Manage Your Mac with Active Directory Group Policies
|
|
- Ashley Howard
- 8 years ago
- Views:
Transcription
1 Manage Your Mac with Active Directory Group Policies How to secure Mac OS X systems with your Active Directory infrastructure
2 Manage your Mac with Active Directory Group Policies Contents Overview 3 Active Directory Policy List 4 Conclusion 16 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Centrify Corporation. Centrify may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Centrify, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Centrify, DirectControl and DirectAudit are registered trademarks and Centrify Suite, DirectAuthorize, DirectSecure and DirectManage are trademarks of Centrify Corporation in the United States and/or other countries. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. RightScale is a registered trademark of RightScale, Inc.; ServerTemplates and RightScripts are trademarks of RightScale, Inc. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Front cover photo: Stefano Tinti / Shutterstock.com CENTRIFY CORPORATION ALL RIGHTS RESERVED
3 Overview With Centrify Identity Service Mac Edition ( Centrify for Mac ), you can use Active Directory to centrally manage authentication, policy enforcement, single sign-on (SSO) and user self-service for popular endpoint devices running Mac OS X, ios and Android. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. The following Group Policies are a representative list of what is available to manage Mac OS X systems as of the Centrify for Mac product release that came out in February Active Directory-based Group Policy enforcement of centrally defined security policies enables IT to meet compliance requirements. Policies are enforced using a combination of approaches to update plist files and standard config files, to enforce MCX settings and even to create profiles for local enforcement. Additionally, the Centrify Identity Service can enforce several security policies and configure access to company resources through delivery of profiles to remote Mac OS X and mobile devices, empowering IT to embrace bring-your-own-device initiatives. Centrify provides a complete set of policy and configuration settings to enable Windows-centric admin staff to manage all aspects of the Mac as well as mobile devices leveraging the processes and skills of a familiar infrastructure, Group Policy CENTRIFY CORPORATION ALL RIGHTS RESERVED
4 Manage your Mac with Active Directory Group Policies Active Directory Policy List Mac On-Prem Policies Centrify Computer Policies 802.1x Settings Enable Machine Ethernet Profile Enable Machine Wi-Fi Profile Enable User Ethernet Profile Enable User Wi-Fi Profile Specify Login Window Profiles Specify System Profile Mac On-Prem Policies Centrify Computer Policies Accounts Map zone groups to local admin group Map zone groups to local group Set login window settings Mac On-Prem Policies Centrify Computer Policies App Store Settings Prohibit access to App Store Mac On-Prem Policies Centrify Computer Policies Custom Settings Enable profile custom settings Install MobileConfig Profiles Mac On-Prem Policies Centrify Computer Policies Energy Saver On AC Power Allow power button to sleep the computer Enable Power Nap while plugged into a power adapter Put the hard disk(s) to sleep when possible Restart automatically after a power failure Set computer sleep time Set display sleep time Wake for Ethernet network administrator access Wake when the modem detects a ring Mac On-Prem Policies Centrify Computer Policies Energy Saver On Battery Allow power button to sleep the computer Enable Power Nap while on battery power Put the hard disk(s) to sleep when possible Restart automatically after a power failure Set computer sleep time Set display sleep time Slightly dim the display while on battery power Wake for Ethernet network administrator access Wake when the modem detects a ring CENTRIFY CORPORATION ALL RIGHTS RESERVED
5 Mac On-Prem Policies Centrify Computer Policies Energy Saver Scheduled Events Set machine sleep/shutdown time Set machine startup time Mac On-Prem Policies Centrify Computer Policies Firewall Block UDP traffic Enable firewall Enable firewall logging Enable ichat Enable iphoto sharing Enable itunes music sharing Enable network time Enable stealth mode Mac On-Prem Policies Centrify Computer Policies Internet Sharing Disallow all Internet sharing Mac On-Prem Policies Centrify Computer Policies Network Adjust multicast DNS timeout for.local domain Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Adjust list of DNS servers Adjust list of searched domains Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) CENTRIFY CORPORATION ALL RIGHTS RESERVED
6 Manage your Mac with Active Directory Group Policies Mac On-Prem Policies Centrify Computer Policies Network Location 1 Adjust list of DNS servers Adjust list of searched domains Enable network location Mac On-Prem Policies Centrify Computer Policies Network Location 1 Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Location 1 Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) Mac On-Prem Policies Centrify Computer Policies Network Location 2 Adjust list of DNS servers Adjust list of searched domains Enable network location Mac On-Prem Policies Centrify Computer Policies Network Location 2 Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Location 2 Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) CENTRIFY CORPORATION ALL RIGHTS RESERVED
7 Mac On-Prem Policies Centrify Computer Policies Remote Management Enable administrator access group Mac On-Prem Policies Centrify Computer Policies Scripts (Login / Logout) Specify multiple login scripts Mac On-Prem Policies Centrify Computer Policies Security and Privacy Certificate validation method Disable automatic login Disable Location Services Enable Gatekeeper Enable smart card support Log out after number of minutes of inactivity Require password to unlock each secure system preference Require smart card login Use secure virtual memory Mac On-Prem Policies Centrify Computer Policies Security and Privacy FileVault 2 Disable automatic login Enable FileVault 2 Mac On-Prem Policies Centrify Computer Policies Security and Privacy Public Key Policies Do not allow private key to be extractable Store private and public key in Keychain only Mac On-Prem Policies Centrify Computer Policies Services Enable Apple Remote Desktop Enable FTP access Enable personal file sharing Enable personal Web sharing Enable printer sharing Enable remote Apple events Enable remote login Enable Windows sharing Enable Xgrid Mac On-Prem Policies Centrify Computer Policies Software Update Settings Automatically check for software updates Mac On-Prem Policies Centrify Computer Policies Software Update Settings SW update Server Settings Use version specific settings CENTRIFY CORPORATION ALL RIGHTS RESERVED
