This video is a companion to the demonstration video on our public YouTube channel. It shows how to configure CSS and CPS to enable MFA during Windows privilege elevation. There is a short demonstration of the resulting configuration at the end.

Como acessar informações auditadas pelo Centrify DirectAudit

By Centrify Contributor III on ‎03-27-2016 09:41 PM - last edited ‎03-28-2016 02:44 PM

 Como acessar informações auditadas pelo Centrify DirectAudit: listas de eventos, vídeos das sessões, eventos de auditoria, exportar dados de sessão, criar buscas e queries

 

Read more...

Como gerenciar senhas de identidades privilegiadas com o Centrify Privilege Service

By Centrify Contributor III on ‎03-27-2016 09:32 PM - last edited ‎03-28-2016 02:47 PM

Como gerenciar senhas de identidades privilegiadas com o Centrify Privilege Service - armazenamento e rotação de senhas, check-out, check-in, acesso remoto, monitoração de sessões

 

Read more...

Como disponibilizar uma aplicação interna no portal Centrify - acesso web sem VPN

By Centrify Contributor III on ‎03-27-2016 09:19 PM - last edited ‎03-28-2016 02:30 PM

Como disponibilizar uma aplicação interna no portal Centrify - acesso web sem VPN ou expôr a aplicação na Internet

 

Read more...

 

OS X users should have seamless access to cloud and on-premise apps and authorized network resources. Companies are deploying an unprecedented number of Apple OS X computers within their on-premise and remote network environments. While users appreciate the ease of use and security of OS X, IT managers are finding a lack of native integration with their established corporate identity – typically Mac Active Directory. 

In this Chalk Talk, we will show you how the Centrify Identity platform can centrally manage user identities and permissions across Mac computers and SaaS applications.

[Video] Server Suite 2016 MFA - Part 1 : Introduction and Demo

By TA on ‎01-15-2016 05:07 PM - last edited ‎01-15-2016 05:11 PM

 

Part one of a multi-part series covering Centrify's newest feature: Multi-factor Authentication (MFA). This video will provide a brief introduction, as well as a demonstration of MFA in a secure user environment running the 2016 edition of Centrify's Identity Platform.

 

Part 6: Readying your Active Directory to work with Office 365 and the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

We detail the steps needed to prepare rich O365 clients such as Outlook and Skype for Business / Lync for use with Centrify for Office 365. We also provide the minimum requirements needed to allow AD users the ability to single-sign-on into their O365 environments using IWA (Integrated Windows Authentication).

 
 

Part 5: Readying your Active Directory to work with Office 365 and the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

We provide the best-practices for getting your Active Directory environment ready to allow AD users to seamlessly authenticate into their federated O365 accounts. We also detail the minimum requirements needed for successful user and group syncing when Centrify Provisioning is used.

Notes: 
A detailed walkthrough can also be found in the Knowledge Base of the Centrify Support Portal: 
- KB-5053: How to configure Office 365 and integrate with Centrify for automated user provisioning
- (https://www.centrify.com/support/knowledge/)

For a full list of attributes that are synced when Hybrid Mode is enabled, see also:
- KB-4901: List of AD attributes that are synced into Office 365 cloud with Centrify provisioning
- (https://www.centrify.com/support/knowledge/)
 
 

Part 4: Readying your Office 365 to work with the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

In this video, we provide a brief introduction to the Office 365 Admin Center, then a walk through the Office 365 tenant's domain and DNS registration steps. Finally, we show where and how to enable Directory Synchronization in Office 365 for integration with Active Directory.

 

Note: A detailed walkthrough can also be found in the Knowledge Base of the Centrify Support Portal:
- KB-5053: How to configure Office 365 and integrate with Centrify for automated user provisioning
- (https://www.centrify.com/support/knowledge/)

 

Part 3: The Different Account Types of Office 365

 

Contributors: @BLau@TonyC

 

Microsoft Office 365 offers a range of different account types to serve the wide array of domain environments that exist in the corporate world. This video will run through each type of account and their login flows, and then demonstrate how the Centrify for Office 365 application can be incorporated to provide a consistent user experience - no matter what type of O365 account is used in the environment.

 

Part 2: Components of the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

In this short video we run through the three core components that make up the Centrify Identity Service; the Centrify User Portal, the Centrify Cloud Manager and the Centrify Cloud Connector. We show how each component fits into the infrastructure and what the user experience will be when interacting with these components for both Microsoft Office 365 as well as other SaaS applications.

 

Part 1: An Introduction to the Centrify Identity Service and Centrify for Office 365

 

Contributors: @BLau@TonyC

 

We provide a brief overview of both the Centrify Identity Service and Microsoft Office 365. A quick introduction of how the two can be integrated together to give the most comprehensive and convenient user management for O365 Administrators, while simultaneously presenting a seamless experience for end-users.

