AnyX Guide Type: guide
-
Shares
Read more: SharesShares are a means of taking a directory on a local server and making the contents available to any user, without a VPN and with out a client.
-
Hosted Applications
Read more: Hosted ApplicationsAn application manages web-based applications, API’s, anything which uses HTTP as a transport. It encompasses a Web Application Firewall, an Identity Proxy, and fine-grained Authorisation and Audit.
-
Azure Active Directory
Read more: Azure Active DirectoryAzure Active Directory provides an OpenID Connect Federated Identity Endpoint. Learn how to configure.
-
Sign-In Theming
Read more: Sign-In ThemingYou can theme the authentication (sign-in) screen your users see. Learn how.
-
Agilicus Connector
Read more: Agilicus ConnectorThe Agilicus Connector facilitates connectivity from a private site to external users.
-
Profile
Read more: ProfileEnd user profile. Access applications, shares. Set up multi-factor authentication.
-
Multi-Factor Authentication
Read more: Multi-Factor AuthenticationMulti-factor authentiction. Configure how, when, how often, users are required to supply a 2nd factor to sign in.
-
Identity & Authentication Methods
Read more: Identity & Authentication MethodsYou can theme the authentication (sign-in) screen your users see. Learn how.
-
Authentication Clients
Read more: Authentication ClientsThe Authentication Clients implement OpenID Connect client id. This is an advanced setting, it is rarely required to configure. These are created automatically for each web application.
-
Application Request Access
Read more: Application Request AccessYour organisation has a dynamic workforce, and a dynamic list of applications that they use to be efficient. A self-discovery, self-request workflow is more efficient than a command-and-control model.
-
Services
Read more: ServicesA ‘service’ is a global resource (usually TCP) available from your domain of control to web applications running in the platform.
-
Zero-Trust SSH Access
Read more: Zero-Trust SSH AccessSimplify your SSH access with Zero Trust. Direct access to any internal server, cloud VPC or VLAN without changing firewall.
-
Forwarding
Read more: ForwardingNetwork Resources may be forwarded from site to site or user to site. This allows you to e.g. expose an ERP or database without a VPN.
-
Content Security Policy
Read more: Content Security PolicyContent-Security-Policy is a set of headers to protect your application from malicious content in objects, scripts, images, frames, etc.
-
Users
Read more: UsersUsers. Individual human or system accounts that can be granted permission. Typically users are people, and, are tied to Agilicus AnyX via single-sign-on to an existing identity provider.
-
Command Line API Access
Read more: Command Line API AccessYour application also behaves as an API, used by a CLI or other non-browser-based application. Here you can see how to use via HTTP proxy or token.
-
Zero-Trust Desktop Access
Read more: Zero-Trust Desktop AccessSimplify and secure your Desktop Access. Fine-grained authorisation per Desktop. Any user, from any identity provider. No public IP needed.
-
Resource Groups
Read more: Resource GroupsResource groups are a means of applying a common configuration across a set of resources (connectors, applications, shares, etc)
-
Launchers
Read more: LaunchersIntegration of Resources with the Desktop is achieved through the Launcher. – Mount a Share – Open an SSH – Open a Desktop – Launch an executable
-
Authentication Rules
Read more: Authentication RulesAuthentication rules allow providing conditional-access rulesets during the authentication process. IP range, device, multi-factor, etc.
-
Microsoft ClickOnce
Read more: Microsoft ClickOnceDeploy with Microsoft ClickOnce. Secure with Agilicus Zero Trust. Single-Sign-On, no VPN. Seamless end user experience.
-
Sign in With Microsoft
Read more: Sign in With MicrosoftSign in with Microsoft to the Agilicus Platform. Ramificatiosn of Shared vs your own Azure Active Directory Application.
-
Theory of Operation: CNAME + DOMAIN
Read more: Theory of Operation: CNAME + DOMAINTheory of operation: initial setup, choose a domain name, set the CNAME wildcard.
-
Agilicus Launcher (Desktop)
Read more: Agilicus Launcher (Desktop)Automatically mount a Share, launch a local application. With multi-factor authentication. Without a VPN. Automated rollout to all users.
-
Sign in With Apple
Read more: Sign in With AppleSign in with Apple allows you to use resources through the Agilicus platform authenticated by an Apple ID.
-
Usage Metrics
Read more: Usage MetricsPlatform usage metrics are available showing top-users and overall active counts.
-
Groups
Read more: GroupsGroups simplify assigning permissions. Assign users to one or more groups. Assign groups to groups Assign permissions to groups. Administrators, tech-support, etc.
-
Service Accounts
Read more: Service AccountsA service account is a specific subset of permissions assigned to a non-human user. The most common use is the Agilicus Agent Connector.
-
Authentication Issuer – Custom Identity
Read more: Authentication Issuer – Custom IdentityAn Authentication Issuer holds and confirms Identity. Configure your own custom ones here.