8 Manage your Mac with Active Directory Group Policies Mac OS X 10.5 Settings Specify software update server Mac OS X 10.6 Settings Specify software update server Mac OS X 10.7 Settings Specify software update server Mac OS X 10.8 Settings Specify software update server Mac OS X 10.9 Settings Specify software update server Mac OS X Settings Specify software update server Centrify Mac On-Prem Policies Centrify User Policies 802.1x Settings Specify User Profiles Centrify Mac On-Prem Policies Centrify User Policies Application Access Settings Permit/prohibit access to application list: AppleScript Permit/prohibit access to application list: Applications Permit/prohibit access to application list: Server Permit/prohibit access to application list: Utilities Permit/prohibit access to applications Permit/prohibit access to the user-specific applications Centrify Mac On-Prem Policies Centrify User Policies Automount Settings Automount network shares Automount user s Windows home Create alias instead of symbolic link (for agent and below) Centrify Mac On-Prem Policies Centrify User Policies Desktop Settings Set computer idle time for starting screen saver Centrify Mac On-Prem Policies Centrify User Policies Dock Settings Add other folders to Dock Adjust the Dock s icon size Adjust the Dock s magnified icon size Adjust the Dock s position on the screen Adjust the effect shown when minimizing the Dock Animate opening applications Automatically hide and show the Dock Lock the Dock Merge with user s Dock Place Applications in Dock Place Documents and Folders in Dock CENTRIFY CORPORATION ALL RIGHTS RESERVED WP-US EN
9 Centrify Mac On-Prem Policies Centrify User Policies Finder Settings Configure Finder commands Configure Finder preferences Configure Finder views Centrify Mac On-Prem Policies Centrify User Policies Folder Redirection Actions at Login time Delete path Delete symbolic link, and restore Delete, and create symbolic link Rename, and create symbolic link Centrify Mac On-Prem Policies Centrify User Policies Folder Redirection Actions at Logout time Delete path Delete symbolic link, and restore Delete, and create symbolic link Rename, and create symbolic link Centrify Mac On-Prem Policies Centrify User Policies Import Settings Import MCX setting plist files Import plist files Centrify Mac On-Prem Policies Centrify User Policies Login Settings Enable Login times Centrify Mac On-Prem Policies Centrify User Policies Media Access Settings Eject all removable media at logout Permit/prohibit access: CDs & CD-ROMs Permit/prohibit access: DVDs Permit/prohibit access: External Disks Permit/prohibit access: Internal Disks Permit/prohibit access: Recordable Discs Centrify Mac On-Prem Policies Centrify User Policies Custom Settings Install MobileConfig Profiles Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Use version specific settings Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Enable/disable synchronization CENTRIFY CORPORATION ALL RIGHTS RESERVED
10 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Background Sync Adjust list of items synchronized in the background Enable/disable background synchronization rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Background Sync Skip these items Skip items that end with Skip items that start with Skip items whose full path is Skip items whose name contains Skip items whose name is Skip items whose partial path matches Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Login & Logout Sync Adjust list of items synchronized at login and logout Enable/disable login & logout synchronization rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Login & Logout Sync Skip these items Skip items that end with Skip items that start with Skip items whose full path is Skip items whose name contains Skip items whose name is Skip items whose partial path matches Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Options Manually/automatically synchronize background folders Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 /6 /7 /8 or above Settings Configure mobile account creation Configure mobile account options Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 /6 /7 /8 or above Settings Account Expiry Delete mobile accounts automatically CENTRIFY CORPORATION ALL RIGHTS RESERVED
11 Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Enable background sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Skip items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Synchronize items Sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Enable login & logout sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Skip items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Synchronize items Sync at login and logout CENTRIFY CORPORATION ALL RIGHTS RESERVED
12 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Options Manually/automatically sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Enable home sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Skip Items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Synchronize items Synchronize home sync items Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Options Manually/automatically sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Preference Sync Enable preference sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Preference Sync Skip Items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is CENTRIFY CORPORATION ALL RIGHTS RESERVED
