[How to] Manage access to Dropbox

By Centrify Advisor I ‎06-08-2017 03:18 PM

Ensure access to Dropbox and other Apps from managed devices only

Read more...

Centrify provides an account migration tool that simplifies the process of converting a local account's home directory into the Active Directory account. Migrating the account helps to save the user's files, application settings, and browser bookmarks.

Read more...

 

This video is a companion to the demonstration video on our public YouTube channel. It shows how to configure CSS and CPS to enable MFA during Windows privilege elevation. There is a short demonstration of the resulting configuration at the end.

Como acessar informações auditadas pelo Centrify DirectAudit

By Centrify Advisor I on ‎03-27-2016 09:41 PM - last edited ‎03-28-2016 02:44 PM

 Como acessar informações auditadas pelo Centrify DirectAudit: listas de eventos, vídeos das sessões, eventos de auditoria, exportar dados de sessão, criar buscas e queries

 

Read more...

Como gerenciar senhas de identidades privilegiadas com o Centrify Privilege Service

By Centrify Advisor I on ‎03-27-2016 09:32 PM - last edited ‎03-28-2016 02:47 PM

Como gerenciar senhas de identidades privilegiadas com o Centrify Privilege Service - armazenamento e rotação de senhas, check-out, check-in, acesso remoto, monitoração de sessões

 

Read more...

Como disponibilizar uma aplicação interna no portal Centrify - acesso web sem VPN

By Centrify Advisor I on ‎03-27-2016 09:19 PM - last edited ‎03-28-2016 02:30 PM

Como disponibilizar uma aplicação interna no portal Centrify - acesso web sem VPN ou expôr a aplicação na Internet

 

Read more...

 

OS X users should have seamless access to cloud and on-premise apps and authorized network resources. Companies are deploying an unprecedented number of Apple OS X computers within their on-premise and remote network environments. While users appreciate the ease of use and security of OS X, IT managers are finding a lack of native integration with their established corporate identity – typically Mac Active Directory. 

In this Chalk Talk, we will show you how the Centrify Identity platform can centrally manage user identities and permissions across Mac computers and SaaS applications.

[Video] Server Suite 2016 MFA - Part 1 : Introduction and Demo

By TA on ‎01-15-2016 05:07 PM - last edited ‎01-15-2016 05:11 PM

 

Part one of a multi-part series covering Centrify's newest feature: Multi-factor Authentication (MFA). This video will provide a brief introduction, as well as a demonstration of MFA in a secure user environment running the 2016 edition of Centrify's Identity Platform.

 

Part 6: Readying your Active Directory to work with Office 365 and the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

We detail the steps needed to prepare rich O365 clients such as Outlook and Skype for Business / Lync for use with Centrify for Office 365. We also provide the minimum requirements needed to allow AD users the ability to single-sign-on into their O365 environments using IWA (Integrated Windows Authentication).

 
 

Part 5: Readying your Active Directory to work with Office 365 and the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

We provide the best-practices for getting your Active Directory environment ready to allow AD users to seamlessly authenticate into their federated O365 accounts. We also detail the minimum requirements needed for successful user and group syncing when Centrify Provisioning is used.

Notes: 
A detailed walkthrough can also be found in the Knowledge Base of the Centrify Support Portal: 
- KB-5053: How to configure Office 365 and integrate with Centrify for automated user provisioning
- (https://www.centrify.com/support/knowledge/)

For a full list of attributes that are synced when Hybrid Mode is enabled, see also:
- KB-4901: List of AD attributes that are synced into Office 365 cloud with Centrify provisioning
- (https://www.centrify.com/support/knowledge/)
 
 

Part 4: Readying your Office 365 to work with the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

In this video, we provide a brief introduction to the Office 365 Admin Center, then a walk through the Office 365 tenant's domain and DNS registration steps. Finally, we show where and how to enable Directory Synchronization in Office 365 for integration with Active Directory.

 

Note: A detailed walkthrough can also be found in the Knowledge Base of the Centrify Support Portal:
- KB-5053: How to configure Office 365 and integrate with Centrify for automated user provisioning
- (https://www.centrify.com/support/knowledge/)

 

Part 3: The Different Account Types of Office 365

 

Contributors: @BLau@TonyC

 

Microsoft Office 365 offers a range of different account types to serve the wide array of domain environments that exist in the corporate world. This video will run through each type of account and their login flows, and then demonstrate how the Centrify for Office 365 application can be incorporated to provide a consistent user experience - no matter what type of O365 account is used in the environment.

 

Part 2: Components of the Centrify Identity Service

 

Contributors: @BLau@TonyC

 

In this short video we run through the three core components that make up the Centrify Identity Service; the Centrify User Portal, the Centrify Cloud Manager and the Centrify Cloud Connector. We show how each component fits into the infrastructure and what the user experience will be when interacting with these components for both Microsoft Office 365 as well as other SaaS applications.

 

Part 1: An Introduction to the Centrify Identity Service and Centrify for Office 365

 

Contributors: @BLau@TonyC

 

We provide a brief overview of both the Centrify Identity Service and Microsoft Office 365. A quick introduction of how the two can be integrated together to give the most comprehensive and convenient user management for O365 Administrators, while simultaneously presenting a seamless experience for end-users.

 

Cindy Ritchie and Kayne McGladrey from Centrify Professional Services discuss the regulatory challenges associated with NIS in a modern UNIX environment, and then discuss migrating away from legacy NIS to a secure, centralized Active Directory environment. This video also provides project guidance for our best practices in assisting customers with NIS migrations for over nine years.

