Centrify Win Adminguide
Centrify Win Adminguide
Centrify Corporation
Legal notice
This document and the software described in this document are furnished under and are subject
to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth
in such license agreement or non-disclosure agreement, Centrify Corporation provides this
document and the software described in this document “as is” without warranty of any kind,
either express or implied, including, but not limited to, the implied warranties of merchantability
or fitness for a particular purpose. Some states do not allow disclaimers of express or implied
warranties in certain transactions; therefore, this statement may not apply to you.
This document and the software described in this document may not be lent, sold, or given away
without the prior written permission of Centrify Corporation, except as otherwise permitted by
law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part
of this document or the software described in this document may be reproduced, stored in a
retrieval system, or transmitted in any form or by any means, electronic, mechanical, or
otherwise, without the prior written consent of Centrify Corporation. Some companies, names,
and data in this document are used for illustration purposes and may not represent real
companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new editions
of this document. Centrify Corporation may make improvements in or changes to the software
described in this document at any time.
© 2004-2017 Centrify Corporation. All rights reserved. Portions of Centrify software are derived
from third party or open source software. Copyright and legal notices for these sources are listed
separately in the Acknowledgements.txt file included with the software.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or
on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at
any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions)
and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the
software and documentation, including its rights to use, modify, reproduce, release, perform,
display or disclose the software or documentation, will be subject in all respects to the
commercial license rights and restrictions provided in the license agreement.
Centrify software is protected by U.S. Patents 7,591,005; 8,024,360; 8,321,523; 9,015,103 B2;
9,112,846; 9,197,670; and 9,378,391.
The names of any other companies and products mentioned in this document may be the
trademarks or registered trademarks of their respective owners. Unless otherwise noted, all of
the names used as examples of companies, organizations, domain names, people and events
herein are fictitious. No association with any real company, organization, domain name, person,
or event is intended or should be inferred.
Contents
3
• 5
Chapter 12 Working with Server Core and Windows Server 2012 262
Server Core supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Installing the agent on a computer running Server Core . . . . . . . . . . . . . . 264
Opening consoles on Server Core computers . . . . . . . . . . . . . . . . . . . . . . . 265
Index 271
• 7
Intended audience
The Centrify Server Suite Administrator’s Guide for Windows provides
information to ensure a successful installation of Centrify components
and describes how to use Centrify to manage access to desktop,
application, and network resources, and audit user activity on
Windows computers. The guide is intended for administrators who are
responsible for installing and configuring software on Windows
computers, and for administrators who manage access to and monitor
user activity on Windows servers. The guide also includes information
intended for security administrators and auditors who are responsible
for identifying audit requirements, querying the audit store databases,
examining user activity, and flagging sessions for follow-up.
8
Using this guide
For access to documentation for all Centrify products and services, visit
the Centrify documentation portal. From the Centrify documentation
portal, you can always view or download the most up-to-date version
of this guide and all other product documentation.
Contacting Centrify
You can contact Centrify by visiting our website, www.centrify.com. On
the website, you can find information about Centrify office locations
worldwide, email and phone numbers for contacting Centrify sales,
and links for following Centrify on social media. If you have questions
or comments, we look forward to hearing from you.
12
Managing Windows computers using Centrify software
If you enable access control features, the agent enforces the role-
based privileges that enable users to run applications locally with
administrative privileges without using the Administrator password
and with their activity traceable to their own account credentials. You
can also use role-based privileges to secure access to network services
on remote computers. Administrator’s Guide for Windows
Through the use of zones and roles, Centrify provides granular control
over who can do what, and over where and when those users should
be granted elevated privileges.
Zones provide the first level of refinement for access control, privilege
management, and the delegation of administrative authority. For
example, you can use zones to create logical groups of Windows
computers to achieve these goals:
You can also create zones in a hierarchical structure of parent and child
zones to enable the inheritance of rights, roles, and role assignments
from one zone to another or to restrict local or remote access to
specific computers for specific users or groups.
19
Access control and privilege management
After you deploy the Centrify agent for Windows and select access
management on a computer, the agent provides the following access
control and privilege management features:
The following figure illustrates the basic architecture and flow of data
with a minimum number of DirectManage Audit components installed.
you are auditing, how much audit data you want to collect and store,
and how long you plan to retain audit records.
Although the audit store can use multiple databases, the presentation
of session data is not affected. If a session spans two or more
databases that are attached to the audit store, the Audit Analyzer
console presents the data as a single, unbroken session. For example,
if you change the active database during a session, some of the session
data is stored in the attached database that is no longer active and
some of it stored in the newly activated database, but the session data
plays back as a single session to the auditor.
to request data from the audit management database. The two most
important consoles in an installation are the Audit Manager console
and the Audit Analyzer console.
Planning a deployment
This chapter describes the decisions you need to make during the
planning phase of a deployment and summarizes what’s involved in
deploying DirectManage Access and DirectManage Audit components
and Centrify agents. It includes simplified diagrams that highlight the
steps involved.
30
Identify access, privilege management, and auditing goals
test your deployment strategy and validate the results before placing
Centrify components into a production environment.
During the planning phase, you should decide on the goals of your
deployment—access and privilege management, auditing, or both—
because that decision affects all of the other decisions you need to
make. If you plan to include auditing, you should also start to identify
who and what you want to audit, any roles where no auditing should
be done, and any roles that will require auditing.
The computer you use for the audit management database should
have reliable, high-speed network connectivity. The management
database does not store the captured sessions, and is, therefore, much
smaller than the audit store databases. There are no specific sizing
requirements or recommendations for the management database.
When a user logs on, the Centrify agent for Windows connects to
Active Directory to begin the lookup process, then the agent and the
domain controller exchange messages as follows:
a firewall, put the collectors in the same Active Directory domain as the
audited computers. The collectors can communicate with the audit
store database through a firewall.
If you plan to use more than the minimum number of collectors, the
most important factor to consider is the number of concurrent
sessions you expect to monitor on audited computers. The number of
concurrent sessions represents the number of interactive users that
the agent is actively capturing for at the same time.
You can use the following guidelines as a starting point and adjust
after you have observed how much audit data you are collecting and
storing for Windows computers:
up to 100 agents 2 1
more than 100 agents 2 for every 100 agents 1 for every 100 agents
The size of disk needed depends on the number, length, and types of
sessions recorded each day, the selected recovery model, and your
data retention policies. For more information about managing audit
store databases, see “Managing audit store databases” on page 203.
You can also use the Audit Analyzer console to run queries from any
additional computers with network access to the management
database. Therefore, you should decide where it would be convenient
to have this capability.
If you use Audit Manager to manage SQL logins, you can use Active
Directory membership to automatically add and remove the
permissions required for auditing activity. There is no requirement to
use the SQL Server Management Studio to manage logins or
If you create these Active Directory security groups, you can then use
Audit Manager to grant Manage SQL Login permissions for each group
to allow its members to connect to the appropriate SQL Server
database. Creating Active Directory security groups with SQL Server
logins enables you to manage access to the databases required for
auditing through Active Directory group membership without the help
of the database administrator.
Plan
During the first phase of the deployment, you collect and analyze
details about your organization’s requirements and goals. You can then
also make preliminary decisions about sizing, network communication,
where to install components, and what your zone structure should
look like.
Prepare
After you have analyzed the environment, you should prepare the
Active Directory organizational units and groups to use. You can then
install administrative consoles and the auditing infrastructure, and
prepare initial zones.
Deploy
After you have prepared Active Directory, installed administrative
consoles on at least one computer, created at least one zone, and
prepared the auditing infrastructure, you are ready to deploy on the
computers to be managed.
Validate
After you have deployed agents on target computers, you should test
and verify operations before deploying on additional computers.
Manage
After you have tested and verified access and auditing operations, you
are ready to begin managing the installation and refining on-going
operations.
Here are the key steps involved if you deploying access control,
privilege management, and auditing for Windows computers:
Installation checklist
Install Access Manager and update Active Directory
Install and configure Microsoft SQL Server for auditing
Install Audit Manager and Audit Analyzer consoles
Create a new installation
Install and configure audit collectors
Install Centrify agents for Windows
Install additional consoles
Install group policy extensions separately from Access Manager
Installation checklist
As a preview of what’s involved in the installation process, the
following steps summarize what you need to do and the information
you should have on hand for a successful deployment of Centrify
Server Suite.
49
Installation checklist
For example, list the computers where you plan to install agents,
collectors, audit store databases, consoles, and group policy
extensions.
6 Open Access Manager and add containers for licenses and zones to
the Active Directory forest.
You can add collectors to the installation at any time. For more
information about installing and configuring collectors, see “Install
and configure audit collectors” on page 64. If you are only
implementing access management, you can skip this step.
After the initial deployment, you can add new agents, collectors, audit
stores, and audit store databases to the audit installation or create
additional installations at any time.
2 On the Getting Started page, click Access to start the setup program
for DirectManage Access components.
2 On the Getting Started page, click Audit to start the setup program
for DirectManage Audit components.
In the rare case where the administrator should not have access to
the Audit Analyzer, select Audit Manager, then click Next.
After you install Audit Manager, you are prompted to create a new
installation. If you want to create the installation at a later time, you
can close the New Installation wizard. You can start the New
Installation wizard at any time from the Audit Manager console.
If you have not been added to the system administrators role, you
should contact a database administrator to assist you. For more
information about creating a new installation when you don’t have
system administrator privileges, see “How to create an installation
without system administrator privileges” on page 59.
The New Installation wizard displays automatically the first time you
start Audit Manager. You can also start it by clicking Action > New
Installation or from the right-click menu when you select the
DirectManage Audit Manager node.
If the server does not use the default TCP port (1433), you must
provide the server and instance names separated by a backslash,
then type a comma and the appropriate port number. For example,
if the server name is ACME, the instance name is BOSTON, and the
5 Type the license key you received, then click Add or click Import to
import the keys directly from a file, then click Next.
If you have SQL Server system administrator (sa) privileges and can
connect to the SQL Server instance, the wizard automatically
creates the management database.
9 Select the Launch Add Audit Store Wizard option if you want to
start the Add Audit Store wizard, then click Finish.
If you want to create the first audit store database at a later time,
you should deselect the Launch Add Audit Store Wizard option
and click Finish.
For more information about adding the first audit store database,
see “Create the first audit store” on page 61.
1 Select the option to generate the SQL scripts, then click Next.
2 Select the folder location for the scripts, then click Next.
The wizard generates two scripts: Script1 prepares the SQL Server
instance for the management database and Script2 creates the
database.
