Resources Library

The following white papers, datasheets, online webinars, chalktalk and product demos provide easy-to-grasp overviews of Centrify solutions' features and architecture.


Centrify User Suite

Configuring Mac OS X Workstations Using Windows Group Policy


If you're looking for tools to enforce the same types of configuration and security settings on Macs that are already available for Windows systems, watch this video chalktalk to discover how Centrify addresses this need by extending Windows Group Policy services to Mac OS X systems.

Running Time: 29 minutes
Configuring Mac OS X Workstations Using Windows Group Policy

Smart Card for Mac Part 1: Introduction to Active Directory Integration


In Windows-centric environments where Mac users need to be authenticated against Active Directory, setting up smart cards has involved some compromises in usability and security. In this Centrify video chalktalk you'll learn the basics of smart card authentication via Active Directory and how Centrify DirectControl for Mac OS X addresses these challenges.

Running Time: 21 minutes
Smart Card for Mac Part 1: Introduction to Active Directory Integration

Smart Card for Mac Part 2: Architecture & Authentication Flow


Apple provides a basic smart card infrastructure that Centrify has leveraged to provide stronger, Active Directory-based authentication and transparent single sign-on to applications. In this chalktalk, Centrify CTO Paul Moore proves an overview of the Apple smart card architecture and details how Centrify DirectControl integrates it with Active Directory's authentication services.

Running Time: 31 minutes
Smart Card for Mac Part 2: Architecture & Authentication Flow

Integrating Mac OS with Active Directory


Describes Centrify's industry-leading Active Directory integration for Mac OS X, including its unique Group Policy support.

Running Time: 26 minutes
Integrating Mac OS with Active Directory

Introducing Centrify Express


Centrify Express is Centrify's free solution for Active Directory-based authentication and single sign-on to cross-platform systems. This chalktalk introduces the basic components of the Express suite, their features, and what makes them unique among other Active Directory integration solutions.

Running Time: 17:03 minutes
Introducing Centrify Express

Centrify Server Suite

Centrify DirectAuthorize for Windows Part 1: Windows Security and Privilege Management


Rich Loose and Brad Zehring open this five-part technical deep-dive into Centrify DirectAuthorize for Windows. In preparation for later topics, Rich begins with an exploration of some of the key architectural components of Windows security and demonstrates a Microsoft utility for examining privileges of running processes.

Running Time: 12 minutes
Centrify DirectAuthorize for Windows Part 1: Windows Security and Privilege Management

Centrify DirectAuthorize for Windows Part 2: Seamless, Audited Privilege Elevation


Rich Loose and Brad Zehring discuss what Windows privilege elevation means, how Windows enforces different levels of access for different users based on their privileges, and how Centrify elevates a user’s privilege for specific applications, network resources, and privileged desktops. Rich explains Windows User Access Control (UAC) and how it works with privilege elevation and administrator accounts.

Running Time: 22 minutes
Centrify DirectAuthorize for Windows Part 2:	Seamless, Audited Privilege Elevation

Centrify DirectAuthorize for Windows Part 3: DirectAuthorize Architecture


Rich Loose lays out the overall architecture of DirectAuthorize, how it connects to the Windows Local Security Authority, and how it works with Windows to enable granular user privileges for applications, network resources, and desktops.

Running Time: 9 minutes
Centrify DirectAuthorize for Windows Part 3:	DirectAuthorize Architecture

Centrify DirectAuthorize for Windows Part 4: Windows Sessions, Desktops, and Diagnostics


Rich Loose explains the relationship between Windows sessions, user desktops and DirectAuthorize, and demonstrates utility and diagnostic tools for examining the underlying properties of user identity, privileges, and running processes.

Running Time: 18 minutes
Centrify DirectAuthorize for Windows Part 4:	Windows Sessions, Desktops, and Diagnostics

Centrify DirectAuthorize for Windows Part 5: The Privileged Desktop


Rich Loose and Brad Zehring discuss the functionality and underlying architecture of the privileged desktop, a feature that elevates privilege for all operations across an entire desktop and (along with DirectAudit) audits the user's activity.

