Learn how to manage your UNIX, Linux, Mac and Active Directory environments using Centrify's collection of powerful tools featuring automation of software deployment, machine configuration, software inventory and management, account migration, and user zone provisioning.

 

Running Time: 10 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Centrify Product Manager David McNeely shows how the DirectManage Zone Provisioning Agent allows you to set up Active Directory groups that correspond to the access rights you want users to have on Centrify Zones of UNIX, Linux and Mac systems. As you add or remove users in the Active Directory groups, the Zone Provisioning Agent automates the assignment of those users into Centrify Zones.

 

Running Time: 11 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Organizations both large and small face remarkably similar challenges as they begin to centralize identity management and access control for their UNIX and Linux environments. In this chalktalk you'll learn Centrify's best practices for analyzing UNIX/Linux systems, accounts, groups and business requirements and how Centrify's Zone-based access controls and privilege management for UNIX and Linux can be deployed quickly with a provisioning workflow that meets compliance auditor's requirements.

 

Running Time: 36 minutes

 

Speaker
Kayne McGladrey, Professional Services Senior Consultant

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • Common UNIX namespace management challenges faced by both large and small UNIX and Linux environments
  • Security and compliance risks associated with deprovisioning
  • How Centrify professional services tools such as ADcheck and Deployment Center accelerate up-front analysis
  • Translating business analysis of how systems are used into a flexible design for Zones and Active Directory groups
  • How Centrify DirectAuthorize's role-based approach can provide finer-grained control over access rights and privileges
  • Best practices for implementing fine-grained access controls in environments which already have a uniform UID namespace
  • Case study of a current customer's provisioning workflow and how it meets IT auditor's requirements
  • Centralized management of home directories using Zones
  • Reasons why flat UNIX namespaces may not be practical or manageable in some environments, and how Zones delivers structured management in those cases

 

Describes how DirectAuthorize leverages Active Directory identity information and enforces privilege grants on UNIX and Linux systems. It also describes advanced features such as DirectAuthorize's unique Restricted Environment capability.

 

Running Time: 35 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
Tom Kemp, Chief Executive Officer

 

Discusses the need for enforcing access controls and managing privileges on UNIX and Linux systems and describes how Centrify DirectAuthorize's next-generation technology addresses those needs with an easy-to-use solution that leverages Microsoft Active Directory identity information.

 

Running Time: 36 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
Tom Kemp, Chief Executive Officer

Showing results for 
Search instead for 
Do you mean 
Labels
Leaderboard

Community Control Panel