 

Cindy Ritchie and Kayne McGladrey from Centrify Professional Services discuss the regulatory challenges associated with NIS in a modern UNIX environment, and then discuss migrating away from legacy NIS to a secure, centralized Active Directory environment. This video also provides project guidance for our best practices in assisting customers with NIS migrations for over nine years.

 

Than Chariya and Kayne McGladrey from Centrify Professional Services discuss the challenges and benefits associated with centrally managing user privileges on UNIX and Linux. We also discuss the creation and management of Roles and Rights and migrating away from legacy technologies like sudo. Finally, we also discuss achieving regulatory compliance by auditing the use of privileged commands.

 

Ian Guthrie and Kayne McGladrey from Centrify Professional Services discuss the challenges of automatically provisioning UNIX home directories in a multi-platform network environment. We also discuss the use of the Zone Provisioning Agent and Group Policies for UNIX, and provide guidance on how to apply this design to other scenarios.

 

UNIX Fundamentals

By Community Manager Community Manager ‎03-27-2015 11:41 AM

By the end of this class, you will be able to successfully log into a UNIX computer, navigate the file system, and understand UNIX user and group management.

 

 

Active Directory Fundamentals

By Community Manager Community Manager ‎03-27-2015 11:38 AM

At the end of this class, you will know how Active Directory is organized, how Active Directory interacts with DNS, understand sites, and be able to use Active Directory Users and Computers.

 

 

 

This chalktalk begins by demystifying the terminology around cloud computing architectures and examines the types of enterprise projects that are most commmonly being deployed to the cloud. You'll then learn the advantages of a unique solution that leverages identity information and policy information inside your enterprise Active Directory to automate security and management of Linux-based cloud servers. For additional reading, see our Cloud Security Step by Step guide.

 

Running Time: 25 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing & Business Development

 

Topics Covered

  • Demystifying the terminology around cloud computing architectures: intrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS)
  • The types of enterprise projects that are being deployed in the cloud
  • How to set up your internal and DMZ-based Active Directory forests to enable centralized management of Linux-based cloud servers
  • The role that IPsec and Centrify DirectSecure plays in securing Active Directory in the DMZ
  • The different ways in which cloud servers can be joined to Active Directory, including through the cloud-enabled Centrify DeploymentManager console and preloaded server templates
  • The need for auditing user activity to ensure that cloud systems are being accessed only by authorized users and how Centrify DirectAudit improves over traditional log analysis solutions
  • Leveraging the power of Active Directory for efficient centralized, group-based management of resources

Introducing Centrify Express

By Community Manager Community Manager ‎01-30-2015 04:48 PM

 

Centrify Express is Centrify's free solution for Active Directory-based authentication and single sign-on to cross-platform systems. This chalktalk introduces the Centrify Suite's basic components, their features, and what makes them unique among other Active Directory integration solutions.

 

Running Time: 17:03 minutes

 

Speaker
Corey Williams, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing & Business Development

 

Topics Covered

  • DirectControl Express and its ability to join non-Windows systems to Active Directory
  • DirectManage Express and its ability to automate the deployment of DirectControl Express throughout your network
  • How Centrify Express compares to operating system vendor plugins and other integration toolkits
  • How Centrify Express users can get peer support and other resources through the Centrify Community forums
  • How to choose between Centrify Express and other editions of the Centrify Suite

 

Part 3 of our series takes a deeper look at the architecture of Centrify DirectSecure, explaining how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks. For more background, see Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory

 

Running Time: 40 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • Enhancing Racoon for both Linux and Solaris platforms for enterprise-scale applications
  • How Racoon diverged from the Open SWAN, Free SWAN, and Strong SWAN IKE code bases
  • Using Coverity and Valgrind to bullet-proof open source code for enterprise use
  • How DirectSecure and IKE use certificate trust chains and CRLS

 

Centrify CTO Paul Moore and Director of Product Management David McNeely take us under the hood of Centrify DirectSecure, showing how it uses IPsec in an Active Directory environment to secure your UNIX and Linux systems. 

 

Running Time: 49 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • How Centrify's use of IPsec differs from traditional VPN-focused products
  • IPsec's ability to encrypt data in motion and protect communication between systems within a network
  • Using Active Directory Group Policy to customize IPsec across your network
  • The use of the Internet Key Exchange (IKE) daemon for peer-to-peer IPsec communication
  • Why IPsec can be more secure and easier to centrally manage than traditional firewalls
  • IPsec and ensuring trust of exchanged PKI certificates

 

Learn how to securely isolate key servers and data as well as optionally encrypting data in motion with Centrify DirectSecure. 