13 Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 /9 Settings Synchronization Rules Preference Sync Synchronize Items Synchronize preference sync items Centrify Mac On-Prem Policies Centrify User Policies Printing Settings Specify printer list Specify printer list (with Model) Centrify Mac On-Prem Policies Centrify User Policies Scripts (Login/Logout) Specify login script Specify logout script Specify multiple login scripts Centrify Mac On-Prem Policies Centrify User Policies Security & Privacy Allow DoD Encryption Wizard to use smart card Allow NSSDB based applications to use smart card Disable Dictation Lock Smart Card screen NSSDB based applications allowed to use smart card Prohibit authentication with expired password Require password to wake this computer from sleep or screen saver Centrify Mac On-Prem Policies Centrify User Policies Security & Privacy Public Key Policies Do not allow private key to be extractable Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Use version specific settings Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Limit items shown in System Preferences Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Hardware Enable Bluetooth Enable CDs & DVDs Enable Displays Enable Energy Saver Enable Ink Enable Keyboard & Mouse (Keyboard) Enable Mouse Enable Print & FAX Enable Sound Enable Trackpad CENTRIFY CORPORATION ALL RIGHTS RESERVED
14 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Internet & Network Enable Fibre Channel Enable MobileMe Enable Network Enable QuickTime Enable Sharing Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Other Preferences Panes Enable other preferences panes Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Personal Enable Appearance Enable Dashboard & Exposé Enable Desktop & Screen Saver Enable Dock Enable International (Language & Text) Enable Security Enable Spotlight Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: System Enable Accounts Enable Classic Enable Date & Time Enable Parental Controls Enable Software Update Enable Speech Enable Startup Disk Enable Time Machine Enable Universal Access Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Mac OS X 10.5/6/7/8/9 /10 Settings Limit items shown in System Preferences Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Mac OS X 10.5/6/7/8/9 /10 Settings Enable System Preferences Panes Enable built-in System Preferences panes Enable other System Preferences panes CENTRIFY CORPORATION ALL RIGHTS RESERVED
15 Centrify Mac On-Prem Policies Centrify User Policies Adclient Settings (Mac) Auto Zone remote file service (Mac OS X) Enable Auto Zone user home directory (Mac OS X) Generate new uid/gid using Apple scheme in Auto Zone Map /home to /Users (Mac OS X) Set user s primary gid in Auto Zone Centrify Mac On-Prem Policies Centrify User Policies Computer Configuration Administrative Templates System Group Policy Turn off background refresh of Group Policy Group Policy refresh interval for computers User Group Policy loopback processing mode Centrify Mac On-Prem Policies Centrify User Policies Computer Configuration Administrative Templates System Windows Time Service Time Providers Global Configuration Settings - MaxPollinterval Enable Windows NTP Client Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Local Policies Security Options Interactive logon: Prompt user to change password before expiration Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Password Policy Enforce password history Maximum password age Minimum password age Minimum password length Password must meet complexity requirements Store passwords using reversible encryption Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Account Lockout Policy Account lockout duration Account lockout threshold Reset account lockout counter after Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Kerberos Policy Enforce user logon restrictions Maximum lifetime for service ticket Maximum lifetime for user ticket Maximum lifetime for user ticket renewal Maximum tolerance for computer clock synchronization CENTRIFY CORPORATION ALL RIGHTS RESERVED
16 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Public Key Polices Certificate Services Client - Auto-Enrollment Settings Trusted Root Certification Authorities Centrify Mac On-Prem Policies Centrify User Policies User Configuration Administrative Template System Group Policy Group Policy refresh interval for users Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Public Key Policy Certificate Services Client - Auto-Enrollment Settings Centrify Cloud Management Settings Common Mobile Settings Wi-Fi Settings Centrify Cloud Management Settings Common Mobile Settings Passcode Settings Auto-Lock (minutes) Grace period for device lock Maximum number of failed attempts Maximum passcode age (days) Minimum number of complex characters Minimum passcode length Passcode history Permit simple value Require alphanumeric value Require passcode on device Centrify Cloud Management Settings Common Mobile Settings OS X and ios Settings Calendar Settings Contacts Settings LDAP Settings Mail Settings Security and privacy settings VPN Settings Centrify Cloud Management Settings Common Mobile Settings OS X Settings Custom settings Open application when user logs in Open authenticated network mounts when user logs in Open files, folders and items when user logs in Open network mounts when user logs in Permit shift key to skip opening items when user log in Security and privacy settings CENTRIFY CORPORATION ALL RIGHTS RESERVED WHP000103en
17 Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Restrict applications Restrict preferences Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Applications Allow folders Disallow folders Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Media Allow access to AirDrop Allow access to CDs & CD-ROMs Allow access to disk images Allow access to DVD-RAM Allow access to DVDs Allow access to external disks Allow access to internal disks Allow access to Recordable Discs Eject all removable media at logout Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Preferences Allow built-in System Preferences Allow other System Preferences CENTRIFY CORPORATION ALL RIGHTS RESERVED
