Welcome to Conjur!
Conjur provides web services to identify, organize, control, and record access to cloud infrastructure.
It's been designed and built from the ground-up to work ideally with cloud architecture and DevOps principles.
Conjur replaces and/or extends a variety of legacy IAM tools such as Active Directory and LDAP.
Why use it?
Conjur provides an unprecedented level of control and transparency that works equally well with manually managed systems or with massive automation.
With Conjur, your teams and your business will be able to continuously deliver new applications and new functionality using the DevOps techniques and tools you want without compromising the security or compliance of the systems.
And Conjur's reporting capabilities provide a unified way to show your security, compliance, and business teams exactly how your cloud and DevOps systems are being tracked, managed, secured and audited.
How does it work?
Conjur operates as a highly available web service running in your own infrastructure.
Multiple replicated Conjur servers work together to provide high availability and low latency.
Security as code is a key tenet of Conjur. Security policy is written as YML markup, checked into source control and loaded into the Conjur environment. This allows you to treat security policy as you would any other source control asset, offering more transparency and collaboration around your organization's security requirements.
- direct protocol interaction (e.g.
- client libraries for popular languages such as Ruby, Python, Java, and Node.js
- the Conjur command-line interface
- custom scripts and connectors
Conjur implements Role-Based Access Control for both users and machines.
Users of Conjur can:
- store and retrieve secrets
- configure and privilege hosts
- create users and groups
- manage SSH access without placing keys on machines
- and more
Conjur administrators can also delegate authority over subsets of the infrastructure to other groups, and can even write custom scripts and jobs to perform administrative functions such as key rotation.
Everything that happens in the Conjur-managed system is recorded to an immutable audit trail. Full reports of users, groups, machines, secrets, permissions, and system activity are available at any time through the Conjur API and User Interface.
To learn more about how Conjur works, check out the Key Concepts page.
Use the Quick Start Guide to get your own Conjur development environment up and running.
See "Next Steps" on that page to learn more about how you can apply Conjur's capabilities to your own environment.
- [ 2016-04-29 ] Reference / Upgrading / HowTo Upgrade from 4.5.x/4.6.x to 4.7.x : HowTo Upgrade Conjur Master from 4.5.x/4.6.x to 4.7.x
- [ 2016-04-15 ] / Policy Guide : Common Policy YML operations
- [ 2016-04-13 ] Tutorials / Public Keys and SSH / Conjur SSH : Setup SSH login with public key authentication and fine-grained authorization.
- [ 2016-04-12 ] Tutorials / User and Machine Identity / User Management : Creating and managing users.
- [ 2016-04-12 ] Tutorials / Audit / Automatic Auditing : Review automatically recorded audit records
- [ 2016-04-12 ] Tutorials / User and Machine Identity / Host Management : Creating and managing hosts.