If the server does not use the default TCP port, specify the port
number as part of the server name. For example, if the port number
is 1234, the server name would be similar to ACME\BOSTON,1234.
9 Select the database name from the list of available databases, click
OK, then click Next.
10 Type a license key or import licenses from a file, then click Next.
12 Select the Launch Add Audit Store Wizard option if you want to
start the Add Audit Store wizard, then click Finish.
1 Type a display name for the audit store, then click Next.
Tip If your plan specifies multiple audit stores, use the name to
reflect the sites or subnets serviced by this audit store. Note that an
audit store is actually a record in the management database. It is
not a separate process running on any computer. You use a
separate wizard to create the databases for an audit store.
2 Click Add Site or Add Subnet to specify the sites or subnets in this
audit store.
If you select Add Site, you are prompted to select an Active
Directory site.
If you select Add Subnet, you are prompted to type the network
address and subnet mask.
After you make a selection or type the address, click OK. You can
then add more sites or subnets to the audit store. When you are
finished adding sites or subnets, click Next to continue.
The computer you use to host the audit store database should be
no more than one gateway or router away from the computers
being audited. If your Active Directory sites are too broad, you can
use standard network subnets to limit the scope of the audit store.
3 Review information about the audit store display name and sites or
subnets, then click Next.
4 Select the Launch Add Audit Store Database Wizard option if you
want to create the first audit store database, then click Finish.
1 Type a display name for the audit store database, then click Next.
The default name is based on the name of the audit store and the
date the database is created.
2 Select the option to create a new database and verify the SQL Server
computer name, instance name, and database name are correct,
then click Next.
The default database name is the same as the display name. You
can change the database name to be different from the display
name, if desired.
Because this is the first audit store database, you also want to make
it the active database. This option is selected by default. If you are
creating the database for future use and don’t want to use it
immediately, you can deselect the Set as active database option.
If the server does not use the default TCP port, specify the port
number as part of the server name. For example, if the port number
is 1234, the server name would be similar to ACME\BOSTON,1234.
3 Review details about the audit store database, then click Next.
If you have SQL Server system administrator (sa) privileges and can
connect to the SQL Server instance, the wizard automatically
creates the audit store database.
domain of the computer hosting SQL Server. The Active Directory user
account that you used to log on to the computer where the Audit
Manager is installed must be in a domain trusted by the computer
running SQL Server. If there is no trust relationship, you must log on
using an account in the same domain as the computer running SQL
Server. If you are accessing the computer running SQL Server
remotely, you can use the Run As command to change your credentials
on the computer from which you are running the wizard.
The computer hosting the SQL Server database for the active audit
store server be online and accessible from the Audit Manager console
and from the clients in the Active Directory site or the subnet segments
you have defined for the audit store. You should verify that there are
no network connectivity issues between the computers that will host
collectors and those hosting the SQL Server databases.
To add the database to the audit store after you have generated the scripts:
3 Expand the installation node, then expand Audit Stores and the
specific audit store you for which you want a new database.
5 Type a display name for the audit store database, then click Next.
6 Select Use an existing database and select the database that the
database administrator created for you.
Because this is the first audit store database, you also want to make
it the active database. This option is selected by default. If you are
creating the database for future use and don’t want to use it
immediately, you can deselect the Set as active database option.
If the server does not use the default TCP port, specify the port
number as part of the server name. For example, if the port number
is 1234, the server name would be similar to ACME\BOSTON,1234.
To set the permission required to add accounts to the audit store database:
3 Select the audit store that the collector will connect to, right-click,
then click Properties.
5 Click Add to search for and select the user who will configure the
collector.
If you’re running another firewall product, open the port with the
tools provided by that product. If there’s an upstream firewall—
such as a dedicated firewall appliance—between the Collector and
the computers to be audited, contact the appropriate personnel to
open the port on that firewall.
2 Select the installation of which this collector will be a part, then click
Next.
4 Choose the maximum number of connections you want for the SQL
Server Connection Pool, then click Next.
6 Click Finish to start the collector service and close the wizard.
Verify prerequisites
Before installing the agent for Windows, verify the computer on which
you plan to install meets the following requirements:
If you are installing interactively using the setup program, the setup
program can check that the local computer meets these requirements
and install any missing software required. if you are installing silently
or from a Group Policy Object, you should verify the computers where
you plan to install meet these requirements.
If you are not planning to audit the local computer, you can install the
agent without configuring an installation.
2 On the Getting Started page, click Agent to start the setup program
for the agent.
4 Review the terms of the license agreement, click I accept the terms
in the License Agreement, then click Next.
If you don’t select the Audit option, users who are assigned a role
with auditing required will not be able to log on to the computer. In
most cases, you should install both Access to allow users to select
roles and Audit to track what users do when they elevate their
privileges using a role.
6 Click Install.
1 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAuthorize.
2 Click Change.
3 Select Change the Centrify zone for this computer, then click
Browse.
4 Click Find Now to search for an appropriate zone for the agent.
5 Select a zone from the list of search results, then click OK.
7 Click Close.
1 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAudit.
2 Click Configure.
3 Select the maximum color quality for recorded sessions, then click
Next.
5 Select the installation that the agent belongs to, then click Next.
The “Maximum size of the offline data file” setting defines the
minimum percentage of disk space that should be available, if needed,
for auditing. It is intended to prevent audited computers from running
out of disk space if the agent is sending data to its offline data storage
location because no collectors are available.
For example, if you set the threshold to 10%, auditing will continue
while spooling data to the offline file location as long as there is a least
10% of available disk space on the spool partition. When the available
disk space reaches the threshold, auditing will stop until a collector is
available.
Note You can also use a silent installation to automate the installation
or upgrade of the agent on remote computers if you use a software
distribution product, such as Microsoft System Center Configuration
Before you begin a silent installation, you should decide whether you
will wait until later to join the computer to a zone, or join the computer
to a zone as part of the installation procedure.
You use a transform (MST) file that is provided with Server Suite to
configure a default set of agent-specific registry keys during the
silent installation.
You can optionally edit the MST file before performing the
installation to customize agent-specific registry settings for your
environment.
You can optionally use the DirectAudit and DirectAuthorize agent
control panels or the registry editor to configure registry settings
after the installation finishes.
See “Configuring registry settings” on page 74 for details about the
registry settings that you can configure by editing the MST file.
See “Editing the default transform (MST) file” on page 80 for details
about how to edit the MST file before you perform the installation.
See “Installing and joining a zone silently” on page 83 for details
about performing the installation.
Note If you do not join the computer to a zone during installation, you
do not use the MST file. In this situation, you can create or edit registry
keys manually after the installation finishes by using the DirectAudit
and DirectAuthorize Agent Control Panels, or the registry editor.
• off
• information
• warning
• error
• verbose
This setting is included in the default
MSI file. The default value is
information.
For example:
1FB288BC-EC92-4AA0-AB8C-
[email protected]
This setting is not included in the
default MSI file. To use it, you must edit
the default transform (MST) file so that
the setting is processed together with the
MSI file during installation, or create it
manually in the registry after the
installation finishes.
• off
• information
• warning
• error
• verbose
This setting is included in the default
MSI file. The default value is
information.
This section describes how to edit the default transform (MST) file
Group Policy Deployment.mst. You execute the MST file together
with the installation (MSI) file during a silent installation if you want to
join the computer to a zone as part of the installation.
The MST file specifies registry key settings that are different from those
specified in the MSI file. You use the MST file to customize a silent
Note By default, auditing features are not installed when you install the
Centrify Agent for Windows. To install auditing features, you can use the
procedure below to add the following property and corresponding
value to the MST Property table: INSTALLLEVEL=2000.
After you edit the default MST file as described here, go to “Installing
and joining a zone silently” on page 83 for instructions about how and
when to execute the MST file.
1 You will use the Orca MSI editor to edit the MST file. Orca is one of
the tools available in the Windows SDK. If the Windows SDK (or
Orca) is not installed on your computer, download and install it now
from this location:
http://msdn.microsoft.com/en-us/library/aa370557(v=vs.85).aspx
The file is now in transform edit mode, and you can modify data
rows in it.
Notice that a green bar displays to the left of “Property” in the left
pane. This indicates that the Property table will be modified by the
MST file.
The right pane displays the properties that configure registry keys
when the MSI file executes. Notice that the last property in the table,
GPDeployment, is highlighted in a green box. This indicates that the
This section describes how to install the agent silently without joining
the computer to a zone. This procedure includes configuring registry
settings manually using the registry editor, the agent control panel, or
a third-party tool.
Note To install the agent and join the computer to a zone during
installation, see “Installing and joining a zone silently” on page 83 for
more information.
Check prerequisites:
1 Verify that the computers where you plan to install meet the
prerequisites described in “Verify prerequisites” on page 68. If
prerequisites are not met, the silent installation will fail.
2 If you are installing the auditing agent, verify that the following tasks
have been completed:
a Installed and configured the SQL Server management database
and the SQL Server audit store database.
b Installed and configured one or more collectors.
c Configured and applied the Centrify DirectAudit Settings group
policy that specifies the installation name.
To install the Centrify Agent for Windows silently without joining the
computer to a zone:
2 Run the installer for the Centrify Agent for Windows package. For
example:
msiexec /qn /i "Centrify Agent for Windows64.msi"
By default, only the Centrify Agent for Windows with the access
feature is enabled. If you want to enable both the access and
auditing features, set the ADDLOCAL option to ALL. For example, to
enable access control and privilege management with auditing, run
the following command:
msiexec /qn /i "Centrify Agent for Windows64.msi" ADDLOCAL=ALL
This section describes how to install the agent and join the computer
to a zone at the same time. The procedure described here includes the
following steps in addition to executing the MSI file:
Notes Joining the computer to a domain is applicable only when you are
installing the access control and privilege management agent (either by
itself or together with the auditing agent).
To install the agent without joining the computer to a zone during
installation, see “Installing silently without joining a zone” on page 81 for
more information.
Check prerequisites:
1 Verify that the computers where you plan to install meet the
prerequisites described in “Verify prerequisites” on page 68. If
prerequisites are not met, the silent installation will fail.
2 If you are installing the auditing agent, verify that the following tasks
have been completed:
a Installed and configured the SQL Server management database
and the SQL Server audit store database.
b Installed and configured one or more collectors.
c Configured and applied the Centrify DirectAudit Settings group
policy that specifies the installation name.
To install the Centrify Agent for Windows and add a computer to a zone
during installation:
2 Optional: You will use the default transform file Group Policy
Deployment.mst in Step 3 to update the MSI installation file so
that the computer is joined to the zone in which it was pre-created
in Step 1. You can optionally modify Group Policy
Deployment.mst to change or add additional registry settings
during installation.