Running Time: 12 minutes
Centrify DirectAuthorize for Windows Part 5:	The Privileged Desktop

Centrify DirectAuthorize for Windows Part 6: Network Access Rights


Rich Loose and Brad Zehring discuss privileged account management over remote connections, a unique ability of Centrify DirectAuthorize for Windows. Rich explains the architecture of Windows authentication over remote connections, logon IDs, the credential cache, and remote privilege elevation, finishing with a demonstration of privilege elevation using a DirectAuthorize network access right.

Running Time: 56 minutes
Centrify DirectAuthorize for Windows Part 6: Network Access Rights

Securing a Cloud Computing Architecture


This chalktalk begins by demystifying the terminology around cloud computing architectures and examines the types of enterprise projects that are most commmonly being deployed to the cloud. You'll then learn the advantages of a unique solution that leverages identity information and policy information inside your enterprise Active Directory to automate security and management of Linux-based cloud servers.

Running Time: 25 minutes
Securing a Cloud Computing Architecture

Introducing Centrify DirectSecure Part 1: Server Isolation and Protection


Learn how to securely isolate key servers and data as well as optionally encrypting data in motion via Centrify DirectSecure.

Running Time: 22 minutes
Introducing Centrify DirectSecure Part 1: Server Isolation and Protection

Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory


Learn how leverage IPsec in an Active Directory environment to secure your UNIX and Linux systems.

Running Time: 49 minutes
Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory

Introducing Centrify DirectSecure Part 3: Leveraging the Racoon Internet Key Exchange (IKE) Daemon


Learn how how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks.

Running Time: 40 minutes
Introducing Centrify DirectSecure Part 3: Leveraging the Racoon Internet Key Exchange (IKE) Daemon

Centralized Management of UNIX, Linux and Mac


Learn how to manage your UNIX, Linux, Mac and Active Directory environments using Centrify's collection of powerful tools featuring automation of software deployment, machine configuration, software inventory and management, account migration, and user zone provisioning.

Running Time: 10 minutes
Centralized Management of UNIX, Linux and Mac

UNIX and Linux Access Controls Leveraging Active Directory Groups


Centrify Product Manager David McNeely shows how the DirectManage Zone Provisioning Agent allows you to set up Active Directory groups that correspond to the access rights you want users to have on Centrify Zones of UNIX, Linux and Mac systems.

Running Time: 11 minutes
UNIX and Linux Access Controls Leveraging Active Directory Groups

Securing Linux Systems Running on IBM System z with Active Directory


Learn how IBM implements virtualization of Linux systems on System z processors. Includes a discussion of the unique challenges of securing the guest environments, and the benefits of centrally securing and managing them by leveraging your existing Microsoft Active Directory infrastructure.

Running Time: 25 minutes
Securing Linux Systems Running on IBM System z with Active Directory

Securing Solaris Zones with Active Directory


Learn how Oracle's Solaris operating system implements virtualization via its container and zone technology. Includes a discussion of the unique challenges of securing the host and guest environments, and the benefits of centrally securing and managing them by leveraging your existing Microsoft Active Directory infrastructure.

Running Time: 19 minutes
Securing Solaris Zones with Active Directory

Securing VMware ESX with Active Directory


Covers best practices for securing VMware ESX host systems by locking down administrative access and controlling administrator privileges. Also describes how the Centrify Suite combined with Microsoft Active Directory can be used to segregate guest systems and delegate administrative duties for the various business owners.

Running Time: 21 minutes
Securing VMware ESX with Active Directory

Single Sign-On for SAP on UNIX and Linux Using Microsoft Active Directory


Discusses the many technical and business challenges around delivering single sign-on for Windows-based end-users accessing SAP hosted on UNIX or Linux, and demonstrates how leveraging Microsoft Active Directory represents a cost-effective and easy-to-deploy solution.

