Product Guide

A set of Examples are also available.

Identity Group Mapping

Identity Group Mapping
Identity Group Mapping Identity Group Mapping

Read more ...

Billing

Billing
Billing Billing In the Billing Tab you can setup automatic payments. These are managed by Stripe, a 3rd-party payment processor: no financial information is stored within the Agilicus platform. Your billing cycle will be 30 days in duration, and will be a function of when you first started using the platform. You may control automatic...

Read more ...

Auto-Create Users From Specific Domain With Google Workplace

Auto-Create Users From Specific Domain With Google Workplace
Create a customised Sign In With Google (for e.g. Workplace with auto-create users)

Read more ...

Organisation

Organisation
Organisation Organisation

Read more ...

Authentication Audit

Authentication Audit
Authentication Audit Authentication Audit

Read more ...

Authentication Issuer

Authentication Issuer
Authentication Issuer Authentication Issuer

Read more ...

Microsoft ClickOnce

Microsoft ClickOnce
Deploy with Microsoft ClickOnce. Secure with Agilicus Zero Trust. Single-Sign-On, no VPN. Seamless end user experience.

Read more ...

Groups

Groups
Groups Groups

Read more ...

Agilicus Agent Windows Cluster

Agilicus Agent Windows Cluster
Install the Agilicus Agent to be high-availability in a Microsoft environment.

Read more ...

Launchers

Launchers
Network Resources may be forwarded from site to site or user to site. This allows you to e.g. expose an ERP or database without a VPN.

Read more ...

Forwarding

Forwarding
Network Resources may be forwarded from site to site or user to site. This allows you to e.g. expose an ERP or database without a VPN.

Read more ...

Usage Metrics

Usage Metrics
Usage Metrics Usage Metrics

Read more ...

Service Accounts

Service Accounts
Service Accounts Service Accounts

Read more ...

Connectors

Connectors
A connector is a means of bridging from one domain to another, of reaching and re-exporting protected resources via identity.

Read more ...

Identity & Authentication Methods

Identity & Authentication Methods
You can theme the authentication (sign-in) screen your users see. Learn how.

Read more ...

Content Security Policy

Content Security Policy
Content-Security-Policy is a set of headers to protect your application from malicious content in objects, scripts, images, frames, etc.

Read more ...

Users

Users
Users Concepts User A "User" is an identity which has a set of authorisations, a set of permissions. A user may be identified by one or more Identity Providers (e.g. Azure Active Directory, Google, Apple, etc.) Users' may be collected into groups, and, groups behave the same as a user for permission purposes. Groups may...

Read more ...

Azure Active Directory

Azure Active Directory
Azure Active Directory provides an OpenID Connect Federated Identity Endpoint. Learn how to configure.

Read more ...

Agilicus Agent (Desktop)

Agilicus Agent (Desktop)
Automatically mount a Share, launch a local application. With multi-factor authentication. Without a VPN. Automated rollout to all users.

Read more ...

Agent-Connector

Agent-Connector
You can theme the authentication (sign-in) screen your users see. Learn how.

Read more ...

Zero-Trust SSH Access

Zero-Trust SSH Access
Simplify your SSH access with Zero Trust. Direct access to any internal server, cloud VPC or VLAN without changing firewall.

Read more ...

Theory of Operation: CNAME + DOMAIN

Theory of Operation: CNAME + DOMAIN
Theory of Operation: CNAME + DOMAIN Setup Planning: Domain Name (CNAME) Setup When creating a new Organisation through the Signup process, you are asked 2 questions: "Organisation/Company/Account Name""DNS Domain" On the "DNS Domain" you have 2 choices: "I have my own domain name""I will use an Agilicus-supplied domain name" The "Organisation/Company/Account Name" is used for...

Read more ...

Zero-Trust Desktop Access

Zero-Trust Desktop Access
Simplify and secure your Desktop Access. Fine-grained authorisation per Desktop. Any user, from any identity provider. No public IP needed.

Read more ...

Command Line API Access

Command Line API Access
Your application also behaves as an API, used by a CLI or other non-browser-based application. Here you can see how to use via HTTP proxy or token.

Read more ...

Applications

Applications
Applications New Define Overview Diagnose

Read more ...

Permissions

Permissions
Permissions. Per user, per group, per application. Permissions can be by HTTP method, parameters. Fine-grained.

Read more ...

Profile

Profile
End user profile. Access applications, shares. Set up multi-factor authentication.

Read more ...

Multi-Factor Authentication

Multi-Factor Authentication
Multi-factor authentiction. Configure how, when, how often, users are required to supply a 2nd factor to sign in.

Read more ...

Authentication Rules

Authentication Rules
Authentication rules allow providing conditional-access rulesets during the authentication process. IP range, device, multi-factor, etc.

Read more ...

Application Request Access

Application Request Access
Your organisation has a dynamic workforce, and a dynamic list of applications that they use to be efficient. A self-discovery, self-request workflow is more efficient than a command-and-control model.

Read more ...

OpenWRT Agent Connector Install

OpenWRT Agent Connector Install
Configure an OpenWRT Router with the Agilicus Agent Connector.

Read more ...

Synology Agent Connector Install

Synology Agent Connector Install
Configure a Synology NAS with the Agilicus Agent Connector.

Read more ...

Authentication Clients

Authentication Clients
Authentication Clients Authentication Rules

Read more ...

Authentication Rules

Authentication Rules
Authentication Rules allow you to control multi-factor authentication, who can sign-in where/when, from what IP/device, etc.

Read more ...

Shares

Shares
Shares are a means of taking a directory on a local server and making the contents available to any user, without a VPN and with out a client.

Read more ...

Services

Services
A 'service' is a global resource (usually TCP) available from your domain of control to web applications running in the platform.

Read more ...

Resource Permissions

Resource Permissions
A Resource is an individually-permissioned object. Users or Groups may be granted various Roles on a Resource (Network, Share, ...)

Read more ...

Resource Groups

Resource Groups
Resource groups are a means of applying a common configuration across a set of resources (connectors, applications, shares, etc)

Read more ...

Legacy Active Directory

Legacy Active Directory
On-premise legacy active directory with ADFS can act as an OpenID Connect Identity Provider. Learn how to configure.

Read more ...