Active Directory

    Written by

    eweekdev
    Published August 11, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      By: Frank Ohlhorst dnu

      Imagine you’re a network manager, happily living in your world of Windows servers and desktops, when out of the blue, the CTO marches in to inform you that not only is the art department switching to Macs but the CFO wants to save a few bucks by going the Linux route, and it’s up to you to make it happen. As you fall out of your chair with visions of desktop management meltdowns in your mind, you wonder if there is a product to make this work with your deployed Active Directory. Luckily, there is, and it is called Likewise Enterprise.

      Likewise Software’s Likewise Enterprise 5.3 allows administrators to integrate Linux, Unix and Mac systems with Microsoft’s Active Directory, as well as manage AD from non-Windows systems. But that’s only part of the story: Features such as directory migration, group policy support, reporting and single sign-on turn the product into a complete identity and policy management suite that offers all the underpinnings to adhere to compliance regulations like HIPAA (Health Insurance Portability and Accountability Act) and PCI DSS (Payment Card Industry Data Security Standard). The product accomplishes those lofty goals by providing extensive reporting and logging capabilities, as well as MMC (Microsoft Management Console) plug-ins, native management tools and dashboards.

      Licenses for Likewise Enterprise start at around $420 per server and $100 per desktop system. Organizations looking to join only non-Windows systems to AD can turn to the freely downloadable Likewise Open, which hit Version 6.0 in July.

      Testing Likewise Enterprise

      I tested Likewise Enterprise 5.3 on a Windows Server 2008 R2 network and was surprised at how easy it was to install. Likewise works based on a client/server model, where a Likewise server is set up and a client application is distributed to the endpoints. One installation step that gave me pause was the question of whether or not to extend my AD schema to best manage non-Windows systems via group policy.

      I opted to extend the schema on my test system, but I recommend avoiding this step if you are running a complex multiserver environment, especially if you have mixed versions of Windows Server. If I hadn’t extended my AD schema, I would have had to manage certain group policy options through the Likewise management console rather than through the regular AD controls-not a bad compromise.

      To add my non-Windows test systems to AD, I had to install an agent on each of my test endpoints: an Ubuntu 10.04 PC, a MacBook Pro and an openSUSE 11.4 virtual PC running under a VMware hypervisor. I installed the agents manually-Likewise offers slick graphical installers for each platform it supports-but administrators on large networks may want to investigate automated options for agent deployment.

      Once I had the agents installed, I was able to log in to the Windows Domain without any problems. One nit to pick is log-in times, as they can be rather slow, depending on the infrastructure in use and, I assume, the number of policies being enforced. Likewise is working on an updated version of the agent to resolve the slow log-in issues.

      With initial setup behind me, I was able to launch the group policy editor and start making changes to the policies that can be associated with the Linux and Mac clients running the agents.

      I found that Likewise Enterprise offers an impressive array of policies for Linux users. On Linux systems (running the GNOME desktop environment), I was able to create policies that controlled how the desktop functioned, ranging from screensavers used to dialogs associated with logging out.

      However, the real power of the policy controls became evident with the authorization and identification policies. Here, I was able to enable offline log-in support (which allows mobile users to log in to their systems while disconnected), set password expirations and digitally sign communications. What’s more, I was able to create policies for creating home directories and store .k5login files, which allows support of multiple users (each with one in their own home directory) with Kerberos services. Policies also exist for setting password lengths and ages, as well as for running script files or cron jobs.

      Bringing Macs into the Fold

      Bringing Macs into the Fold

      Administrators looking to bring Macs into the AD fold will find a plethora of options, policies and objects that rival AD’s native support for Windows PCs. Likewise allows AD to interact with a Mac’s MCX (Managed Client Settings), which means group policies can update MCX-extending AD security and controls directly into Mac OS X computers-without the need for software shims or OS hacks.

      Likewise Enterprise accomplishes that by integrating Workgroup Manager for Mac into AD and enabling MCX settings to be saved as standard AD Group Policy Objects without modifying existing AD schema. There are policies that can prevent automatic log-ons, control the firewall, secure system preferences and so on.

      I also found that Likewise Enterprise offers “green policies” for Mac OS X systems, allowing you to enforce sleep mode, automatically shut down systems and perform many other functions related to power savings. Larger enterprises using a number of Macs will find that employing energy-saving policies can lower electric costs noticeably.

      Network managers should appreciate the Mac server administration tool, which I found to be a real timesaver. I used it to remotely manage users, groups and computer settings on Macs, all without having to physically touch the systems. Enhanced support for Mac clients removes many of the barriers that have prevented Macs from joining a Windows network. Not only does Likewise Enterprise solve authentication and management issues, but compliance considerations as well. Compliance requirements are usually one of the reasons Macs are excluded from a network. Auditors complain that there is no way to fully audit and report on the compliance status of networked Macs. With Likewise Enterprise, that complaint is no longer valid: The product includes compliance reports that will provide the critical information auditors need to determine the level of compliance. Reports are available to meet the needs of Sarbanes-Oxley Act, HIPPA and PCI requirements. Those reports include Macs, Linux systems and pretty much anything Likewise manages.

      Likewise Enterprise offers hundreds of policies for Mac, Linux and Unix systems that can be combined to deliver complete policy control, even in the largest of enterprises.

      The reports can be used to validate policies in effect, track machines connected and gather information from system logs. They can be generated as Excel spreadsheets or in PDF format. Dozens of reports are included, and since each is customizable, administrators can create any report they need. I found that the inventory reports offered very useful information during the deployment process, as I was able to quickly determine if new systems were properly added to the domain and were able to successfully log in. In addition, a group policy security report helps identify whether the proper security policies have been applied to member systems.

      Frank Ohlhorst is a journalist, IT business consultant and speaker with more than 25 years of experience in the technology arenas.

      eweekdev
      eweekdev
      https://www.eweek.com

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.