Note that only the access features of the Centrify agent are installed
by default. To install both the access and auditing features, you
must set the ADDLOCAL option to ALL. For Example:
msiexec /i "Centrify Agent for Windows64.msi" /qn
TRANSFORMS="Group Policy Deployment.mst"
ADDLOCAL=ALL
Note that, by default, only Access features are installed. To install both
Access and Audit features, see “Editing the default transform (MST) file”
on page 80, for instructions on adding the INSTALLLEVEL property with
a value of 2000 to the Property table of the MST file.
Note If you install the Centrify Common Component before you install
the agent, information about the installation of the agent can be
captured in a log file for troubleshooting purposes.
The following steps describe how to create a new group policy object
for the deployment of the Centrify Agent for Windows:
When you select a folder for the agent installer files, right-click and
select Share with > Specific people to verify that the folder is
shared with Everyone or with appropriate users and groups.
5 Type a name for the new group policy object, for example,
Centrify Agent Deployment, and click OK.
gpupdate /force
After installation, all of the registry settings that were specified in the
MSI and MST files are configured. If you need to further configure
registry settings, use the registry editor or the agent console to do so
as described in “Configuring registry settings” on page 74.
2 Copy the Centrify Agent for Windows files to the Server Core
computer.
For example:
copy D:\Common\Centrify* C:\CentrifyAgent
copy D:\Agent\* C:\CentrifyAgent
3 Install the Centrify Common Component service using the .msi file.
4 Install the Centrify Agent for Windows using the .msi file.
For example, to install the Centrify Agent for Windows with both
access and auditing features enabled on a computer with 64-bit
architecture, you might run the following command:
msiexec /qn /i "Centrify Agent for Windows64.msi" ADDLOCAL=ALL
The group policy extension package has its own .exe and .msi
installer files, so that you can install group policy extensions
interactively through an installation wizard (by executing the .exe file)
or silently from the command line (by executing the .msi file).
Additionally, you can select or de-select the group policy extensions for
installation when you run the Access Manager installation wizard.
For example:
CentrifyDC_GP_Extension-5.2.3-win64.exe
2 Proceed through the setup program until you reach the wizard page
in which to select individual DirectManage Access components to
install.
2 Execute the group policy extension .msi installer file from the
command line.
For example:
CentrifyDC_GP_Extension-5.2.3-win64.msi
2 Proceed through the setup program until you reach the wizard page
in which to select individual DirectManage Access components to
install.
Managing zones
Zones are the key component for organizing access rights and role
assignments for Windows computers. This chapter describes how to
use Access Manager to create zones, manage zone properties, add
Windows computers to selected zones, and move and rename zone
objects.
92
Starting Access Manager for the first time
Before you use Access Manager the first time, you should contact the
Active Directory administrator to determine the appropriate location
for the Licenses and Zones parent containers and whether you have
the appropriate rights for completing this task. The specific
administrative rights required for this task depend on the policies of
your organization and who has permission to create classStore and
parent and child container objects in Active Directory.
• Modify permissions
• Write displayName
property
If you are a domain administrator and use the Setup Wizard to create
the container objects, you should add a security group for Zone
Administrators to Active Directory. Set the following permissions on
the parent Zones container to allow other users to manage zones.
The following instructions illustrate how to run the Setup Wizard from
Access Manager.
6 Type or copy and paste the license key you received, then click Add.
If you received multiple license keys, add each key to the list of
installed licenses, then click Next. If you received license keys in a
text file, click Import to import the keys directly from the file instead
of adding the keys individually, then click Next.
7 Select Create default zone container and specify a location for the
Zones container, then click Next.
The next three pages only apply if you are managing multiple
platforms. For a Windows-only deployment, you can click Next to
leave the following options unselected:
Grant computer accounts in the Computers container
permission to update their own account information.
Register administrative notification handler for Microsoft Active
Directory Users and Computers snap-in.
Activate Centrify profile property pages.
What to do next
If you want to learn more about the importance and benefits of using
zones, see the following topics for additional information:
With hierarchical zones, you define rights and roles in a parent zone so
that those definitions are available in one or more child zones, as
needed. Child zones can also inherit user and group role assignments.
At any point in the zone hierarchy, you can choose to use or override
information from a parent zone.
One or more top-level parent zones that includes all users and
groups.
One to three levels of intermediate child zones based on natural
access control or administrative boundaries.
There are many different approaches you can take to defining the
scope of a zone, including organizing by platform, department,
manager, application, geographical location, or how a computer is
used. The factors that are most likely to affect the zone design,
however, will involve managing access rights and roles and delegating
administrative tasks to the appropriate users and groups.
users can do. For example, all of the computers in the finance
department could be grouped into a single zone called “finance” and
the members of that zone could be restricted to finance employees
and senior managers, each with specific rights, such as permission to
log on locally, access a database, update certain files, or generate
reports.
There are specialized login rights, called system rights. The system
rights for Windows computers are:
Note The Windows Login role grants users the permission to log on
whether they are authenticated by specifying a user name and
password or by using a smart card and personal identification number
(PIN).
Because the Window Login role only allows users to log on, it is often
assigned to users in a parent zone and inherited in child zones.
However, the Window Login role does not override any native
Windows security policies. For example, most domain users are not
allowed to log on to domain controllers. Assigning uses the Windows
Login role does not grant them permission to log on to the domain
controllers. Similarly, if users are required to members of a specific
Windows security group, such as Server Operators or Remote Desktop
Users, to log on to specific computers, the native Windows security
policies take precedence.
There are additional predefined roles that grant specific rights, such as
the Rescue - always permit login role that grants users the “rescue”
right to log on if auditing is required but not available. In general, at
least one user should be assigned this role to ensure an administrator
can log on if the auditing service fails or a computer becomes unstable.
for offices located in Spain but does not have the authority to add
users or groups.
A computer role enables you to link the privileges associated with the
database administrator role assignment, such as permission to backup
and restore or create new tables, with the computers that host the
Oracle databases. You can configure a separate computer role for the
rights required by the users processing payroll on the same set of
computers. The computer role creates the link between users with a
specific role assignment, database administrator or payroll
department, and the computers where that role assignment applies.
You can also use computer roles to specify whether you want session-
level auditing for a group of computers.
Before you can create parent zones, you must have installed Access
Manager and run the Setup Wizard. You should also have a basic zone
design that describes how you are organizing information, for
example, whether you are using one top-level parent zone or more
than one parent zone. There are no other prerequisites for performing
this task.
Only the user who creates a zone has full control over the zone and
can delegate administrative tasks to other users and groups through
the Zone Delegation Wizard. To create new zones, your user account
must be a domain user with the following permissions:
Parent container for new On the Object tab, select Allow to apply the
zones, for example: following permission to this object and all
domain/Centrify/Zones child objects:
Parent container for On the Object tab, select Allow to apply the
Computers in the zone following permission to this object only:
After you are fully deployed, you create new zones infrequently to
address changes to your organization.
2 In the console tree, select Zones and right-click, then click Create
New Zone.
3 Type the zone name and, optionally, a longer description of the zone.
In most cases, you should use the default parent container and
container type that you created when you configured the Active
Directory forest, then click Next.
For zones that include Windows computers, you should always use
the default zone type, which creates the new zone as a hierarchical
zone. For Windows computers, only hierarchical zones are
supported. The only reasons for changing the default other settings
would be if you want to:
Create a zone in a new location to separate administrative activity
for different groups of administrators.
4 Review information about the zone you are creating, then click
Finish.
What to do next
After you create a new parent zone, you might want to create its child
zones.
If you want to learn more about the importance and benefits of using
zones, see the following topics for additional information:
Before you create child zones, you must have installed Access
Manager, run the Setup Wizard to create the Zones container, and
created at least one parent zone. You should also have a basic zone
design that describes the zone hierarchy for the child zone. There are
no other prerequisites for performing this task.
Only the user who creates a zone has full control over the zone and
can delegate administrative tasks to other users and groups through
the Zone Delegation Wizard. To create new child zones, your user
account must be a domain user with the following permissions:
Container for the parent On the Object tab, select Allow to apply the
zones, for example if the following permission to this object and all
parent zone is berlin: child objects:
domain/MyOU/Zones/berlin
• Create Container Objects
Parent container for On the Object tab, select Allow to apply the
Computers in the zone following permission to this object only:
After you are fully deployed, you create new child zones infrequently to
address changes to the scope of ownership and administrative tasks.
2 In the console tree, expand Zones and individual zones to select the
parent zone for the new child zone.
4 Type the zone name and, optionally, a longer description of the zone.
Because this is a child zone, you should use the default parent
container and container type, then click Next.
2 In the console tree, select Zones and right-click, then click Open
Zone.
3 Type all or part of the name of the zone you want to open, then click
Find Now.
4 Select the zone to open from the list of results, then click OK. You
can use the CTRL and SHIFT keys to select multiple zones.
Once you open the zones you want to work with, you should save your
changes when you exit the Access Manager console, so that the open
zones are displayed by default the next time you start the console.
2 Expand the zone hierarchy until you can select the specific zone
name you want to close
3 On the Filter Settings tab, select Load all zones, then select
connected forest to automatically load all zones in the forest or
click Browse to navigate to specific container.
2 Expand Zones to display the list of zones, then expand the zone
hierarchy until you see the zone you want to modify.
4 On the General tab, you can view the location of the zone in Active
Directory and the zone type.
From the General tab, you can make the following changes:
Change the parent zone for a child zone.
Modify the zone description.
Select a specific Licenses container for the zone to use.
Configure the access control list of permissions for the zone.
For example, click Browse to find and select a new zone to use as
the parent of a child zone, then click OK to save the new zone
properties. For Windows computers, only the properties on the
General tab are applicable.
If a child zone inherits role assignments from its parent zone, the
console displays a warning message and prevents you from moving
the zone until you have removed the role assignments. If moving the
zone creates a circular hierarchy, the console prevents you from
moving the zone.
In most cases, each zone should have at least one Active Directory
group that can be delegated to perform all administrative tasks, so that
members of that group can manage their own zone. You are not
required to create or use a zone administrator group for every zone.
However, assigning the management of each zone to a specific user or
group creates a natural separation of duties for administrative tasks.
You can delegate administrative tasks for parent zones, for child zones,
and for individual computers. Because computer-level overrides are
essentially single computer zones, you can assign administrative tasks
to users and groups at the computer level.
To delegate which users and groups have control over the objects in a
zone:
2 Expand Zones to display the list of zones, then expand the zone
hierarchy until you see the specific zone you want to modify.
