Welcome to Conjur!

Conjur provides web services to identify, organize, control, and record access to cloud infrastructure. It's been designed and built from the ground-up to work ideally with cloud architecture and DevOps principles. Conjur replaces and/or extends a variety of legacy IAM tools such as Active Directory and OpenLDAP

Why use it?

Conjur provides an unprecedented level of control and transparency that works equally well with manually managed systems or with massive automation. Conjur takes over the functions of access management and audit so that your teams and your business will be able to continuously deliver new applications and new functionality using whatever DevOps techniques and tools you desire, without compromising the security or compliance of the systems. And Conjur's reporting capabilities provide a unified way to show your security, compliance, and business teams exactly how your cloud and DevOps systems are being tracked, managed, secured and audited.

How does it work?

Conjur operates as a highly available web service, running in your own infrastructure. Multiple replicated Conjur servers work together to provide high availability and low latency.

Conjur provides HTTPS web services, plus LDAPS for integration with existing tools and applications. Conjur services can be used by direct protocol interaction (e.g. cURL and ldapsearch), by client libraries for popular languages such as Ruby, Python, Java, and Node.js, by the Conjur command-line interface, and by custom scripts and connectors.

Conjur implements Role-Based Access Control for both users and machines. Conjur users and machines can load secrets, configure and privilege hosts, create user groups, and organize hosts into access-controlled layers. Conjur administrators can also delegate authority over subsets of the infrastructure to other groups, and can even write custom scripts and jobs to perform administrative functions such as key rotation.

Everything that happens in the Conjur-managed system is recorded to the Conjur audit database. Full reports of users, groups, machines, secrets, permissions, and system activity are available at any time through the Conjur API and User Interface.

Recent Updates

  • [ 2015-03-04 ] LXC
  • [ 2015-02-05 ] conjurize Generate a script to install Conjur onto a machine
  • [ 2015-02-04 ] VMware
  • [ 2014-08-31 ] Host Factory Integrate host identity with cloud management, orchestration, and configuration management tools
  • [ 2014-08-08 ] Host Management Creating and managing hosts.
  • [ 2014-07-18 ] Custom Audit Records Learn to store and retrieve custom audit events
  • [ 2014-06-07 ] Deploying Secrets Create bundles of secrets and distribute them securely to deployed applications.
  • [ 2014-05-27 ] Conjur SSH Setup SSH login with public key authentication and fine-grained authorization.