18 Conclusion Centrify Identity Service Mac Edition, enables Active Directory-based authentication and access control for both Mac OS X systems providing the industry s most comprehensive set of policy-based controls for configuring and securing Mac systems, whether they are managed locally on-premises or remotely via the Centrify Identity Service. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. Comprehensive Group Policy-based management automates computer and user configuration and policy enforcement. Automated certificate management provides strong authentication to wired and wireless networks. Automated FileVault 2 configuration protects data at rest through full-disk encryption supporting institution recovery. Comprehensive enterprise system configuration controls: Services Firewall Internet sharing Network configuration for DNS, proxies Login scripts Automount configuration to simplify user access to network shares Robust classroom configuration and policy enforcement Desktop lockdown with controls for Finder, storage media, preferences and applications Network home directories on AFP, SMB or NFS shares Seamless enterprise access to file servers, printers and applications Centrify Cloud Service extends management for updating of security policies as well as lock or wipe Macs and mobile devices Use familiar Windows tools such as Group Policy to centrally manage access to services and enforce security policies Mac OS X systems transparently connect to network file shares hosted on Microsoft Distributed File System (DFS) volumes Instead of configuring endpoint devices one by one, you can centrally enforce the industry s broadest set of policies across workstations, laptops and mobile devices Non-intrusive solution deploys without installing software on domain controllers or requiring any changes to the Active Directory schema Automate device configuration for remote access, including Wi-Fi and VPN access PKI auto-issuance and auto-renewal Enable authorized user accounts to unlock and access encrypted disks through Apple s FileVault 2 Full Disk Encryption Inventory devices and applications across your entire enterprise, organized by user, group or device, to easily track and enforce the status of both company-owned and user-owned devices Centrify provides unified identity management across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify s unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and enterprise mobility management. SANTA CLARA, CALIFORNIA +1 (669) EMEA +44 (0) ASIA PACIFIC BRAZIL LATIN AMERICA sales@centrify.com WEB CENTRIFY CORPORATION. ALL RIGHTS RESERVED (669)
The Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
More informationUsing Centrify s DirectControl with Mac OS X
WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationGoogle Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
More informationDirect Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More informationBest Practices for Adding Macs to Microsoft Networks
WHITE PAPER Best Practices for Adding Macs to Microsoft Networks WWW.CENTRIFY.COM Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationOffice 365 Single Sign-On: High Availability Without High Complexity
WHITE PAPER Office 365 Single Sign-On: High Availability Without High Complexity WWW.CENTRIFY.COM Office 365 Single Sign-On: High Availability without High Complexity Contents Abstract 3 Introduction 4
More informationCentrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
More informationCentrify Identity and Access Management for Cloudera
Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization
More informationWhat s New in Centrify Privilege Service Centrify Identity Platform 15.4
CENTRIFY PRIVILEGE SERVICE WHAT S NEW What s New in Centrify Privilege Service Centrify Identity Platform 15.4 Centrify Privilege Service Centrify Privilege Service is a cloud-based password and access
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationMacintosh Printer Management using Centrify DirectControl Group Policies
WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files
More informationUsing Apple Remote Desktop to Deploy Centrify DirectControl
APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management
More informationMac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
More informationAutomating Cloud Security with Centrify Express and RightScale
QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start
More informationManaging UNIX Generic and Service Accounts with Active Directory
APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer
More informationImproving Mobile Device Security and Management with Active Directory
CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More informationCentralized Mac Home Directories with ExtremeZ-IP
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationTop Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution
WHITE PAPER Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution WWW.CENTRIFY.COM Top Six Things to Consider with an Identity as a Service (IDaaS) Solution Contents Executive Summary
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationSamsung KNOX: An Overview for Business Customers
CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationDeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team info@deploystudio.com Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
More informationWindows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
More informationWhat s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
More informationA Practical Path to Unified Identity Across Data Center, Cloud and Mobile
C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity
More informationWindows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
More informationCentralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic
Centralizing Mac Home Directories on Windows Servers Live Webinar David McNeely Centrify Geordie Korper Group Logic Agenda EDA Overview Centrify DirectControl Group Logic ExtremeZ-IP Centralizing Home
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationiphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
More informationCentrify Cloud Management Suite
Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationCentrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationApple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Mavericks v10.9 Contents Introduction... 4 How to Integrate OS X with Active Directory... 5 Enterprise Integration Challenges... 8 Deployment
More informationConfigure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
More informationBest Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009
Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad
More informationCentralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
More informationCharles Firth charles@firthconsulting.com. Managing Macs in a Windows World
Charles Firth charles@firthconsulting.com Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
More informationApple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges... 7 Deployment
More informationActive Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationCentrify OS X Basic Jump Start
CENTRIFY DATASHEET Centrify OS X Basic Jump Start The Centrify OS X Jump Start gives organizations the training and hands-on experience to rapidly deploy Centrify's solution for Identity, Policy and Device
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for
More informationActive Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper
Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationYou're reading an excerpt. Click here to read official APPLE REMOTE DESKTOP 1.2 user guide http://yourpdfguides.com/dref/1168427
You can read the recommendations in the user guide, the technical guide or the installation guide for APPLE REMOTE DESKTOP 1.2. You'll find the answers to all your questions on the APPLE REMOTE DESKTOP
More informationAdministrator s Guide
Apple Remote Desktop Administrator s Guide Includes setup instructions and solutions for managing client computers remotely K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under the
More informationManaging OS X with Configuration Profiles
Apple Technical White Paper Managing OS X with Configuration Profiles OS X Lion v 10.7.3 1 Table of Contents About Configuration Profiles... 3 Creating Configuration Profiles... 8 Deploying Configuration
More informationBack to My Mac User s Guide
Back to My Mac User s Guide This guide will show you how to access a remote Leopard or Snow Leopard based Mac, Time Capsule, or external hard disk connected to an AirPort Extreme Base Station over the
More informationMac OS X Server User Management Version 10.6 Snow Leopard
Mac OS X Server User Management Version 10.6 Snow Leopard KKApple Inc. 2009 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication
More informationSingle Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory
W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationQuick Start and Trial Guide (Mail) Version 3 For ios Devices
Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationHow To Use Directcontrol With Netapp Filers And Directcontrol Together
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
More informationLikewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
More informationWhat s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
More informationLync for Mac 2011 Deployment Guide
2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current
More informationStep By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
More informationStop Password Sprawl with SaaS Single Sign-On via Active Directory
CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional
More informationOracle Mobile Security
Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
More informationStep-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
More informationApple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University
Apple Client Management with JAMF Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University Intro Intro 2011 Kent State University President s Excellence in Action Award Winner
More informationWindows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
More informationWindows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
More informationInformation in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
More informationCentrify-Enabled Samba
CENTRIFY CORP. Centrify-Enabled Samba DECEMBER 2009 The easy-to-manage enterprise solution for Active Directory-enabled Samba file sharing ABSTRACT Samba is one of the most popular open source technologies
More informationDriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationSophos Mobile Control Startup guide. Product version: 3
Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos
More informationBest Practices: Integrating Mac OS X with Active Directory. Technical White Paper September 2007
Best Practices: with Active Directory Technical White Paper September 2007 Contents Page 3 Page 4 Page 8 Page 10 Page 11 Page 13 Apple s Built-In Solution How to Integrate Mac OS X with Active Directory
More informationActive Directory Compatibility with ExtremeZ-IP
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP
More informationManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationDefault Domain Policy Data collected on: 10/12/2012 5:28:08 PM General
Default Domain Default Domain Data collected on: 10/12/2012 5:28:08 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status webrecon.local WEBRECON\Domain
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationWindows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
More informationQuickStart Guide for Client Management. Version 8.7
QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationCentrify Suite 2012 Express
Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms
More informationSmart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
More informationMBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationTechnical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationUsing Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
More informationEndpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
More informationCentrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationWhat s New in Centrify Server Suite 2015
C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%
More information