6 Select one or more accounts from the list of results, then click OK.
7 Repeat Step 4 through Step 6 until you are finished adding users
and groups to which you want to assign the same administrative
tasks, then click Next.
8 Select the tasks you want to delegate to the user or group, then click
Next.
For example, if you want all of the members of the group you
selected in the previous steps to be able perform all administrative
tasks for a zone, select All.
If you want to have individual users deploy the Centrify agent for
Windows on their own computers and join a zone without
administrative rights, you can prepare the zone in advance and let
users know which zone to join. If only domain administrators are
allowed to join computers to zones, you should log on to computers
with the Centrify agent for Windows installed using an account that
has appropriate administrative rights and provide a password.
2 Expand Zones to display the list of zones, then expand the parent
and child zone hierarchy until you see the specific zone to which you
want to add the computer account.
4 Click Find Now to search for and select the computer account to
add to the selected zone.
To change the zone for a computer using Access Manager and Active
Directory properties:
2 Expand Zones to display the list of zones, then expand the zone
hierarchy until you see the specific zone you want to modify.
4 Select the computer that you want to modify, then right-click and
select AD Properties.
6 Click Browse and type all or part of the zone name, then click Find
Now.
7 Select the new zone for the computer from the list of results, then
click OK.
Leaving a zone
You can remove a computer from a zone at any time. Users who have
administrative privileges can leave the current zone on their local
computer using the DirectAuthorize Agent Control Panel. You can also
remove the zone information for a computer from Access Manager by
deleting the computer from its current zone. Leaving the zone does
not remove the computer object from Active Directory.
2 Expand Zones to display the list of zones, then expand the zone
hierarchy until you see the specific zone you want to modify.
4 Select the computer that you want to remove from the zone, right-
click, then select Delete.
5 Click Yes to confirm the removal of the computer from the zone.
Renaming a zone
You can rename a zone at any time. For example, if your organization
changes how business units are aligned, moves to a new location, or
merges with another organization, you might want to update zone
names and descriptions to reflect these changes. You might also want
to rename zones if your initial deployment did not use a naming
convention for new zones, and you want to implement one after you
have agents deployed.
Before you rename zones, you might want to define and document a
naming convention to use for future zones or the reasons for changing
the zone name. You should also identify the computers in the zone to
be renamed. You do not need to restart the agent on Windows
computers for the new zone name to be recognized. However, you
might need to perform other administrative tasks—such as changing
role assignments—after renaming a zone. There are no other
prerequisites for performing this task.
To rename a zone, your user account must be set with the following
permissions:
Parent container for an Click the Properties tab and select Allow to
individual zone apply the following properties to this object
only:
For example, a ZoneName
container object, such as: • Write Description
domain/Zones/arcade
• Write name
• Write Name
These are the minimum permissions required
to rename a zone and not allow a user or
group to modify any other zone properties.
You can set permissions manually, or
automatically grant these and other
permissions to specific users or groups by
selecting the Change zone properties task in
the Zone Delegation Wizard.
After you are deployed, you rename zones only when you need to
address organizational changes or to implement or improve the
naming conventions you use.
2 Expand Zones to display the list of zones, then expand any child
zones in the zone hierarchy until you see the specific zone you want
to modify.
4 Type the new name and, if needed, any changes to the zone
description.
Depending on the rights associated with the role you are using, you
can use the tools on the managed computer to open new desktops,
run individual applications with elevated privileges, connect to services
on remote computers, join or change the zone for a computer, set the
level of detail to record in log files, generate diagnostic information for
the agent, and view detailed information about your own or other
users’ effective rights and roles.
To use the agent control panel to select the zone for a local computer:
2 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAuthorize.
3 Click Change.
4 Click Browse, type all or part of the zone name, and click Find Now
to search for the zone.
5 Select the new zone in the search results, click OK, then click OK to
return to the agent control panel General tab.
You can also use the agent control panel to set logging level, view logs,
and get diagnostic information about agent operations. For more
information about using the agent control panel to configure logging
and get diagnostic information, see “Troubleshooting and common
questions” on page 223.
If you allow users to join their own computers to a zone, you should
notify them of the zone to use and see that they have access to the
Centrify Server Suite User’s Guide for Windows.
117
Basics of authorization and access rights
In most cases, you can assign the Windows Login role to all local
Windows users, all Active Directory users, or both, to allow users to log
on locally or remotely. However, the system rights in the Windows
Login role do not override any native Windows security policies. For
example, most domain users are not allowed to log on locally on
domain controllers. Depending on how your organization has
configured native Windows security policies, users might need to be
members of a specific Windows security group, such as
Server Operators or Remote Desktop Users, to log on to specific
computers locally or remotely.
In addition to the system rights that specify whether a user can log on
locally or remotely, you can use the Rescue rights setting to specify
that users in a particular role should always be allowed to log on to a
computer. This option is intended as a “safety net” for “emergency”
situations when users would normally be locked out. For example, if
auditing is required for a role, but the agent is not running or has been
removed, users are not allowed to log on. You can use the rescue
rights option to allow selected administrative users access to
computers when they would otherwise be locked out and prevented
from logging on. Because this option allows unaudited activity, you
should strictly limit its use.
Note If you do not explicitly set the Rescue rights option for any users,
only the local administrator and the domain administrator accounts will
have rescue rights. Those accounts are always allowed to log on by
default.
You can configure rights, role definitions, and role assignments in any
parent or child zone. In most cases, you define rights and roles in a
parent zone and make role assignments in a child zone.
You can add any or all of these predefined rights to any zone so they
are available to include in role definitions. Alternatively, you can add
predefined rights to individual role definitions without adding them to
zones. In either case, you create the predefined rights in the context of
a role definition.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define a predefined right.
5 Select a type of right if you want to filter the list of rights displayed.
7 Select the specific predefined rights you want created in the zone
you selected in Step 2 from the list of available rights, then click OK.
By default, all of the selected predefined rights are added to the role
definition in the zone. You can deselect any of the rights you don’t
want added to the role definition.
You can click Refresh in Access Manager to see the predefined rights
listed as Windows application rights.
2 Select Properties.
3 Click the Run As tab and select Re-authenticate current user and
Require multi-factor authentication.
Note Before defining this right, you should be aware that multi-
factor authentication for Centrify-managed Windows computers
relies on the infrastructure provided by the Centrify identity
platform and the cloud-based Centrify identity service.
4 Click OK.
Users who are assigned to a role with desktop rights can switch from
their default desktop to a desktop with elevated privileges to perform
administrative tasks. For example, if assigned to a role that has a
desktop right, a user can create a new desktop and switch to it when
he needs perform administrative tasks such as install new software or
stop running services on the local computer account. The user can
perform these tasks without having to enter the service account or
Administrator password.
Users who are assigned a role with desktop rights can also select any
application on the computer, right-click, and run the application using
a selected role. The difference between the desktop right and an
application right is that the desktop right allows the user to run any
Desktop rights are useful for users who frequently perform tasks that
require the privileges associated with the Administrator account.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define a desktop right.
5 On the General tab, type a name and a description for the desktop
right.
You can browse for and select a specific group that will allow the
you to log on with your own credentials but with the elevated
privileges of the specified group. Click Add AD Groups or Add Built-
in Groups to search for and select a previously-defined or Built-in
group with the privileges you want to add to the logged in user’s
account.
If you select this option for users who are authenticated using a
smart card, users must enter a personal identification number (PIN)
or a password to resume working with the desktop.
You can specify the path and file name of an application executable
file. You can perform this operation in two ways:
Manually, by typing or pasting the path and file name into an
application right definition form. Specifying files manually is
recommended only if you need to include a small number of files
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define an application right.
6 Click the Match Criteria tab and use it to create or edit application
definitions. Each application definition specifies one application or
a group of applications. The set of application definitions displayed
in the Match Criteria tab defines the set of applications that can be
run by this application right.
In the Match Criteria tab, click Add to create a new application
definition.
The Definition Settings dialog appears.
• .bat
• .cmd
• .com
• .cpl
• .exe
• .msc
• .msi
• .msp
• .ps1
• .vbs
• .wsf
• NT AUTHORITY\SYSTEM
• DEMO\Ed.Admin (this is an AD user
account)
13 Click the Run As tab and select the account that has the privileges
you want to enable for this application right.
You can browse for and select a specific user account or have the
application run using the logged in user’s account credentials but
with the elevated privileges of a specified group. Click Add AD
Groups or Add Built-in Groups to search for and select a
previously-defined or Built-in group with the privileges you want to
add to the logged in user’s account.
If you select this option for users who are authenticated using a
smart card, users must enter a personal identification number (PIN)
or a password to resume working with the application.
Application Manager
When you assign workstation users a role with the predefined right
Centrify Utility - Windows Feature Manager, they will be able to
access the normal Windows Feature Manager, where they can choose
what Windows features to add or remove.
When you assign server users a role with this right, the Centrify
Windows Feature Manager will launch. This utility is similar to the
normal Windows utility, with a few notable differences.
Opening the Centrify utility will launch a wizard. When you select
whether to add or remove roles and features on the first screen of the
wizard, you can only perform one action at a time. For example, if you
choose Add roles and features, you will not be able remove any
installed features until you go back to the initial screen and choose
Remove roles and features.
Notice that:
The File Type field is set to .exe.
The Path option is selected, and the file name and path name are
filled in.
Most fields in the File details section are filled in, but none are
selected.
The settings shown in this example specify that only the
Mmc_config.exe file located in C:\Program
Files\Centrify\DirectManage Access Manager is included
in the application right. The information in the File details section
is not used because no options in that section have been selected.
5 Select the File Description option and keep the default operator
and string.
6 Select the Product Version option and change the operator from
equal to later or equal.
The definition is now configured to include all .exe files having a file
description tag of SSMS - SQL Server Management Studio and a
product version later than or equal to the version that is installed on
this Windows 2008 system.
7 In the Description field, either keep the string that was imported
with the Ssms.exe file or type a description of your choice.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define an application right.
5 On the General tab, type a name and a description for the network
access right.
6 Click the Access tab to select the account that has the privileges you
want to enable for accessing the remote computer.
You can browse for and select a specific user account, create a new
account, or access the remote computer using the logged-in user’s
account credentials but with the elevated privileges of a specified
group account. Click Add AD Groups or Add Built-in Groups to
search for and select a previously-defined or Built-in group with the
privileges you want to add to the logged in user’s account.
If you select this option for users who are authenticated using a
smart card, users must enter a personal identification number (PIN)
or a password to resume working with the remote server.
