Centrify Zero Trust Privilege Services 19.9 Documentation
Upgrade Guide & Release Notes
19.9 Upgrade Guide
Zero Trust Privilege Services 19.9 Release Notes
Centrify Agent for Windows 3.6.1 Release Notes
Centrify Authentication Service and Privilege Elevation Services 5.6.1 Release Notes
Centrify Auditing and Monitoring Service 3.6.1 Release Notes
Quick Start & Evaluation Guides
Quick Start Guide for Linux and UNIX
Provides a brief summary of the steps for installing and getting started with Centrify software.
Quick Start Guide for Multi-factor Authentication
You can configure multi-factor authentication based on user roles or computer roles, for specific applications or for individual commands. You can also skip multi-factor authentication for applications that don’t support it or for other reasons on a case-by-case basis by enabling and applying group policy or by setting configuration parameters.
Evaluation Guide for Linux and UNIX
This guide shows you how to install and configure the Centrify software on a Windows computer joined to an Active Directory domain controller and on the Linux and UNIX computers you want to manage. After you install the software, you can follow the steps in this guide to create Active Directory users and groups and set up a test environment with Centrify zones, roles, privileges, and group policies. Through this test environment, you can see how Centrify enables you to control users access, manage privileges, and monitor activity on UNIX and Linux computers in your organization.
Evaluation Guide for Windows
This guide shows you how to install and configure an environment suitable for evaluating Centrify access and auditing features in a Windows-only environment.
Administrator’s Guide for Linux and UNIX
This guide shows you how to use Centrify software to manage user and group profiles, role-based access rights, and delegated administrative activity for Linux and UNIX computers. This guide focuses exclusively on the management of identity attributes, rights, roles, role assignments, and privileges that apply to Linux and UNIX computers
This guide is an automatically generated PDF of the UNIX man pages for all Centrify Authentication, Privilege Elevation, and Audit & Monitoring Services UNIX commands.
Network Information Service Administrator’s Guide
Provides complete information for installing, configuring and using the Centrify Zero Trust Privilege Services Network Information Service (adnisd) to provide authentication and centralized network information from Active Directory to Network Information Services (NIS) clients in a heterogeneous environment. Centrify Zero Trust Privilege Services Network Information Service is an optional addition to Centrify Zero Trust Privilege Services and the DirectControl agent.
Administrator’s Guide for Windows
This guide describes how to install and configure Centrify software to manage access rights, elevated permissions, and role-based auditing for Windows computers. This guide focuses exclusively on the management of rights, roles, role assignments, privileges for application and network resources, and auditing requirements that apply to Windows computers.
License Management Administrator's Guide
The Centrify licensing report utility collects information about the Centrify software you have deployed, including how many licenses you have available, and the number of licenses currently in use. You can use this utility to generate a report that provides a summary and detailed information about the different types of licenses you have purchased for access control, privilege management, and auditing and where active licenses are being used.
Auditing Administrator’s Guide
Provides complete information for installing and configuring the auditing infrastructure, including guidelines for planning your deployment, managing audited activity, and how to use Audit Analyzer to find and replay captured user sessions. Centrify software helps you comply with regulatory requirements and improve accountability by collecting detailed information about user activity on Linux, UNIX, and Windows computers. The Centrify auditing features enable you to monitor user activity for immediate analysis or specific incidents, such as application failures or security breaches.
Administrator’s Guide for Reports
Centrify Report Services provides reports on your Active Directory environment and in a format that’s optimized for reporting. You can synchronize the Active Directory information to your reporting database, and then allow your users access to just the reporting data.
RSA SecurID Token Configuration for UNIX/Linux Computers
This document describes the steps necessary to install and configure infrastructure services and RSA SecurID to enable two factor authentication for UNIX/Linux environments.
Certificate Auto-enrollment Quick Start Guide
This guide describes how to set up a Certificate Authority and automatically manage certificates issued to UNIX and Linux workstations using the Windows Auto-enrollment feature.