 

Running Time: 22 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Topics Covered

  • Limiting the scope of PCI and other audits by isolating audited systems
  • Protecting intellectual property by managing communications to trusted systems
  • Shortcomings of existing firewall and network segmentation approaches to protecting host systems

 

Learn how to manage your UNIX, Linux, Mac and Active Directory environments using Centrify's collection of powerful tools featuring automation of software deployment, machine configuration, software inventory and management, account migration, and user zone provisioning.

 

Running Time: 10 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Centrify Product Manager David McNeely shows how the DirectManage Zone Provisioning Agent allows you to set up Active Directory groups that correspond to the access rights you want users to have on Centrify Zones of UNIX, Linux and Mac systems. As you add or remove users in the Active Directory groups, the Zone Provisioning Agent automates the assignment of those users into Centrify Zones.

 

Running Time: 11 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

IBM System z mainframes enable organizations to run hundreds or even thousands of virtualized Linux systems. But organizations are finding that, to achieve maximum costs savings, they also need a cost-effective way to centrally secure and configure these virtual systems, which are frequently used to host business-critical applications. In this chalktalk you'll learn how IBM has implemented Linux virtualization on System z and how Centrify addresses these unique security and configuration issues.

 

Running Time: 25 minutes

 

Speaker
Corey Williams, Director, Product Management

 

Moderator
Frank Cabri, VP, Marketing

 

Topics Covered

  • An overview of the IBM System z platform, including a discussion of how its s390-based Integrated Facility for Linux (IFL) is used with the z/VM hypervisor to host hundreds or even thousands of guest systems running SUSE Enterprise Linux or Red Hat Enterprise Linux
  • The move to Linux on System z and how the ease of spinning up new Linux workloads leads to a proliferation of systems
  • The corresponding security challenges that arise in situations where each of the many virtual systems, based on the application it is running, has different needs in terms of who should be able to access it and what they can do
  • The advantages of leveraging Active Directory's existing repository of enterprise identities to centrally manage administrative access rights and privileges versus individually managing each virtual guest
  • The advantages of the Centrify solution, which enables IT managers to use familiar Windows-based tools and processes to manage a wide variety of UNIX, Linux and Mac systems without needing detailed domain knowledge of each system
  • How Centrify Zones can be used to logically group guest systems so each can have a distinct set of users, administators and policies
  • How the Centrify Suite gives you a global view of the access controls and user audit logs that encompasses not only Linux systems on System z but other virtual or physical UNIX, Linux and Mac systems as well
  • Compliance-driven reasons for using Centrify's solution for detailed logging of user activity on UNIX and Linux for monitoring and reporting
  • Using the Windows Group Policy for UNIX and Linux feature with Centrify to apply centrally define and distribute consistent configuration and security policies across heterogeneous systems
  • Using the Centrify Suite's built-in role-based privilege management solution for UNIX and Linux to control what users can do on each system
  • How a large financial institution was able to expand their computing capability while reducing overhead by adopting System z-based virtualization coupled with centralized management using the Centrify Suite.

 

Hardware-level virtualization has unique benefits and continues to be popular even as software-based virtualization solutions such as VMware ESX gain in popularity. In this chalktalk you'll learn how Oracle's Solaris operating system implements virtualization via its container and zone technology. It includes a discussion of the unique challenges of securing the host and guest environments, and the benefits of centrally securing and managing them by leveraging your existing Microsoft Active Directory.

 

Running Time: 19 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator

Frank Cabri, VP, Marketing

 

Topics Covered

  • An overview of how operating system vendors such as HP, IBM and Oracle have approached virtualization
  • The benefits of hardware-level virtualization
  • An overview of how Solaris containers support virtualization
  • Security best practices for securing the underlying operating system using Microsoft Active Directory identities
  • Methodology for using Centrify Zones to manage and secure the individual guest systems, which may be owned by separate departments or other groups within an organization
  • Comparing Solaris's native management tools with Active Directory-based security in a heterogeneous environment
  • How the Centrify Suite gives you a global view of the access controls and user audit logs that encompasses not only Solaris zones but other systems as well
  • The architecture of a Solaris system hosting multiple Solaris zones
  • How Centrify Zones can be used not only to isolate the host system from the guests but to also logically group guest systems so each can have a distinct set of users, administators and policies
  • Using Centrify DirectAuthorize to enable departmental admins to manage their own systems without giving them elevated privileges on the host or access to other guests

Showing results for 
Search instead for 
Do you mean 
Labels

Community Control Panel