To create a new role definition for a job function, you need to do the
following:
In most cases, creating a separate role definition for each access right
gives you the most granular control over what users assigned to a role
can do. For example, if you create separate role definitions for desktop,
application, and network access rights, you can choose which apply to
specific users and groups through role assignments.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define a new role that includes a desktop
right.
The description can include details about time restrictions for the
role and whether the role is audited or not.
If you do not select this option, only Active Directory domain users
can be assigned to the role.
7 Click Available Times and use the grid to specify when to allow or
deny access for this role definition if you want to restrict when this
role is available.
8 Click the System Rights tab and select Console login is allowed to
allow users in the role to log on locally.
To use the desktop right, the user must be able to log on locally on
the computer. If you want to allow users to log on using a remote
desktop connection, you can also select Remote login is allowed.
Note Remote computers must be configured to allow remote
desktop connections for the “Remote login is allowed” right to be
valid. You can configure a computer to allow remote desktop
connections by right-clicking Computer and selecting Properties or
from the System Control Panel, then clicking Remote settings.
Users must be assigned to at least one role with either console login
or remote login rights to access any computers where the Centrify
Agent for Windows is installed. You can grant access using the
Windows Login role definition or the system rights in any custom
role definition.
If you want to allow users to log on even when the Windows agent
isn’t running or when auditing is required but not available, you can
select the rescue right. Because this right allows users to log on
without having their activity audited, you should only assign roles
with this right to trusted administrators or under controlled
conditions. For example, assume you have a computer with
sensitive information that normally requires all user activity to be
audited. If that computer has application or operating system
issues that require you to disable auditing temporarily, you can use
a role with the rescue right to log on to that computer to diagnosis
and fix the issue.
11 Select the role definition, right-click, then click Add Right to add a
desktop right to the role definition.
12 Select the desktop right from the list of rights from the current zone
and from any parent zones, then click OK to add the right to the role
definition.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define a new role that includes an
application right.
The description can include details about time restrictions for the
role and whether the role is audited or not.
6 Click Available Times and use the grid to specify when to allow or
deny access for this role definition if you want to restrict when this
role is available.
7 Click the System Rights tab and select Console login is allowed to
allow users in the role to log on locally.
To use the Run as selected role utility and an application right, the
user must be able to log on locally on the computer where the
application runs. If you want to allow users to log on using a remote
desktop connection, you can also select Remote login is allowed.
Users must be assigned to at least one role with either console login
or remote login rights to access any computers where the Centrify
Agent for Windows is installed. You can grant access using the
Windows Login role definition or the system rights in any custom
role definition.
10 Select the role definition, right-click, then click Add Right to add the
application right to the role definition.
11 Select the application right from the list of rights from the current
zone and from any parent zones, then click OK to add the right to
the role definition.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to define a new role that includes an network
access right.
The description can include details about time restrictions for the
role and whether the role is audited or not.
6 Click Available Times and use the grid to specify when to allow or
deny access for this role definition if you want to restrict when this
role is available.
7 Click the System Rights tab and select Remote login is allowed to
allow users in the role to connect to services on the remote
computer.
Users must be assigned to at least one role with either console login
or remote login rights to access any computers where the Centrify
Agent for Windows is installed. You can grant access using the
Windows Login role definition or the system rights in any custom
role definition.
10 Select the role definition, right-click, then click Add Right to add a
network access right to the role definition.
11 Select the network access right from the list of rights from the
current zone and from any parent zones, then click OK to add the
right to the role definition.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to make role assignments.
3 Expand Authorization.
5 Select the role definition from the list of roles, then click OK.
By default, the role is set to start immediately and never expire. You
can set a Start time, End time, or both start and end times for the
role assignment. For example, if the role applies to a contractor who
will be hired for a specific amount of time and you want to
automatically disable the role after they finish the job and leave the
organization, you can specify the start and end times when you
assign the role.
Rights, roles, and role assignments are all inherited from parent to
child zones, so generally there is no need to import or export roles
within a zone hierarchy, but you may want to do so across zones. For
example, if you have set up separate parent zones for different lines of
business or different functional groups in your organization, you might
want to import rights and roles from one business unit or functional
group to another.
2 Expand Zones and the parent zone or child zones until you see the
zone that has the rights and roles you want to export.
5 Click Browse to specify a location and file name for the export file,
then click Next.
Before you begin, be certain you have saved rights and role definitions
from a different zone and know the location of the xml file in which
they are saved.
2 Expand Zones and the parent zone or child zones until you see the
zone into which you want to import rights and roles.
2 Expand Zones and the parent zone or child zones until you see the
zone that has the rights, role definitions, or role assignments you
want to copy.
2 Expand Zones and the parent zone or child zones until you see the
zone that has the user of interest.
4 Select a user to see information for the user in the selected zone or
click Browse to select a specific computer in the zone if you only
want to view user rights for a particular computer in the selected
zone.
6 Click Close when you are finished reviewing user rights in a zone or
on particular computers.
To use a role with network access rights, you cannot log on using a
local user account. You must use a domain user account
authenticated using Active Directory.
6 In his list of available roles, Josh selects his gpedit role, then clicks
OK.
1 Install the Centrify Agent for Windows on the domain controller, the
computer that hosts the SQL Server instance, and the computer
Maya.Santiago uses to manage the SQL Server instance.
5 Maya clicks Advanced View to see the list of available roles and
selects SideBet-DC-Admin as the local role that enables her to run
local applications with administrator privileges.
6 Maya then clicks the Select one or more network roles option and
selects the SideBet-DC-Admin role for remote access to the
domain controller and the SQL-DB-Default role for remote access
to the database server, then clicks OK.
After she clicks OK, SQL Server Management Studio starts and she
connects to the remote SQL Server instance using Windows
authentication. The change to a role with privileges is recorded in
the local Windows Application event log.
8 When she is done working, she closes the application and returns to
her default desktop and her login account privileges.
If you want to use a specific user account for an application that uses
the Data Protection API, you must install the Centrify Agent for
Windows on both the domain controller and the computer where the
application using DPAPI is installed. You must also make sure the
domain controller is in a zone where users who are going to use the
application are granted network access rights. In this scenario, the
domain controller must be able to confirm the identity of the specific
user account to allow protected information to be decrypted.
Using a computer role, you can associate the group of computers that
host an Oracle database with a specific role assignment, for example,
users who are assigned the oracle-dba role. The oracle-dba role
definition might include desktop and network access rights because
the users assigned to the oracle-dba role require administrative
privileges.
You could also create a second computer role that associates the
group of computers that host the payroll processing application with a
group of users who are allowed to log on and update payroll records
You can also create the computer group and add its members directly
from Access Manager when you create the computer role. If you are
not preparing the Active Directory group before creating the computer
role, you can skip this section and go directly to “Create a new
computer role” on page 169.
5 Search for and select the computers that you have identified as
Oracle database servers as members of the new group, then click
OK.
4 Search for and select the users that you have identified as members
of the each group, then click OK.
exist. For this sample scenario, you might create role definitions similar
to the following:
2 Expand Zones and the parent zone or child zones until you see the
zone that has the computer for which you want to define a
computer role.
Select <Create group > if you want to create a new Active Directory
group of computers and add members now. If you are creating a
1 Expand the computer role you just created, for example, expand
OracleServers.
3 Select the role definition from the list of roles, then click OK.
5 Repeat Step 1 through Step 4 for each group that you want to add
to this computer role. For example, repeat the steps to assign the
Oracle_AppUsers role to the OracleServers_Role_AppUsers
security group and the Oracle_Backup role to the
OracleServers_Role_Backup security group.
2 Expand Zones and the parent zone or child zones until you see the
zone where you want to make role assignments.
4 Type the user and group names you want to be included in the role
assignment, then click OK.
6 Select a role for the list of roles available, then click OK.
7 Review the role assignment start and end time and the user and
group accounts that are being assigned the role, then click OK.
You can make changes to the start and end times if you want those
changes applied for all of the users, groups, and computers that are
part of this bulk role assignment.
After you click OK, the selected users and groups are then
automatically assigned the selected role on the selected computers.
If more than one user name is found, select the appropriate user
from the results, then click OK.
Which Server Suite capabilities are and are not persisted by the
cache when a computer is disconnected from a domain controller.
Where the cache resides.
How and when to perform cache operations such as refreshing,
flushing, and dumping.
Persisted capabilities
Non-persisted capabilities
Cache location
The cache resides in
SYSTEMDRIVE\ProgramData\Centrify\DirectAuthorize\Cache.
As administrator, you can refresh the cache from the user interface or
from the command line. Refreshing the cache updates the cache with
fresh information from Active Directory, ensuring that the agent has
the most up-to-date information about users’ current rights and roles.
Notes
dzrefresh
Execute the dzflush command line utility to flush (clear) the cache.
Flushing the cache removes all cache data and reloads it from Active
Directory. You should flush the cache only when directed to do so by
Centrify Support. Under most circumstances, you should refresh the
cache rather than flush the cache.
dzflush
Background dialog box displays the settings in the group policy and
users cannot modify the settings, thereafter.
2 Specify the class, category, policy name, and other settings for the
policy.
You can define this policy as a user or machine group policy. The
purpose of the .adm file is to create registry key entries with name/
value pairs that specify the background color or wallpaper image to
use for any role in a zone that you want to customize. You can use
the group policy to specify values for following registry keys:
RoleId_Color specifies the color name or the Red-Green-Blue
value of the color to use (REG_SZ). This value is empty if wallpaper
is used and position is not Center.
RoleId_Wallpaper specifies the file path to the image you want
used as wallpaper (REG_SZ). This value is empty if a desktop color
is used.
RoleId_Position specifies a value of Stretch, Tile, or Center if
wallpaper is used (REG_SZ). This value is empty if a desktop color
is used.
For example, you might create a simple .adm file that displays a list
box for you to type the name/value pairs:
CLASS USER
CATEGORY !!DzWin
CATEGORY !!desktopCustomization
POLICY !!desktopCustomizationPolicy
KEYNAME
Software\Policies\Centrify\DirectAuthorize\Desktop\Background
#if version > 4
SUPPORTED !!mySupported
#endif
PART !!addCustomization LISTBOX EXPLICITVALUE
END PART
EXPLAIN !!DzWinDesktopCustomizationMachineExplain
END POLICY
END CATEGORY
END CATEGORY
[strings]
DzWin="Centrify DirectAuthorize Settings"
desktopCustomization="Desktop"
desktopCustomizationPolicy="Customize desktop background"
mySupported=""Windows Server 2003 and above only"
addCustomization="Add customization settings for different
desktop roles with the appropriate name and value pairs:"
DzWinDesktopCustomizationMachineExplain="This policy sets the
desktop background color or wallpaper for the specified roles”
3 Add the .adm file to the Group Policy Object Editor and navigate to
the Customize desktop background policy.