Audit Events Administrator’s Guide
Documents all the audit trail events generated by Centrify Zero Trust Privilege Services. This is intended for administrators who want to monitor Centrify Zero Trust Privilege Services related events using Security information and event management (SIEM) tools.
User’s Guide for Windows
This guide describes how you select and use the roles you have been assigned to get privileged access to applications and network resources. If your organization has deployed Centrify Zero Trust Privilege Services and installed agents on Windows computers, an administrator should have prepared your computer and any remote servers you use and assigned one or more roles with specific access rights to your account.
User’s Guide for Linux and UNIX
This guide describes how you select and use the roles you have been assigned to log in and issue privileged commands on UNIX and Linux computers. If your organization has deployed Centrify Zero Trust Privilege Services and installed agents on UNIX or Linux computers, an administrator should have prepared your computer and any remote servers you use and assigned one or more roles with access rights to your account.
Find Sessions Guide
Find Sessions is a separate executable file, installed in the same directory as Audit Analyzer, that you can use to find and open audited sessions. The program provides a graphical user interface and a command line interface for specifying the search criteria.
Planning & Configuration Guides
Planning and Deployment Guide
Provides conceptual and technical information to help you plan and manage the initial deployment of Centrify software to provide secure authentication, authorization, and configuration services through Microsoft Active Directory. It includes instructions and best practices for planning a deployment, installing the software, migrating existing accounts, and developing a basic set of roles.
Configuration and Tuning Reference Guide
Provides reference information for Centrify configuration parameters. Configuration parameters can be set locally on Linux, UNIX, and Mac OS X computers to fine tune the operation of Centrify Zero Trust Privilege Services components and subsystems. Centrify Zero Trust Privilege Services is an integrated software solution that delivers secure access control and centralized identity management through Microsoft Active Directory. With Centrify software, your organization can improve IT efficiency, regulatory compliance, and security for on-premise, mobile, and hosted resources.
Group Policy Guide
Describes the Centrify group policies that are available in the Centrify Zero Trust Privilege Services for cross-platform access control and privilege management. These group policies allow you to centrally manage computer and user configuration settings through the Microsoft Group Policy Objects.
Smart Card for Red Hat Configuration Guide
This document explains how to set up smart card authentication for logging on to Red Hat Linux computers.
Auditing and Analysis Scripting Guide
This guide describes the Centrify Audit Module for Windows PowerShell command set. These PowerShell cmdlets run on Windows computers and can be used to automate auditing-related management tasks, such as the creation of new audit store databases. You can also use the cmdlets to get or set properties for an installation and perform other administrative tasks.
ADEdit Command Reference and Scripting Guide
This guide shows you how to use the Centrify ADEdit command-line interface to manage Centrify objects stored in Microsoft Active Directory. ADEdit is a Tool command language (Tcl) application that enables administrators to run commands and write scripts that modify data in Active Directory directly from their Linux or UNIX console.
Access Control and Privilege Management Scripting Guide
Describes the Centrify Access Control and Privilege Management PowerShell-based command set. These PowerShell cmdlets run on Windows computers and can be used to automate access control and privilege management tasks, such as the creation of Centrify zones, rights, and roles. You can also use the cmdlets to perform other administrative tasks. For example, you can write scripts to add UNIX profiles for Active Directory users and groups to Centrify zones, assign UNIX and Windows users and groups to roles, and manage network information through NIS maps.
Windows API Programmer’s Guide
This document provides reference information and examples for programmers who plan to use the Centrify Zero Trust Privilege Services SDK to develop programs for Windows and UNIX environments. It includes information for managing both Windows and UNIX computers and for managing the Active Directory data associated with UNIX users, groups, computers, and network maps. Much of the information in this guide is primarily intended for developers writing programs to provision UNIX users and groups into an Active Directory environment.
Database Management Guide
This guide is intended for database administrators who are responsible for preparing and maintaining the databases required to store audit-related information. If you are a Centrify administrator, but not a Microsoft SQL Server administrator, you should review the information in this guide with your Microsoft SQL Server system administrator.