Conjur is a security orchestration system. It is designed to work with and enhance your existing tooling and workflows. To this end, we provide many different services and tools to help you secure your development cycle, from initial implementation to running in production. To learn how Conjur can be most effective for your organization, there are a few key concepts to understand.
1. Role-Based Access Control
Conjur's authorization functionality is based on Role-Based Access Control. A "role" is an identity such as a user or machine, or a collection of roles.
2. Machine Identity
In order for Conjur to see everything, each machine is assigned an identity.
Conjur provides encrypted, access controlled, and audited management of infrastructure secrets such as database passwords, SSL certificates and keys, SSH keys, and cloud credentials.
Conjur integrates with standard Linux tools such as OpenSSH, PAM and syslog to provide powerful SSH management. Conjur SSH is a smart configuration of a standard Linux system, not an agent.
Conjur is fully programmable through its HTTPS RESTful API. In addition, we provide a comprehensive command-line interface (CLI), as well as API client libraries for several languages.
6. Enterprise Directories
You can import Users and Groups from your existing LDAP or ActiveDirectory into Conjur. The result is a "blended" system which extends and enhances your existing enterprise directory.