Note that the path to a wallpaper image should use the Universal
Naming Convention (UNC) format. If you specify “center” as the
position for the wallpaper image, you can also specify a background
color. For example, you could add another name/value pair for the
p4admins role in the sanfrancisco zone to specify a background
color:
p4admins/sanfrancico_color 24 168 90
If you rename a role or a zone, you must also modify the group policy
to use the new names or lose the standardized desktop background
you have defined.
2 Expand the forest and domains to select the Default Domain Policy
object.
181
Configuring selective auditing
When you enable this group policy, only the users you specify in the
policy are audited. If this policy is not configured, all users are
audited.
6 Select the Non-audited user list to identify specific users that should
not be audited.
When you enable this group policy, only the users you specify are
not audited. If this policy is not configured, all users are audited. If
you enable both the Audited user list and the Non-audited user list
policies, the users you include in the Non-audited user list take
precedence over the Audited user list.
The following table details the effect of configuring and enabling the
Audited user list and Non-audited user list group policies, and
including or not including Windows users in those lists.
Not configured Not configured No users are defined for either policy, so
all users accessing audited computers
are audited.
Not configured Enabled Only the users you specify in the Audited
user list policy are audited.
If no users are specified when the policy
is enabled, no users are audited.
Not configured Enabled Only AUL is enabled, but user is not listed
in it.
4 Click the browse button to locate and select a text file that contains
the message you want to display.
6 Click OK or Apply.
Users will see the notification message the next time they log in.
You identify a set of sessions by specifying criteria you want to use, for
example, all sessions from a particular audited computer, associated
with a specific application, or recorded during a specific period of time.
You create and assign users and groups to audit roles using the Audit
Manager console. You create the audit roles by right-clicking on the
Audit Roles node. You add users and groups to an audit role by right-
clicking on the specific role name.
For example, an audit team leader might define the following audit
roles to control what different team members can do:
A role named Windows Session Viewer for first level reviewers with
a target of Windows sessions and only the right to Read session
information. The members of the First Review group who are
assigned to the Windows Session Viewer audit role can read, but
not delete, replay or update the status of Windows sessions in the
installation.
A role named Incident Escalation for security managers with a
target of Windows sessions from the last 72 hours, and permission
to Read, Replay, and Update Status for the targeted session. The
members of the Security group who are assigned to the Incident
Escalation audit role can read, replay, and update the review status
of Windows sessions from the previous 72 hours, but not delete
any of the sessions they have reviewed.
3 Type a name and description for the new audit role, then click Next.
After you click Add, select an attribute and the appropriate criteria,
then click OK. For example, if you select Time, you can then select
specific date range or a period of time, such as the past 24 hours or
this year.
8 Select the rights to allow for this role, then click Next.
By default, the Assign Users and Groups to the Audit Role option is
selected so that you can immediately begin populating the new
audit role.
If there’s more than one name that matches the criteria you specify,
select the appropriate name from the names found, then click OK.
A user or group can be a member of more than one audit role.
However, one of the permissions you can delegate to other users and
groups is the Manage Audit Role permission. With this permission,
selected trustees can create, modify, and delete audit roles. For more
information about delegating administrative tasks, see “Setting
administrative permissions” on page 197.
Auditing only
If you have only enabled auditing on a computer and defined access
roles:
stopped for any reason, the user will only be allowed to log on if
also assigned a role with a rescue system right.
Users will be able to log on if they are assigned to a role with the
audit if possible option is set. If the auditing service is active and
you have enabled video capture auditing, both audit trail events
and user activity are captured. For example, the agent records
successful and failed logons and user activity when users change
from one role to another. If auditing service is not enabled or not
currently active, the agent does not capture a video record of all
user activity.
Users will be able to log on if they are assigned to a role that does
not require auditing. In this case, only audit trail events are
captured.
Auditors will be able to review user activity associated with specific
roles on these computers, and you can define audit roles to control
who has access to the captured user sessions based on the criteria
you specify.
Securing an installation
Setting administrative permissions
Managing audit stores
Managing audit store databases
Managing the management database
Managing collectors
Managing audited computers and agents
Adding an installation
Removing or deleting an installation
Securing an installation
For production deployments, you can take the following steps to
secure a DirectManage Audit installation:
191
Securing an installation
Before you can follow these steps to secure an installation, you must
have access to an Active Directory user account with permission to
create Active Directory security groups, enable group policies, and edit
Group Policy Objects.
2 Expand the forest and domain to select the Default Domain Policy
object.
7 Click Browse to select the installation you want to secure, then click
OK.
3 Select the audit store you want to secure, right-click, then select
Properties.
6 Select a domain, click OK, then search for and select the collectors
to trust and click OK to add the selected computers to the list.
Only the collectors you add to the trusted list are allowed to connect
to the audit store database. All other collectors are considered
untrusted and cannot write to the audit store database.
8 Select a domain, click OK, then search for and select the audited
computers to trust and click OK to add the selected computers to
the list.
Only the audited computers you add to the trusted list are allowed
to connect to the trusted collectors. All other computers are
considered untrusted and cannot send audit data to trusted
collectors.
Between an audited computer and the spooler that stores the data
locally when no collectors are available, audit data is not
encrypted. Only the local Administrator account can access the
data by default.
Between the audited computer’s data collection service (wdad) and
the collector, data is secured using Generic Security Services
Application Program Interface (GSSAPI) with Kerberos encryption.
Between the collector and the audit store database, data can be
secured using Secure Socket Layer (SSL) connections and ARC4
(Windows 2003) or AES (Windows 2008) encryption if the database
is configured to use SSL connections.
Between the audit store and management databases, data can be
secured using Secure Socket Layer (SSL) connections and ARC4
(Windows 2003) or AES (Windows 2008) encryption if the database
is configured to use SSL connections.
Between the management database and the Audit Manager
console, data can be secured using Secure Socket Layer (SSL)
connections and ARC4 (Windows 2003) or AES (Windows 2008)
encryption if the database is configured to use SSL connections.
http://support.microsoft.com/kb/316898
4 On the Flags tab, select Yes for the Force Encryption option, then
click OK to save the setting.
When you install Microsoft SQL Server, you specify whether to use
Windows authentication or a mix of Windows and SQL Server
authentication. You also specify the accounts that the database
services should use. By default, system accounts are used. If SQL
Server uses a domain user account instead of a system account, you
should ensure that the account has permission to update the SQL
Server computer object in Active Directory. If the account has
permission to update the computer where SQL Server is running, SQL
Server can publish its service principal name (SPN) automatically.
Getting the correct service principal name is important because
Windows authentication relies on the SPN to find services and
DirectManage Audit uses Windows authentication for console-to-audit
management database connections. If the SPN is not found, the
connection between the console and audit management database
fails.
3 Click the Security tab to delegate administrative tasks for the entire
installation.
5 Select a user or group listed, then select the appropriate rights for
that trustee, then click OK.
You can also delegate administrative tasks for individual audit stores
and management databases, and set permissions on audit roles. For
information about delegating administrative tasks for audit stores, see
“Configuring permissions for an audit store” on page 201. For
information about delegating administrative tasks for management
databases, see “Configuring permissions for the management
database” on page 213.
2 Expand the installation node, then expand Audit Stores and select a
specific audit store name.
5 Click Add Site to select an Active Directory site from the list of sites
found or click Add Subnet to type a specific subnet address and
mask.
2 Expand the installation node, then expand Audit Stores and select a
specific audit store name.
6 Select a user or group listed, then select the appropriate rights for
that trustee, then click OK.
Manage SQL • Set the allowed incoming collectors for this audit
Logins store’s databases.
session activity, login and role change events, and other information.
As part of managing an installation, you must manage these databases
to prevent overloading any one database and to avoid corrupting or
losing data that you want to keep.
Reserve 4GB from the first 16GB of RAM and then 1GB from each
additional 8GB of RAM for the operating system and other
applications.
Configure the remaining memory as the maximum server memory
allocated for the Microsoft SQL Server buffer pool.
http://msdn.microsoft.com/en-us/library/ms178067(v=sql.105).aspx
You should configure the maximum memory allowed for the Microsoft
SQL Server instances hosting audit store databases and the
management database. However, this setting is especially important to
configure on the Microsoft SQL Server instance hosting the active audit
store database.
From the information you collect in the pilot deployment and the data
retention policy for your organization, you can estimate the database
size using the following guideline:
active database. As you begin collecting audit data, you might want to
add databases to the audit store to support a rolling data retention
policy and to prevent any one database from becoming a bottleneck
and degrading performance.
Only one database can be the active database in an audit store at any
given time. The computer hosting the active database should be
optimized for read/write performance. As you add databases, you can
change the older database from active to attached. Attached
databases are only used for querying stored information and can use
lower cost storage options.
Database operations take very little time when you work with
multiple small databases.
Database archiving
To implement periodic archiving, add a new active database, leave one
or more previous databases attached, and take the oldest database
off-line for archiving.
Database backups
You can back up a database whether it is attached to the audit store or
detached from the audit store.
2 Expand the installation node, then expand Audit Stores and select a
specific audit store name.
4 Click Add Site to select an Active Directory site from the list of sites
found or click Add Subnet to type a specific subnet address and
mask.
3 Click Properties.
6 Select a user or group listed, then select the appropriate rights for
that trustee, then click OK.
Managing collectors
You can view information about the collectors you have deployed in
the Audit Manager console. For example, for each collector, you can
see the location of the collector on the network, whether the collector
is connected to or disconnected from the audit store, and how long a
connected collector has been running since it was last restarted, the
audit store to which the collector is assigned, and the active database
to which the collector is currently sending audit data. You can also see
the audited computers that currently connected to each collector and
the audited computers that are not currently connected to this
collector.
2 Click Start > All Programs > Centrify Server Suite 2017 > Audit >
Collector Control Panel.
The General tab also displays current configuration and status for
the local collector service. If you make changes, the new
information is displayed after a short period of time.
the Active Directory site or subnets associated with the audit store
the collector connects to, the collector status, and other
information. For example:
6 Click Options to specify the level of detail to include in the log file or
to turn off logging.
Removing collectors
If you want to remove a collector, you can use the Programs and
Features > Uninstall a program control panel or the setup program
you used to install the collector.
If you run the setup program, select the collector from the list of
components, then click Next. Because a collector is installed, the
wizard prompts you the Change, Repair or Remove the collector. Click
Remove.
2 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAudit.