 

Than Chariya and Kayne McGladrey from Centrify Professional Services discuss the challenges and benefits associated with centrally managing user privileges on UNIX and Linux. We also discuss the creation and management of Roles and Rights and migrating away from legacy technologies like sudo. Finally, we also discuss achieving regulatory compliance by auditing the use of privileged commands.

 

Ian Guthrie and Kayne McGladrey from Centrify Professional Services discuss the challenges of automatically provisioning UNIX home directories in a multi-platform network environment. We also discuss the use of the Zone Provisioning Agent and Group Policies for UNIX, and provide guidance on how to apply this design to other scenarios.

 

UNIX Fundamentals

By Community Manager Community Manager ‎03-27-2015 11:41 AM

By the end of this class, you will be able to successfully log into a UNIX computer, navigate the file system, and understand UNIX user and group management.

 

thumb_video_unixfundamentals.png

 

Active Directory Fundamentals

By Community Manager Community Manager ‎03-27-2015 11:38 AM

At the end of this class, you will know how Active Directory is organized, how Active Directory interacts with DNS, understand sites, and be able to use Active Directory Users and Computers.

 

AD Fundamentals

 

 

This chalktalk begins by demystifying the terminology around cloud computing architectures and examines the types of enterprise projects that are most commmonly being deployed to the cloud. You'll then learn the advantages of a unique solution that leverages identity information and policy information inside your enterprise Active Directory to automate security and management of Linux-based cloud servers. For additional reading, see our Cloud Security Step by Step guide.

 

Running Time: 25 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing & Business Development

 

Topics Covered

  • Demystifying the terminology around cloud computing architectures: intrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS)
  • The types of enterprise projects that are being deployed in the cloud
  • How to set up your internal and DMZ-based Active Directory forests to enable centralized management of Linux-based cloud servers
  • The role that IPsec and Centrify DirectSecure plays in securing Active Directory in the DMZ
  • The different ways in which cloud servers can be joined to Active Directory, including through the cloud-enabled Centrify DeploymentManager console and preloaded server templates
  • The need for auditing user activity to ensure that cloud systems are being accessed only by authorized users and how Centrify DirectAudit improves over traditional log analysis solutions
  • Leveraging the power of Active Directory for efficient centralized, group-based management of resources

Introducing Centrify Express

By Community Manager Community Manager ‎01-30-2015 04:48 PM

 

Centrify Express is Centrify's free solution for Active Directory-based authentication and single sign-on to cross-platform systems. This chalktalk introduces the Centrify Suite's basic components, their features, and what makes them unique among other Active Directory integration solutions.

 

Running Time: 17:03 minutes

 

Speaker
Corey Williams, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing & Business Development

 

Topics Covered

  • DirectControl Express and its ability to join non-Windows systems to Active Directory
  • DirectManage Express and its ability to automate the deployment of DirectControl Express throughout your network
  • How Centrify Express compares to operating system vendor plugins and other integration toolkits
  • How Centrify Express users can get peer support and other resources through the Centrify Community forums
  • How to choose between Centrify Express and other editions of the Centrify Suite

 

Part 3 of our series takes a deeper look at the architecture of Centrify DirectSecure, explaining how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks. For more background, see Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory

 

Running Time: 40 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • Enhancing Racoon for both Linux and Solaris platforms for enterprise-scale applications
  • How Racoon diverged from the Open SWAN, Free SWAN, and Strong SWAN IKE code bases
  • Using Coverity and Valgrind to bullet-proof open source code for enterprise use
  • How DirectSecure and IKE use certificate trust chains and CRLS

 

Centrify CTO Paul Moore and Director of Product Management David McNeely take us under the hood of Centrify DirectSecure, showing how it uses IPsec in an Active Directory environment to secure your UNIX and Linux systems. 

 

Running Time: 49 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • How Centrify's use of IPsec differs from traditional VPN-focused products
  • IPsec's ability to encrypt data in motion and protect communication between systems within a network
  • Using Active Directory Group Policy to customize IPsec across your network
  • The use of the Internet Key Exchange (IKE) daemon for peer-to-peer IPsec communication
  • Why IPsec can be more secure and easier to centrally manage than traditional firewalls
  • IPsec and ensuring trust of exchanged PKI certificates

 

Learn how to securely isolate key servers and data as well as optionally encrypting data in motion with Centrify DirectSecure. 

 

Running Time: 22 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Topics Covered

  • Limiting the scope of PCI and other audits by isolating audited systems
  • Protecting intellectual property by managing communications to trusted systems
  • Shortcomings of existing firewall and network segmentation approaches to protecting host systems

 

Learn how to manage your UNIX, Linux, Mac and Active Directory environments using Centrify's collection of powerful tools featuring automation of software deployment, machine configuration, software inventory and management, account migration, and user zone provisioning.

 

Running Time: 10 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

 

Centrify Product Manager David McNeely shows how the DirectManage Zone Provisioning Agent allows you to set up Active Directory groups that correspond to the access rights you want users to have on Centrify Zones of UNIX, Linux and Mac systems. As you add or remove users in the Active Directory groups, the Zone Provisioning Agent automates the assignment of those users into Centrify Zones.

 

Running Time: 11 minutes

 

Speaker
David McNeely, Director, Product Management

 

Moderator
Frank Cabri, Vice President, Marketing

Showing results for 
Search instead for 
Do you mean 
Labels

Community Control Panel