In part 1 and part 2 of this series, configuration of the Centrify LDAP Proxy and agentless integration of a system into a Centrified environment has been detailed, respectively.

 

In this final part of the series, securing the environment is detailed, as well as a write-up on what the advantages are of integrating legacy systems using the agentless approach using LDAP.

Read more...

Showing results for 
Search instead for 
Do you mean 
Labels
Leaderboard

Community Control Panel