Conjur Enterprise V4 Key Concepts
Conjur Enterprise is a security orchestration system. It is designed to work with and enhance your existing tooling and workflows. To this end, we provide many different services and tools to help you secure your development cycle, from initial implementation to running in production. To learn how Conjur Enterprise can be most effective for your organization, there are a few key concepts to understand.
1. Role-Based Access Control
The Conjur Enterprise authorization functionality is based on Role-Based Access Control. A "role" is an identity such as a user or machine, or a collection of roles.
2. Machine Identity
In order for Conjur Enterprise to see everything, each machine is assigned an identity.
Conjur Enterprise provides encrypted, access controlled, and audited management of infrastructure secrets such as database passwords, SSL certificates and keys, SSH keys, and cloud credentials.
Conjur Enterprise integrates with standard Linux tools such as OpenSSH, PAM and syslog to provide powerful SSH management. Conjur SSH is a smart configuration of a standard Linux system, not an agent.
Conjur Enterprise is fully programmable through its HTTPS RESTful API. In addition, we provide a comprehensive command-line interface (CLI), as well as API client libraries for several languages.
6. Enterprise Directories
You can import Users and Groups from your existing LDAP or ActiveDirectory into Conjur Enterprise. The result is a "blended" system which extends and enhances your existing enterprise directory.