Agilicus AnyX

Product Guide

Individual product guide pages are laid out below as cards. These are intended to be linked and navigated within the Agilicus AnyX administrative web interface, but are available here for reference.

product-guide

For information on embedding the Agilicus AnyX platform into your workflow or product, see also the API and SDK.

See, follow, subscribe to a set of articles on tips, tricks, best practices on using Agilicus AnyX, or, see the Frequently Asked Questions (FAQ).

A set of Examples are also available.

Administrative Users

Administrative Users
Administrative users are assigned via System Groups (sysgroups). These allow you to control who can make changes, to what objects.

Read more …

Agilicus AnyX Frequently Asked Questions

Agilicus AnyX Frequently Asked Questions
Frequently Asked Questions about the Agilicus AnyX Product.

Read more …

Agilicus AnyX Product Updates

Agilicus AnyX Product Updates
Agilicus AnyX Product Updates, Tips, Tricks, Best Practices. Subscribe via Email, follow via RSS, browse periodically. Set your preferences or view online.

Read more …

Agilicus Connector – Container/Docker

Agilicus Connector – Container/Docker
Install an Agilicus Connector in a container (e.g. Docker)

Read more …

Agilicus Connector – Microsoft Windows

Agilicus Connector – Microsoft Windows
Install and diagnose the Agilicus Connector on Microsoft Windows

Read more …

Agilicus Connector – NanoPI R5S

Agilicus Connector – NanoPI R5S
Install an Agilicus Connector on an OpenWRT-based NanoPi R5S.

Read more …

Agilicus Connector Install: MikroTik RouterOS

Agilicus Connector Install: MikroTik RouterOS
The MikroTik RB5009UG+S+IN is a small-form factor router. it is a good vantage point to run the Agilicus Connector.

Read more …

Agilicus Connector Windows Cluster

Agilicus Connector Windows Cluster
Install the Agilicus Connector to be high-availability in a Microsoft environment.

Read more …

Agilicus Launcher (Desktop)

Agilicus Launcher (Desktop)
Automatically mount a Share, launch a local application. With multi-factor authentication. Without a VPN. Automated rollout to all users.

Read more …

Agilicus-Connector

Agilicus-Connector
The Agilicus Connector facilitates connectivity from a private site to external users.

Read more …

Application Request Access

Application Request Access
Your organisation has a dynamic workforce, and a dynamic list of applications that they use to be efficient. A self-discovery, self-request workflow is more efficient than a command-and-control model.

Read more …

Applications

Applications
An application manages web-based applications, API’s, anything which uses HTTP as a transport. It encompasses a Web Application Firewall, an Identity Proxy, and fine-grained Authorisation and Audit.

Read more …

Audit Destinations

Audit Destinations
Audit records are written for events ranging from authentication, authorisation, and API access. Configure how to receive these.

Read more …

Authentication Audit

Authentication Audit
Authentication audit shows events related to user identity, each step, multi-factor, policies, locations, etc. E.g. ‘sign-in’ obtain id token.

Read more …

Authentication Clients

Authentication Clients
Authentication Clients Authentication Rules

Read more …

Authentication Issuer – Custom Identity

Authentication Issuer – Custom Identity
An Authentication Issuer holds and confirms Identity. Configure your own custom ones here.

Read more …

Authentication Rules

Authentication Rules
Authentication rules allow providing conditional-access rulesets during the authentication process. IP range, device, multi-factor, etc.

Read more …

Authorisation rules

Authorisation rules
Authorisation rules Authorisation rules

Read more …

Auto-Create Users From Specific Domain With Google Workplace

Auto-Create Users From Specific Domain With Google Workplace
Create a customised Sign In With Google (for e.g. Workplace with auto-create users)

Read more …

Azure Active Directory

Azure Active Directory
Azure Active Directory provides an OpenID Connect Federated Identity Endpoint. Learn how to configure.

Read more …

Billing

Billing
Billing Billing Billing is managed directly in the Agilicus Platform and you can setup automatic payments from the Billing Tab. Payments are managed and processed through Stripe, no financial information is stored within the Agilicus platform. Your billing cycle will be 30 days in duration, and will be a function of when you first started…

Read more …

Command Line API Access

Command Line API Access
Your application also behaves as an API, used by a CLI or other non-browser-based application. Here you can see how to use via HTTP proxy or token.

Read more …

Connect to VTScada – Adding a Web Application

Connect to VTScada – Adding a Web Application
Learn how to add an application to the Agilicus platform and connect to VTScada through a zero trust model

Read more …

Connector Install: Netgate SG-1100 pfSense

Connector Install: Netgate SG-1100 pfSense
The Netgate SG-1100 pfSense is a small-form factor router. it is a good vantage point to run the Agilicus Agent Connector.

Read more …

Connector Install: Raspberry Pi

Connector Install: Raspberry Pi
The Raspberry Pi makes an excellent platform to install the Agilicus Agent Connector. See the general instructions here.

Read more …

Connector Install: Ubiquiti EdgeRouter X

Connector Install: Ubiquiti EdgeRouter X
The Ubiquiti EdgeRouter X (ER-X/ER-X SFP) is a small-form factor router. it is a good vantage point to run the Agilicus Agent Connector.

Read more …

Content Security Policy

Content Security Policy
Content-Security-Policy is a set of headers to protect your application from malicious content in objects, scripts, images, frames, etc.

Read more …

Define Application: Proxy

Define Application: Proxy
An Identity-Aware Web Application operates as a proxy, bringing identity, authentication, authorisation on behalf of web applications.

Read more …

Forwarding

Forwarding
Network Resources may be forwarded from site to site or user to site. This allows you to e.g. expose an ERP or database without a VPN.

