Agilicus Launcher
Browser Desktop Integration

Jump directly to platform specific installation instructions are shown below for Microsoft Windows, Apple OSX, Linux.
Agilicus Launcher Desktop Configuration
The Agilicus Launcher provides a means of interacting with the user for the purposes of:
It may be used standalone, or, directly integrated to a browser. This can be particularly useful to:
When installed in this mode, the Launcher will update itself periodically as it is run. It will initially query the user, and, then, interact again as needed to refresh credentials.
The user installation is very simple: download and run a single file. It will place an entry on the users’s menu called ‘Refresh’ as well as one icon per Launcher. The user can now launch individual applications via an icon. Or, if needed, the user can refresh their shared drives (optionally being forced to re-authenticate with multi-factor authentication) by selecting Refresh.
Install
Platform specific installation instructions are shown below for Microsoft Windows, Apple OSX, Linux.
Microsoft Windows
Note: Installation on Microsoft Windows does not administrative privilege.
Open Profile
Install Desktop Integration
Install Extension
Install Launcher
Apple OSX
Note: Installation on Apple OSX requires administrative privilege, but later running and upgrading does not.
Open Profile
Install Desktop Integration
Install Extension
COPY code to clipboard
DOWNLOAD package
Install package
Paste code
Linux
No administrative (root) permissions are required.
Open Profile
Install Desktop Integration
Install Extension
Download Agilicus launcher
Enable Execute Permission
Run Agilicus launcher
Related Configuration
Return to Product Configuration
- Agilicus AnyX Frequently Asked Questions
- VNC Desktop
- Agilicus Connector – Container/Docker
- Agilicus Connector – NanoPI R5S
- Agilicus AnyX Product Updates
- Agilicus Connector – Microsoft Windows
- Sign-In Errors
- Time Synchronisation
- Locked-Down Networks Certificate Revocation
- Signup: Firewall Configuration
- Geo-Location-Based Access Control
- Resources – Overview, Concepts
- Connect to VTScada – Adding a Web Application
- Web Application Security
- Administrative Users
- Define Application: Proxy
- Authorisation rules
- Real VNC & Raspberry Pi
- Connector Install: Raspberry Pi
- Kubernetes Connector Install
- Linux, FreeBSD, Embedded Connector Install
- Connector Install: Ubiquiti EdgeRouter X
- Audit Destinations
- Agilicus Connector Install: MikroTik RouterOS
- Connector Install: Netgate SG-1100 pfSense
- Identity Group Mapping
- Billing
- Auto-Create Users From Specific Domain With Google Workplace
- Organisation
- Authentication Audit
- Authentication Issuer – Onsite Identity
- Authentication Issuer – Custom Identity
- Sign Up
- Microsoft ClickOnce
- Groups
- Agilicus Connector Windows Cluster
- Launchers
- Forwarding
- Usage Metrics
- Service Accounts
- Identity & Authentication Methods
- Content Security Policy
- Users
- Sign-In Theming
- Sign in With Apple
- Azure Active Directory
- Sign in With Microsoft
- Agilicus Launcher (Desktop)
- Agilicus-Connector
- Zero-Trust SSH Access
- Theory of Operation: CNAME + DOMAIN
- Zero-Trust Desktop Access
- Command Line API Access
- Applications
- Permissions
- Profile
- Multi-Factor Authentication
- Authentication Rules
- Application Request Access
- OpenWRT Connector Install
- Synology Connector Install
- Authentication Clients
- Shares
- Services
- Resource Permissions
- Resource Groups
- Legacy Active Directory