In part 1 and part 2 of this series, configuration of the Centrify LDAP Proxy and agentless integration of a system into a Centrified environment has been detailed, respectively.


In this final part of the series, securing the environment is detailed, as well as a write-up on what the advantages are of integrating legacy systems using the agentless approach using LDAP.


Showing results for 
Search instead for 
Do you mean 

Community Control Panel