Read more …

Geo-Location-Based Access Control

Geo-Location-Based Access Control
It i possible to allow/deny access to individual resources based on the country their inbound IP is coming from.

Read more …

Groups

Groups
Groups Groups

Read more …

Identity & Authentication Methods

Identity & Authentication Methods
You can theme the authentication (sign-in) screen your users see. Learn how.

Read more …

Identity Group Mapping

Identity Group Mapping
Identity Group Mapping Identity Group Mapping

Read more …

Kubernetes Connector Install

Kubernetes Connector Install
The Agilicus Connector includes a standard container-runtime and automatic installation for Kubernetes. This allows exposing internal Kubernetes services with an OpenID Conect Identity Proxy.

Read more …

Launchers

Launchers
Integration of Resources with the Desktop is achieved through the Launcher. – Mount a Share – Open an SSH – Open a Desktop – Launch an executable

Read more …

Legacy Active Directory

Legacy Active Directory
On-premise legacy active directory with ADFS can act as an OpenID Connect Identity Provider. Learn how to configure.

Read more …

Linux, FreeBSD, Embedded Connector Install

Linux, FreeBSD, Embedded Connector Install
The instructions to install the Agilicus Agent Connector are nearly identical on various Unix operating systems. This includes desktops, servers, and embedded devices.

Read more …

Locked-Down Networks Certificate Revocation

Locked-Down Networks Certificate Revocation
Your firewall blocks all but specific outbound IP access. Your Let’s Encrypt or other certificates are not checking CRL or OCSP revocation. Here we show how to resolve.

Read more …

Microsoft ClickOnce

Microsoft ClickOnce
Deploy with Microsoft ClickOnce. Secure with Agilicus Zero Trust. Single-Sign-On, no VPN. Seamless end user experience.

Read more …

Multi-Factor Authentication

Multi-Factor Authentication
Multi-factor authentiction. Configure how, when, how often, users are required to supply a 2nd factor to sign in.

Read more …

OpenWRT Connector Install

OpenWRT Connector Install
Configure an OpenWRT Router with the Agilicus Agent Connector.

Read more …

Organisation

Organisation
Organisation Organisation An organisation (tenant, project in some other systems) is a span of control, of permissions, of users. Each organisation has: Identity Issuers (for authentication) Administrative users (sysgroups) Billing For sophisticated use cases, an Organisation can have sub-organisations. This allows delegating control or segregating use cases. Organisations can share users (e.g. the same user…

Read more …

Permissions

Permissions
Permissions. Per user, per group, per application. Permissions can be by HTTP method, parameters. Fine-grained.

Read more …

Profile

Profile
End user profile. Access applications, shares. Set up multi-factor authentication.

Read more …

Real VNC & Raspberry Pi

Real VNC & Raspberry Pi
The Raspberry PI (with Raspbian) comes pre-installed with a VNC-like server. This can be configured to support standard authentication and used via Agilicus Any-X

Read more …

Resource Groups

Resource Groups
Resource groups are a means of applying a common configuration across a set of resources (connectors, applications, shares, etc)

Read more …

Resource Permissions

Resource Permissions
A Resource is an individually-permissioned object. Users or Groups may be granted various Roles on a Resource (Network, Share, …)

Read more …

Resources – Overview, Concepts

Resources – Overview, Concepts
Resources – Overview, Concepts Resources – Overview, Concepts

Read more …

Service Accounts

Service Accounts
A service account is a specific subset of permissions assigned to a non-human user. The most common use is the Agilicus Agent Connector.

Read more …

Services

Services
A ‘service’ is a global resource (usually TCP) available from your domain of control to web applications running in the platform.

Read more …

Shares

Shares
Shares are a means of taking a directory on a local server and making the contents available to any user, without a VPN and with out a client.

Read more …

Synology Connector Install

Synology Connector Install
Configure a Synology NAS with the Agilicus Agent Connector.

Read more …

Theory of Operation: CNAME + DOMAIN

Theory of Operation: CNAME + DOMAIN
Theory of Operation: CNAME + DOMAIN Setup Planning: Domain Name (CNAME) Setup When creating a new Organisation through the Signup process, you are asked 2 questions: “Organisation/Company/Account Name” “DNS Domain” On the “DNS Domain” you have 2 choices: “I have my own domain name” “I will use an Agilicus-supplied domain name” The “Organisation/Company/Account Name” is…

Read more …

Time Synchronisation

Time Synchronisation
Proper time synchronisation is important for encryption and access control. Access tokens have a not-before/expiry date that must be understood.

Read more …

Usage Metrics

Usage Metrics
Platform usage metrics are available showing top-users and overall active counts.

Read more …

Users

Users
Users Concepts User A “User” is an identity which has a set of authorisations, a set of permissions. A user may be identified by one or more Identity Providers (e.g. Azure Active Directory, Google, Apple, etc.) Users’ may be collected into groups, and, groups behave the same as a user for permission purposes. Groups may…

Read more …

VNC Desktop

VNC Desktop
The VNC Desktop feature allows browser-based use of remote graphical-oriented resources. This can include traditional operating systems like Windows, Linux, MacOS, but, also, includes embedded devices such as HMI.

Read more …

Web Application Security

Web Application Security
Web Application Security Web Application Security

Read more …

Zero-Trust Desktop Access

Zero-Trust Desktop Access
Simplify and secure your Desktop Access. Fine-grained authorisation per Desktop. Any user, from any identity provider. No public IP needed.

Read more …

Zero-Trust SSH Access

Zero-Trust SSH Access
Simplify your SSH access with Zero Trust. Direct access to any internal server, cloud VPC or VLAN without changing firewall.

Read more …