Running Time: 40 minutes
Single Sign-On for SAP on UNIX and Linux Using Microsoft Active Directory

Managing UNIX Service Accounts Using Active Directory


Provides an overview of the generically named service accounts traditionally used on UNIX and Linux systems and describes Centrify's Active Directory-centric approach to locking down these accounts while applying role-based privilege management that is more secure, more granular and easier to manage than current alternatives.

Running Time: 15 minutes
Managing UNIX Service Accounts Using Active Directory

Implementing Centralized Identity Management for UNIX/Linux with DirectControl Zones


Discusses Centrify's best practices for analyzing UNIX/Linux systems, accounts, groups and business requirements and how Centrify's Zone-based access controls and role-based privilege management for UNIX and Linux can be deployed quickly with a provisioning workflow that meets compliance auditor's requirements.

Running Time: 36 minutes
Implementing Centralized Identity Management for UNIX/Linux with DirectControl Zones

Introducing DirectAuthorize Part 1: Concepts & Features


Discusses the need for enforcing access controls and managing privileges on UNIX and Linux systems and describes how Centrify DirectAuthorize's next-generation technology addresses those needs with an easy-to-use solution that leverages Microsoft Active Directory identity information.

Running Time: 36 minutes
Introducing DirectAuthorize Part 1: Concepts & Features

Introducing DirectAuthorize Part 2: Architecture & Advanced Features


Describes how DirectAuthorize leverages Active Directory identity information and enforces privilege grants on UNIX and Linux systems. It also describes advanced features such as DirectAuthorize's unique Restricted Environment capability.

Running Time: 35 minutes
Introducing DirectAuthorize Part 2: Architecture & Advanced Features

Managing Active Directory Groups with DirectControl


Describes how both UNIX and Active Directory groups work, and explains how DirectControl enables UNIX administrators to benefit from Active Directory's advanced group membership features.

Running Time: 20 minutes
Managing Active Directory Groups with DirectControl

Migrating UNIX Identities to Active Directory


Discusses the advantages of centralized account management, compares the various migration strategies (including UID rationalization), and explains the tools Centrify provides in each case.

Running Time: 26 minutes
Migrating UNIX Identities to Active Directory

DirectControl's Advanced Active Directory Integration for Samba


Explains Centrify's packaged and tested version of Samba, and how DirectControl provides centralized ID mapping through Active Directory.

Running Time: 34 minutes
DirectControl's Advanced Active Directory Integration for Samba

NIS Migration and Interoperability


Provides an overview of NIS and explains the benefits of using DirectControl's NIS service to manage UNIX identities centrally through Active Directory.

Running Time: 34 minutes
NIS Migration and Interoperability

Single Sign-On for Web Applications


Describes how DirectControl provides Active Directory-based single sign-on for web applications, including a discussion of how DirectControl supports Microsoft Active Directory Federation Service.

Running Time: 32 minutes
Single Sign-On for Web Applications

Group Policy for UNIX, Linux and Mac


Explains how DirectControl enables you to secure and manage non-Windows systems using Microsoft Active Directory Group Policy.

Running Time: 32 minutes
Group Policy for UNIX, Linux and Mac

Introducing Centrify Express


Centrify Express is Centrify's free solution for Active Directory-based authentication and single sign-on to cross-platform systems. This chalktalk introduces the basic components of the Express suite, their features, and what makes them unique among other Active Directory integration solutions.

Running Time: 17:03 minutes
Introducing Centrify Express

DirectControl's Architecture


Covers DirectControl's key components and describes how it sets up a Kerberos environment to authenticate UNIX, Linux and Mac users through Active Directory.

Running Time: 41 minutes
DirectControl's Architecture

How DirectControl Stores Data in Active Directory


Provides a detailed overview of the way in which UNIX management data can be stored in Active Directory, including an overview of the RFC 2307 schema and Microsoft Windows R2 implementation of it.

Running Time: 29 minutes
How DirectControl Stores Data in Active Directory

Centrify's Support for Open Source Tools


Details how Centrify has enhanced the Open Source tools OpenSSH, Kerberos Tools, PuTTY and Samba to work seamlessly with DirectControl-managed systems.

Running Time: 34 minutes
Centrify's Support for Open Source Tools