Phone Number +1-202-802-9399 (US)

User Management for Unix/Linux

Identity bridge

Utilize your existing directory service to manage identities across the enterprise regardless of platform and operating system.

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.

Secure and manage Unix and Linux local accounts with centralized authentication and authorization

Thycotic Identity Bridge removes the need for local accounts and allows the use of a single account in a centralized directory for simplified authentication and authorization. This helps streamline identity security, harden the attack surface, and simplify administration of access control.

Users have only one username and password to remember. IT administrators no longer have to manage users on Unix/Linux servers and workstations. They don’t have to create multiple accounts, manage those accounts in multiple locations, or have a headache when de-provisioning needs to happen. Effectively, Identity Bridge provides a single point of control for all users and groups.

<< Watch the Video

See how Thycotic Identity Bridge makes it easy to:

  • Join Unix/Linux to Active Directory: Use existing directory service with non-Windows hosts
  • Enable Kerberos Authentication: Verify user identities and session integrity
  • Consolidate User and Group Data: Store Unix/Linux user and group data directly in AD
  • Centralize Access Control: Use Active Directory Groups to manage user access
  • Simplify User Experience: Streamline user access with a single username and password across all log-ins
  • Provide Single Sign-On: Use Microsoft Kerberos or passwordless authentication.

How will Identity Bridge save you time?

Unix and Linux admins often end up duplicating efforts and spending many hours on user management in directories separate from Active Directory. Audits are painful due to differing password policies for Unix and Linux systems. Access control is overly complicated due to decentralized account management.

Thycotic Identity Bridge provides centralized authentication and authorization for Unix and Linux systems. It utilizes the organization’s existing directory service, such as Active Directory, to achieve consistency in identities across the enterprise regardless of platform and operating system. This streamlines identity management as admins have a single place to manage users, groups, and the systems they have access to.

Windows Privileged Account Discovery Tool Graphic

Have you inventoried your Unix accounts?

Download the FREE Unix Privileged Account Discovery Tool

Reducing Risk by Reducing Identities

Reducing Risk by Reducing Identities

Identity sprawl is frustrating and risky problem for growing organizations with diverse IT systems.

By pruning and consolidating user identities, you can manage privileges and passwords to tighten your attack surface.

Get the guide for a five-step plan to curb identity sprawl, save management time, and reduce cyber risk.

Join the webinar

Reducing Risk and Admin Overhead: Consolidate Unix/Linux Identities

Unix/Linux accounts often don’t receive the same security oversight as Windows systems, exposing high-value targets.

Tune in to see how Identity Bridge can help you streamline authentication and authorization to ensure consistent privilege security.


Paul Harper, Thycotic

Paul Harper

Director of Project Management

Erin Duncan, Thycotic

Erin Duncan

Product Marketing Manager

Compare Thycotic Identity Bridge

Identity Bridge simplifies user access, reduces IT costs and workload, and helps ensure compliance and security. 

Faster time to value

Flexible user provisioning and a combined agent for identity and privilege help you deploy and drive adoption quickly.

No schema changes

There’s no need for schema changes to Active Directory and no requirement to use Group Policy. Utilize native management tools (Active Directory Users and Computers).


Budget-friendly solution without sacrificing features or functionality.