We use cookies to make your experience better.
To comply with the new e-Privacy directive, you agree to the privacy policy and our use of cookies.
Red Hat Directory Server 1 year(s)
SKU
MCT0826
Special Price
$4,699.92
Regular Price
$7,553.45
Out of stock
Directory Server (Replica), 1 Year
Category: Warranty & Support Extensions
SKU | MCT0826 |
---|---|
EAN | 0728663108955 |
Manufacturer | RED HAT |
Availability | Out of Stock |
Easily manage access across partner, supplier, and customer relationships
Managing user access to multiple systems is a challenge. In a UNIX environment, providing access based on locally stored information becomes unmanageable as the number of systems and users increases. Storing the user information in a Lightweight Directory Access Protocol (LDAP)-based directory—like Red Hat® Directory Server—makes the system scalable, manageable, and secure.
Deep control
Gives you centralized, fine-grained access control, including control based on user identity, group membership, role identity, IP address, domain name, or pattern-based rules.
Data protection
Restricts access to directory data with control down to the attribute value level.
Multiple access methods
Allows access anonymously or via authentication methods, like user ID and password or X.509v3 public key certificates.
Policy replication
Stores access control list (ACL) information with each entry so that security policy is replicated with the data.
Certificate-based authentication
Provides the foundation for strong certificate-based authentication when used in conjunction with Red Hat Certificate System.
Managing user access to multiple systems is a challenge. In a UNIX environment, providing access based on locally stored information becomes unmanageable as the number of systems and users increases. Storing the user information in a Lightweight Directory Access Protocol (LDAP)-based directory—like Red Hat® Directory Server—makes the system scalable, manageable, and secure.
Deep control
Gives you centralized, fine-grained access control, including control based on user identity, group membership, role identity, IP address, domain name, or pattern-based rules.
Data protection
Restricts access to directory data with control down to the attribute value level.
Multiple access methods
Allows access anonymously or via authentication methods, like user ID and password or X.509v3 public key certificates.
Policy replication
Stores access control list (ACL) information with each entry so that security policy is replicated with the data.
Certificate-based authentication
Provides the foundation for strong certificate-based authentication when used in conjunction with Red Hat Certificate System.
Features | |
---|---|
Number of years | 1 year(s) |