Home Management Identity Management Improvements in Red Hat Enterprise Linux 7.3: Part 1

Identity Management Improvements in Red Hat Enterprise Linux 7.3: Part 1

0
Identity Management Improvements in Red Hat Enterprise Linux 7.3: Part 1
0

Red Hat Enterprise Linux (RHEL) 7.3 has been out for a bit, but have you looked at what we’ve added in the Identity Management area for this release? I’m excited to say, we’ve added quite a bit!

In the past I have been talking about individual features in Identity Management (IdM) and System Security Services Daemon (SSSD) but this is really not how we prioritize our efforts nowadays. We look at customer requests, community efforts, and market trends and then define themes for the release. So what were these themes for RHEL 7.3?

Performance
As our identity management solution matures customers start to deploy it in more sophisticated environments with more than fifty thousands systems or users, complex deeply nested group structure, advanced access control and sudo rules. In such environments, IdM and SSSD were not always meeting performance and scalability expectations. We wanted to correct that. Several efforts in different areas have been launched to make the solution work better for such complex deployments. In our test environment on a reference VM with 4GB of RAM and 8 cores we managed to improve:

  • User and group operations with complex group structure – about 3 times faster
  • Kerberos authentication – about 100 times faster
  • Bulk user provisioning – about 20 times faster (relies on disabling memberOf plugin and rebuilding group membership after the bulk operation)

Read the entire article here, Identity Management Improvements in Red Hat Enterprise Linux 7.3: Part 1

via the fine folks at Red Hat.

Featured Resources:

Related Articles:

Red Hat Red Hat is at the forefront of open source software development for enterprise IT, with a broad portfolio of products and services for commercial markets. Learn more by watching videos from our customers, partners, and solution experts.

Leave a Reply

| LATEST RESOURCES

White Papers

    Gartner: My “How to Hunt for Security Threats” Paper Published

    My mini-paper on threat hunting is out!Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security are starting to explore the mysterious practice of “threat hunting” to improve their security monitoring and operations. This requires uniquely skilled personnel and wide-ranging data collection […]

    Downloads

      Base Image Script Framework (BIS-F) – Version 6.0.0

      The perfect way to seal your Base Image Every time you build you’re base Image from scratch or update it, you must seal it before deploying it to your cloned devices. No matter if you are using Citrix XenApp/XenDesktop with Machine Creation Services (MCS) or Provisioning Services (PVS), VMware View or Microsoft only, BIS-F supports […]

      On-Demand Webinars

        Latest Videos

          Optimizing IT performance in the era of modern hybrid networks – On-Demand Webinar

          Hybrid networks, the answer to the cloud debate, are the network infrastructures of the future. Organizations facing challenges while migrating to these are looking for solutions. ManageEngine offers solutions for both traditional on-premises as well as public and private cloud-based services. Monitor and manage your modern hybrid network with ManageEngine’s OpManager and Site24x7. Learn more […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close
          Do NOT follow this link or you will be banned from the site!