The General tab also displays current configuration and status for
the local agent. If you make changes to the configuration, the new
information is displayed after a short period of time. If the agent
cannot connect to any collector, it spools audit data to the offline
data location. When it finds a collector, the agent sends the spooled
data to it. The offline storage space is not reclaimed until all of the
spooled data has been sent to a collector.
5 Click Options to specify the level of detail to include in the log file or
to turn off logging.
2 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAudit.
3 Click Configure.
4 Select the maximum color quality for recorded sessions, then click
Next.
Adding an installation
Although a single installation is the most common deployment
scenario, you can configure multiple installations. For example, you
can use separate installations to provide concurrent production and
test-bed deployments or to support multiple administrative domains
within your organization.
The steps are the same as the first installation. For more
information, see “Create a new installation” on page 56.
5 Choose the appropriate installation for each agent using the Agent
Configuration wizard.
Closing an installation
The Audit Manager console allows you to manage multiple
installations. To remove the current installation from the console, but
not physically remove the database or the information published to
Active Directory, you can select the installation name, right-click, then
select Close.
Run the setup program to remove all agents and collectors and
collector service connection points (SCPs).
Detach and remove all audit store databases.
Open the Installation Properties and click the Publications tab to
make sure only one installation service connection point (SCP) is
listed.
Note To remove service connection points on other sites, contact
an administrator with publication permission on those sites.
This chapter describes how to find log files, set the level of detail
recorded in log files, and use diagnostic tools to retrieve information
about the operation of DirectManage Access and DirectManage Audit.
This chapter also covers common questions to help you identify and
correct problems on the computers you manage.
223
Solving problems with logging on
If users report problems logging on, there are some things you can try
to troubleshoot the issue:
You can check whether the selected role includes network access rights
using the Authorization Center. If the role being used does not include
network access rights, check whether the user has additional network
roles available to use in conjunction with the local role. If the role being
used includes network access rights, you should check whether those
rights are applicable on the network computer the user is attempting
to manage. Users must be assigned to the role that has network access
rights on the remote server.
You can refresh the cache using DirectAuthorize Agent Control Panel or
the dzrefresh command line program in a Command Prompt
window if you have the appropriate permissions.
Note When you run the Analyze command, only the zones that are
open are checked.
3 Select the types of checks you want to perform, then click Next to
generate the report.
5 If the result summary indicates any issues, you can view the details
by selecting Analysis Results in the console tree and viewing the
information listed in the right pane. For example:
The most likely reasons for data integrity issues stem from:
Multiple administrators performing concurrent operations.
Administrators using different domain controllers to perform a
single operation.
Replication delays that allow duplicate or conflicting information to
be saved in Active Directory.
Insufficient permissions that prevent an operation from being
successfully completed.
Network problems that prevent an operation from being
successfully completed.
Partial or incomplete upgrades that result in inconsistency of the
information stored in Active Directory.
Using scripts or ADSI Edit rather than the console to create, modify,
or delete objects in Active Directory, which may lead to corrupted
or invalid information.
2 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel, then select DirectAuthorize to see
information about the authorization service or DirectAudit to see
information about the auditing service.
Logon information:
Logon ID (0x9ba99)
Logon GUID: 38407dd1-0165-458e-b45d-686a07e87805
Base Logon ID: (0x77163)
Base SAM Name: PISTOLAS\lisa.gunn
ElevatedAccount: (ElevatedSelfAccount,
AdditionalGroups=(count=1, items=(S-1-5-32-544)))
Local Role: SQL-DBA/Headquarters
Network Roles: None
Done.
6 Click View Log to display the current log file for the local agent.
7 Click Options to see or change the location of the log file or the level
of detail recorded in the log file.
2 Click Start > All Programs > Centrify Server Suite 2017 > Agent for
Windows Control Panel > DirectAudit to open the DirectAudit Agent
Control Panel.
From the log file window, you can also click File > Save As to save the
log file.
8 Send an email to Centrify Support with the log file from the location
specified in Step 5 as an attachment.
2 Click Start > All Programs > Centrify Server Suite 2017 > Audit >
Collector Control Panel to open the Collector Control Panel.
From the log file window, you can also click File > Save As to save the
log file.
8 Send an email to Centrify Support with the log file from the location
specified in Step 5 as an attachment.
2 Click Start > All Programs > Centrify Server Suite 2017 > Audit > Audit
Manager to open the Audit Manager console.
6 Send an email to Centrify Support with the log file from the location
specified in Step 5 as an attachment.
2 Click Start > All Programs > Centrify Server Suite 2017 > Audit > Audit
Analyzer to open the Audit Analyzer console.
6 Send an email to Centrify Support with the log file from the location
specified in Step 5 as an attachment.
5 Click OK, then perform the database actions for which you want to
capture information.
5 Click Export to save the database trace from the selected databases
to a file with comma-separated values (.csv).
1 Select a start date and time for the From filter and an end date and
time for the To filter, then click Next.
2 Click Add to search for and select users, then click Next.
By default, you can search for users in the entire directory, you can
click Object Types or Locations to change the scope of the search
scope, or click Advanced specify other criteria.
1 Select a start date and time for the From filter and an end date and
time for the To filter, then click Next.
2 Click Add to search for and select collectors, then click Next.
By default, you can search for computers in the entire directory, you
can click Object Types or Locations to change the scope of the
search scope, or click Advanced specify other criteria.
You can also override domain group policy and configure local or
category-specific audit trail targets using a local administrative
template or group policy.
6 Specify the location for saving audit trail events, and then click OK:
0 to disable audit trail events
1 to store audit trail events in the audit store
2 to send audit trail events to the Windows event Application log
3 to sent audit trail events to both the audit store and the
Application log.
To configure per-category audit trail targets using a local group policy from
an XML template:
Note These settings override the settings defined in the Set global audit
trail targets group policy.
1 Ensure that the Centrify Audit Trail Settings were updated with the
most recent XML template.
Additional audit trail events for Access Manager, Audit Analyzer, Audit
Manager, and UNIX commands can be recorded in the target you
specify for the audit trail. The event message provides detailed
information about the operation performed or unsuccessfully
attempted, including in most cases the reason the operation was
unsuccessfully.
Managing licenses
This chapter describes how to update and manage license keys for
servers, workstations, and supported applications.
Licensing overview
Adding license containers
Assigning a specific license container to a zone
Viewing the license summary
Adding access license keys
Removing access license keys
Adding audit licenses
Licensing overview
Licensing is based on the number of computers you authorize for
access management or auditing. Any time you open a DirectManage
Access or Audit console, the console checks in the background for
license keys you have installed to verify that there are enough licenses
for all computers you are managing or auditing. With this licensing
enforcement model, license validation does not affect the operation of
the computers being managed or audited. If the number of licensed
servers and workstations exceeds the total number of licenses you
have purchased, you are prompted to add license keys for the
additional computers.
240
Licensing overview
5 Browse to select a location for the new license container, then click
Create.
you give the Modify License permission to can then add license keys
to the new license container.
5 On the General tab, select a specific Licenses container from the list
of available License containers for the zone to use, then click OK.
7 Click the Summary tab to view the installed licenses. Note that
license keys are Licensed, that is, available to be used, until you
begin adding computers to the domain.
8 Click OK.
The new license will appear in the Update area of the Licenses
dialog box.
Using dzinfo
Using dzjoin
Using dzdiag
Using dzrefresh
Using dzflush
Using dzdump
Using runasrole
Using dzinfo
The dzinfo command line program provides detailed information
about the effective rights, role definitions, and role assignments for a
specified user. The command output includes all of the same
information that you can view using the Authorization Center as
described in “Using the Authorization Center directly on managed
computers” on page 172. However, using dzinfo as a command line
utility allows you to view and capture all of the output from the
command in a single window, which you can then save as a text file for
troubleshooting and analysis or in reports.
248
Using dzinfo
The command returns detailed information about the rights, roles, and
role assignments for the specified user (richl in the AJAX domain)
similar to the following:
Windows Login/global
Zone:
CN=global,CN=Zones,OU=Centrify,DC=ajax,DC=org
Status: Active
Effective: Immediate
Expires: Never
Windows Login/global
Status: Active
Account: AJAX\Domain Admins
Scope: Zone
Zone: ajax.org/Centrify/Zones/global
Local Role: Yes
Network Role: No
Effective: Immediate
Expires: Never
Role Definitions:
Domain Admin/portland
Status: Active
Description: None
Zone:
CN=portland,CN=global,CN=Zones,OU=Centrify,DC=ajax,DC=or
g
Login Permitted: No
Audit Level: Audit if possible
Rescue Right: No
Require MFA: No
Available Hours: All
Rights:
ADUC/portland
Type: Application
Description: None
Priority: 0
Run As: AJAX\Administrator
Application: mmc.exe
Path: C:\Windows\system64
C:\Windows
C:\Program Files
C:\Program Files (x86)
C:\Windows\SysWOW64
Arguments:
"C:\Windows\system64\dsa.msc"
Match Case: No
Require Authentication: No
Application Criteria:
None
Windows Login/global
Status: Active
Description: Predefined system role for general
Windows login users.
Zone:
CN=global,CN=Zones,OU=Centrify,DC=ajax,DC=org
Login Permitted: Console and Remote
Audit Level: Audit if possible
Rescue Right: No
Available Hours: All
Rights:
None
Using dzjoin
The dzjoin command line program enables you to automatically join
users to the zone in which their roles and rights are assigned, or to join
them to a specific zone by zone name, when they log on to their
computer. The dzjoin command line program is particularly useful
for organizations that use non-persistent virtual desktop
infrastructures.
/z Join users to a zone using the zone name. If the zone name
is not unique, use the canonical name instead.
/s Join users to the zone where the user’s roles and rights are
assigned. The user must be a member of the zone, or have
previously been joined to the zone.
Using dzdiag
The dzdiag command line program provides detailed diagnostic
information for the local computer. The command output includes all
of the same information that you can view by clicking Diagnostics on
the Troubleshooting tab as described in “Running diagnostics and
viewing logs for the agent” on page 228.
dzdiag
Audit Flag: On
UAC Restrictions: No
Network Drives: No
Logon information:
None
Centrify Connectors:
Connector:
FQDN: Cloud1.name.net
Tenant: https://
abc123.my.centrify.com/
Last Known Availability: Yes
Last Access Time: -
IWA Enabled: Yes
IWA HTTPS Port: 8443
Proxy Enabled: Yes
Proxy Server: Cloud1.name.net:8080
AD Site: Default-First-Site-Name
Using dzrefresh
The dzrefresh command line program enables you to refresh the
authorization cache from a Command Prompt window. Running the
dzrefresh command provides the same functionality as clicking
Refresh on the Troubleshooting tab in the local agent control panel as
described in “Refreshing the cache” on page 175.
dzrefresh
Using dzflush
The dzflush command line program flushes the authorization cache
and reloads all authorization information from Active Directory.
