Red Hat Services-Infrastructure Management

Red Hat Products & Services

Infrastrucure & Management

Red Hat® Enterprise Linux®

Red Hat® Enterprise Linux® provides core operating system functions and capabilities for application infrastructure.

On-ramp non-Linux users more quickly without the fear of the command line

Red Hat Enterprise Linux 8 lowers the barrier of entry to Linux for transitioning Windows administrators and Linux beginners with enhanced usability and familiar, intuitive deployment and management interfaces.

Highly secure platform for cloud infrastructures and emerging workloads like machine learning

Red Hat Enterprise Linux 8 lowers the barrier of adoption to new technologies like GPUs while minimizing the attack surface by only deploying the packages you need to support your workload.

A seamless, non-disruptive migration process for existing RHEL deployments

Red Hat Enterprise Linux 8 enhances the application migration process from earlier Red Hat Enterprise Linux 7 versions to Red Hat Enterprise Linux 8 so you can take advantage of the latest innovations.

Faster and more consistent delivery in any deployment footprint

Red Hat Enterprise Linux 8 features proactive, automated, and targeted resolution to ensure a secure, reliable, efficient and scalable infrastructure environment. Red Hat Insights is key here as well as new Red Hat Enterprise Linux 8 configuration and deployment features.

Fastest time to "Hello World"

Red Hat Enterprise Linux 8 comes with streamlined access to high-quality open source development tools. Red Hat Enterprise Linux 8 delivers more versions and more updates of supported, popular open source language frameworks and databases.

A leading partner for Oracle, SAP HANA, Microsoft SQL Server, PostgreSQL, and machine learning workloads

Red Hat Enterprise Linux 8 is optimized to support your critical database workloads as well as support leading ISV applications and workloads.

Ease the transition and power the adoption of containerized workloads

Red Hat Enterprise Linux 8 powers the entire Red Hat hybrid cloud portfolio, providing everything from low overhead tooling for development and deployment of containers within the OS to the CoreOS and RHEL based worker nodes in OpenShift deployments.

Red Hat® Virtualization®

Red Hat® Virtualization® is a complete open-source virtualization solution, derived from the Red Hat Enterprise Linux® kernel, Kernel-based Virtual Machine (KVM) technology, and oVirt virtualization management projects.

Modern operating system support

Built on Red Hat Enterprise Linux 8.2, Red Hat Virtualization is modernized to support cloud-native infrastructure for future business needs.

New metrics visibility using Grafana

Gain insight to inventory, performance, and capacity overviews and trends using Grafana with the data warehouse.

Integration with VMs in Red Hat OpenShift

Red Hat Virtualization integrates with OpenShift to move workloads to OpenShift Virtualization over time and maintain visibility of VMs running across both platforms from a single management plane.

Migrate your virtual machines to Red Hat

Determine migration effort and risk for modernizing VM workloads with Migration and Modernization Services and consolidate workloads where they work best for your business - on VMs or containers.

Red Hat® Identity Management

Identity Management in Red Hat Enterprise Linux® is designed and integrated into Red Hat Enterprise Linux to simplify identity management.

Red Hat Identity Management in Red Hat Enterprise Linux

Identity Management in Red Hat® Enterprise Linux® is designed and integrated into Red Hat Enterprise Linux to simplify identity management. This feature set is available free with your Red Hat Enterprise Linux subscription. Use it to expand how you use Linux while you reduce costs and administrative load. Increase your compliance levels by implementing identity and access management:

Central Authentication Management

Provides a centralized and clear method for managing:
-Identities for users, machines, and services within large Linux/Unix enterprise environments
-Security mechanisms

Fine-grained Access Control

Lets you define access control policies to govern user identities. The administrator can also delegate selected administrative tasks to other power users to create a clear and simple separation of responsibilities.

Integrated Public Key Infrastructure (PKI) Service

PKI services that sign and publish certificates for hosts and services
Certificate Revocation List (CRL) and OCSP services for software validating the published certificate
An API to request, show, and find certificates.

One Time Password (OTP)

Provides a popular method for achieving two-factor authentication (2FA). The OTP-based 2FA solution can either use natively managed tokens or leverage third-party 2FA solution by using RADIUS.

Active Directory Cross-Realm Trust

Lets administrators establish cross-forest Kerberos trusts with Microsoft Active Directory. This allows external Active Directory (AD) users convenient access to resources in the Identity Management domain.

Direct Connect to Active Directory

This feature is based on two :
-The first component retrieves information from Active Directory (AD)
-The second discovers information and then simplifies the configuration needed to join a domain or realm in a standard way.

Red Hat® Directory Server

Centralized Repository for Your Identity and User Information
Red Hat Directory Server is an LDAP-compliant server that centralizes user identity and application information. It provides an operating system-independent, network-based registry for storing application settings, user profiles, group data, policies, and access control information.

Deep Control

Gives you centralized, fine-grained access control, including control based on user identity, group membership, role identity, IP address, domain name, or pattern-based rules

Multiple Access Method

Allows access anonymously or via authentication methods, like user ID and password or X.509v3 public key certificates.

Data Protection

Restricts access to directory data with control down to the attribute value level

Policy replication

Stores access control list (ACL) information with each entry so that security policy is replicated with the data

Red Hat® Certificate System

Red Hat Certificate System provides a powerful security framework to manage user identities and ensure communication privacy. Handling the major functions of the identity life cycle, Red Hat Certificate System simplifies enterprise-wide deployment and adoption of a public key infrastructure (PKI).

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.