Depending on the size of the authorization store, users might
experience a temporary loss of the ability to use the rights granted to
them while the authorization information is reloaded. To prevent any
loss of access privileges, in most cases you should use the dzrefresh
command instead of the dzflush command to ensure that the agent
is using the latest authorization information. You should only use the
dzflush command if Centrify Support recommends you do so.
dzflush
Using dzdump
The dzdump command line program enables you to view and capture
the current content of the authorization cache. You can use command
line options to control the information contained in the output for the
command.
You can use any combination of display options to display only the
information of interest. If you do not specify any display options, the
dzdump command displays all of the information in the authorization
cache.
Using runasrole
The runasrole command-line program enables you to run a specified
Windows application using a specified Centrify access role. You can use
command line options to control whether the role is used as a local
role, a network role, or both, and whether to use the current
You must specify the role to use in the rolename/zonename format. You
must also specify an appropriate path to the application you want to
access, including any required or optional arguments.
You can use the following command line arguments and options with
the runasrole command:
/role Use the role name you specify as both a local role and a
network role. You can specify this option to run an
application locally and access a remote server using the
same role, if applicable.
You should only use this option if the role you are assigned
and want to use has both local and network access rights
defined.
Examples
To use the same role to open the Computer Management application
locally and access a remote server in zone1, you might run a
command similar to the following:
To use the role named SQLdba from the finance zone as a local role
to open the Services application, you might run a command similar to
the following:
To open the Services application using the role named SQLdba from
the finance zone and have the runasrole program remain open
until you close the Services application, you might run a command
similar to the following:
.bat
.cmd
.cpl
.exe
.msc
.msi
.msp
.ps1
.vbs
.wsf
You can determine whether you can use the RunAsRole program to
execute an application from the application shortcut by checking the
file extension for the target application in the application’s shortcut
properties dialog box.
The following list summarizes the Centrify agent for Windows features
that are not supported on Server Core computers:
262
Server Core supported platforms
You should note that only Centrify agents for Windows are supported
for the Server Core environment. A small number of other Centrify
Server Suite components for Windows support a command line
interface, but are not configured to support a Server Core
environment.
You should note that Server Core is not supported on Windows Server
2008 because Windows Server 2008 Server Core does not support any
version of the .NET Framework. The Centrify agent for Windows
requires the .NET Framework. For more information about the
supported libraries and .NET functionality on Server Core, see the
reference material available on the Microsoft Developer Network
website for the operating system you have deployed.
http://technet.microsoft.com/en-us/library/cc753802(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/hh831786.aspx
Chapter 12 • Working with Server Core and Windows Server 2012 263
Installing the agent on a computer running Server Core
For example, if you are using Windows Server 2012 or later and the
.NET Framework is located on the installation media in the
D:\sources\sxs folder, use the following command:
DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /
LimitAccess /Source:D:\sources\sxs
2 Copy the Centrify agent for Windows files to the Server Core
computer.
For example:
copy D:\Common\Centrify* C:\CentrifyAgent
copy D:\Agent\* C:\CentrifyAgent
3 Install the Centrify Common Component service using the .msi file.
4 Install the Centrify agent for Windows using the .msi file.
By default, only the access features are installed. If you only want to
install the access control and privilege management features, you
run the following command:
msiexec /i "Centrify agent for Windows64.msi" /qn
Note that restarting the computer is not required if you only install
auditing features.
Joining a zone
One of the first tasks after installing the Centrify agent for Windows is
to join a zone. You can do by launching the DirectAuthorize Agent
Control Panel from the command prompt.
Chapter 12 • Working with Server Core and Windows Server 2012 265
Viewing authorization details
2 Run Centrify.DirectAuthorize.Agent.Config.exe.
4 Type all or part of the zone name, click Find Now, then select the
zone to join and click OK.
If you later need to change the zone, run diagnostics, refresh the
authorization cache, or view or modify log settings, you can run
Centrify.DirectAuthorize.Agent.Config.exe to perform
those tasks.
2 Run Centrify.DirectAuthorize.Auth.Center.exe.
2 Run agent.configure.exe.
3 Click Configure.
Because the Server Core operating system uses very few graphical
elements, in most cases you should accept the default setting of
Low for the color quality. This setting minimizes the storage
requirements for auditing if you have enabled video capture
auditing.
5 Accept the default offline data location and maximum size or type a
different location, then click Next.
You can also drag the slider to change the maximum percentage of
the drive the offline data can consume. In most cases, however, you
should leave the default setting unchanged.
dzinfo
dzjoin
dzdiag
Chapter 12 • Working with Server Core and Windows Server 2012 267
Working with PowerShell cmdlets
dzrefresh
dzflush
dzdump
runasrole
For more information about the command line options or output for
these commands, see the Administrator’s Guide for Windows or run the
command with the /help option.
If you have Windows PoweShell, version 2.0 or later, available, you can
install the Centrify DirectManage Access Module for Windows
PowerShell.
1 Copy the Access Module for Windows PowerShell .msi files to the
Server Core computer.
For example:
copy D:\DirectManage64\PowerShell\*.msi C:\CentrifyAgent
2 Install the Access Module for Windows PowerShell using the .msi
file.
Chapter 12 • Working with Server Core and Windows Server 2012 269
Unsupported Windows Server 2012 features
In addition, Centrify Server Suite does not provide any specific support
for authenticating access to Server Message Block 3.0 (SMB3.0) file
shares that are supported in Windows Server 2012. The SMB protocol
operates as an application layer for providing shared access to
computers, printers, and other devices. This protocol has been
extended to provide shared access to virtual machines and SQL user
databases.
Index
A access management 21
combined components 29
Access Manager scalable for auditing 22
introduction 15 scope for auditing 31
key tasks 19 archiving, database 210
rights and roles 20
attaching databases
starting the first time 54
database rotation 209
updating Active Directory 92
Audit Analyzer
Active Directory
additional 88
access required 41
adding containers 92 installation 56
computer roles 166 installing 56
forest integrity for zones 226 log file settings 233
groups for auditing 42 planning to install 41
initial configuration 54, 92 audit management databases
publication permission 221 allowed incoming 211
security group 191 installing 57
tracing 235
administrative console
access and privilege management 19 Audit Manager
agents and collectors 27 additional consoles 88
auditing 23 closing an installation 220
installation 56
agent
installing 56
automated installation 85
log file settings 232
configuration 70
planning to install 41
control panel settings 70
enabling logging 230 audit roles
generating diagnostics 228 about 184
log file 223 characteristics 185
prerequisites 68 creating 186
registry settings 83 audit store database
setup program 69 default name 62
specifying a trusted list 193 installing 62
unattended installation 72 audit stores
Agent Control Panel active database 24
viewing logs 228 adding additional 201
allowed incoming accounts 211 configuring scope 201
configuring security 202, 213, 247
Application Manager 138
creating the first 61
application rights database tracing 236
combining in a role 155 securing 193
custom role definitions 151
audit trail events
introduction 20 configuring group policy 237
viewing 160
audited computers
architecture architecture 22
271
E agent by GPO 85
audit management database 57
encryption audit store database 62
enabling SQL Server 196 auditing consoles 56
evaluation license 247 collector 64, 66
evaluation license key 240 consoles 56
first audit store 61
SQL Server 54
F Windows agent 67, 69
FAS 39
Fibre Attached Storage 39 J
FIPS compliance 247 join
firewall 38 prepare computer accounts 111
full recovery model 204
L
G licenses
evaluation and permanent 247
group policies
audit trail events 237 licensing
editing 192 adding keys 246
installing agents 85 container permissions 93
securing an installation 191 deleting keys 246
selective auditing 182 evaluation key 240
introduction 240
groups
multiple keys 241
creating for audit operations 42
permanent keys 241
exporting roles 157
types 241
importing roles 158
viewing a summary 245
role assignment 155 to 156, 171 to 172
log files
auditing components 230
I purpose 223
identity management login
planning zones 15, 96 audit notification 183
installation login role
adding audit stores 201 introduction 98
creating 57
locations 31 M
running setup on Windows 52 to 54
installations managed system 20
auditing infrastructure 25 management database
closing 220 allowed connections 211
creating 210, 220 tracing 235
multiple 220 max server memory 207
removing audited computers 219
maximum server memory 207
securing by group policy 191
security groups 191 min server memory 206
installing minimum server memory 207
additional consoles 88 multi-factor authentication 122
Index 273
N reporting
forest analysis 226
network access rights requirements
combining in a role 155 hardware 38
custom role definition 153
rescue rights
editing group policies 161
troubleshooting logon issues 224
introduction 20
selecting multiple roles 162 rights
troubleshooting issues 225 collected in roles 120
viewing 160 copying 159
defined 98
non-audited user list
displaying details 248
group policy 182
exporting 157
Non-Audited User list (NAUL) 182 importing 158
multi-factor authentication 122
P operation types 118
PAM access 124
periodic archiving 210 roles 122
permanent license 247 assigning users and groups 155, 171
permissions availability 150, 152, 154
creating a zone 101, 104 copying 159
delegating administrative tasks 101, 104 creating 149, 152
publication 221 defined 98
renaming a zone 114 displaying details 248
exporting 157
per-user auditing
troubleshooting 182 importing 158
job functions 148
pilot audit environment 207 login 98
planning rotating databases 209
minimal disruption 31
port, default for SQL Server 55
publication
S
about 221 SAN 39
permission 221
security
removing an installation 222
Active Directory groups 42
audit role characteristics 185
Q audit store 193, 202, 213, 247
creating audit roles 186
query database during backup 211 delegating database trace permission 237
enabling SQL Server encryption 196
FIPS compliance 247
R
group policy, setting 192
RAID 40 selective auditing
recording troubleshooting 182
about 16, 22 separate licensing information (per
color quality 72 installation) 247
recovery to arbitrary time-point 204 separation of duties
redundancy 64 zone design 99
removing sessions
audited computers 219 defined 22
U
users
audit notification 183
exporting roles 157
importing roles 158
role assignment 155 to 156, 171 to 172
W
win_adm_intro 12
Windows
color quality 72
native security policies 224
video capture 71
viewing logs 228
Windows agent
installing 67
installing by GPO 85
interactive installation 69
logging operations 223
packages available 82
Windows Feature Manager 138
Index 275