Skip to content

Agilicus AnyX Platform Signup

sign-up graphic showing user standing in front of laptop with cloud and agilicus logo

Quick Start: Signup

From SIGNUP, perform these 3 steps

  1. create account
  2. create organisation
  3. assign domain

Signup Key Concepts

Setup the Agilicus system from creation to use in a self-served fashion. The high level steps are:

  1. Create Owner User
  2. Name your Organisation
  3. Decide on a DNS Domain Name

At this stage you will be ready to start your first configuration. (The below steps are peformed at

Step 1: Create Owner User

The Agilicus Any-X Platform does not have passwords. All users are single-sign-on against an existing identity provider. You may sign in with your Google (Google Workplace/G Suite/G Mail), Microsoft (Azure Active Directory, Office 365) identity. This will create a linked user without new credentials. Click on the Signup button.

Step 1a: Select Identity Provider

Select either ‘Microsoft’ or ‘Google’. You will then see a familiar sign-in screen.

Step 2: Create Organisation

Here you are being asked to name your setup. This is typically your company name. It will show up on your invoice and elsewhere in the administrative interface. End users will not see this.

Step 3: Decide on DNS Setup

Each resource you create, each thing interactive with by end-users will be in the format https://<RESOURCENAME>.<DOMAINNAME>. You have a choice:
1. you can use an Agilicus-supplied DNS name (“I have not setup my own cname alias“). No additional setup will be needed. It will be something like “”.
2. you can use your own existing domain-name (a sub-domain) (“I have setup my own cname alias“).. It will be something like ‘’.
We recommend option 2 since its easier to train your end users on phishing protection by using your own domains.

Step 3a: Agilicus-Supplied DNS name

If you wish to use an Agilicus-supplied DNS name, select “I have not setup my own cname alias“. You may now select a sub-domain name and a specific agilicus-supplied domain. Select “Create“.

Step 3b: Existing Sub-domain

If you wish to use your own DNS name, select “I have setup my own cname alias“. In your DNS management tool (e.g. GoDaddy, Google Domains), create a new sub-domain (e.g. cloud.MYDOMAIN, connect.MYDOMAIN, etc). You should now assign a wildcard CNAME record (e.g. *.cloud.MYDOMAIN) pointing to If you run a split-horizon (e.g. internal + external DNS) you must configure in both. Select “CREATE”

Step 4: Sign-in to new account (re-authenticate)

At this stage you are complete. The system is now setting up 3 new endpoints:
1. admin.MYDOMAIN –> this will be the administrative interface as a web page
2. auth.MYDOMAIN –> you will not navigate here explicitly, but it will be used for authentication
3. profile.MYDOMAIN –> your end users will navigate here with a browser as a launch pad.
Once these 3 endpoints are setup, and new SSL certificates installed, you will be asked to re-authenticate. Using the same user as in step 1, you will sign in to the new organisation. From here you will see a getting started guide and are ready to go.

At this stage you are complete.


Open another browser tab to to sign up and get going. Below are some notes and instructions to help along the way. The full Product Guide may also be helpful.

Got Feedback? Email or click the chat icon in the lower left, we’ll act on it right away.

Step 1: Signup Identity

The Agilicus Platform is architected around strong identity. However, we don’t believe in “Yet Another Username, Yet Another Password.”. We want you to have a single, strong, trustworthy sign-in to our system using the natural sign-in method you use day-to-day. As a bootstrap, we ask you to sign in with your Google, Apple, or LinkedIn account. This uses a technology called ‘OpenID Connect’. We don’t get your password to these systems, nor do we get any privilege or access to them: they provide Identity and Authentication to Agilicus.

Once you have done the initial Signup you may add your Azure Active Directory or Active Directory Federation Service so that you, and your users, may login as you do to any other corporate system. You may then add other trusted Identity sources, allowing, for example, two companies to work together in a Joint Venture.

The Login process will create a web popup. Notice that the domain-name in it is from Google or Apple. You may need to enable Popups in your web browser (this is the only spot we use them).

Step 2: Domain Selection

Great! Now you have created an account. You are now presented with two choices:

  1. Organisation Name. This is what you call your company. Just like you are unique, we also require this to be unique. So we suggest making it your legal company name instead of just “demo”. This will only occur in reports and billing, it won’t be something your end users will see.
  2. Domain. This is how your users will use resources you host in, or expose through, the Agilicus system. We don’t believe in client software, so your users will normally see this as a URL. You have 2 choices: provide a sub-domain of your existing domain, or, use one of ours.

For the domain, if you choose to provide your own sub-domain, you must first put an entry in your Domain Name Server (DNS) to prove you own it, and to allow us to host content on it. This is done by creating a CNAME record with a wildcard. In your DNS, create a CNAME report from *.subdomain.yourdomain to For more information about the Hows and Whys of a CNAME, see “Internet Redirect & Alias: The CNAME“. NOTE: this is a wildcard.

Example Setup with Google DNS

For example, we recommend using “cloud” as the subdomain. If your company web-page is “”, you will create a CNAME of *, pointing to You and your users will now be accessing applications as

If you use a domain we supply, this can be very quick for you to get going. If you use your existing domain its simpler for your users, and, can help train them to avoid spearphishing by only using your corporate domain. The choice is yours.

An example setup using Google DNS is shown. This will vary slightly depending on your DNS provider. If you wish to test the setup of your CNAME, we recommend using dig, as below. You may also use a web-based service such as Lookup anyname.subdomain.yourdomain.

$ dig -t cname
 ;    IN  CNAME

Once you select CREATE it will take approximately 30-60 seconds to setup an environment. During this time our system is created a Federated Login system (allowing authentication against your Identity Providers), SSL certificates (100% of what we do is encrypted), and some other database setup for Audit Logging etc.

NOTE: Split-Horizon DNS

If you run split-horizon DNS (e.g. a name server internally which serves different answers than externally), you will need to make the same changes in both systems.


If all went well you will now see a new “AUTHENTICATE” button. For security purposes we will now ask you to login to the newly created Organisation. You will do this using the same bootstrap Identity you authenticated with to do the Signup (your Google, Apple, LinkedIn). Observe there is no exchange of password or other information to our system.

Once you have done this second Authenticate, you will be logged in to the Administrative Portal of the Agilicus Zero Trust Platform. You will see the URL change to https://admin.<subdomain>.<domain>. You may return to this web page at any time.

You are now done with the Signup phase, from here you will have a set of tasks to expose individual resources, choose which users can access them, choose how those users authenticate themselves, choose what roles those users have, view audit logs, etc.


Now that your Organisation is setup, and you can login, you have a few options to explore. There is no right order. But, some things to consider:

  1. Enable Multi-Factor Authentication. You can control a rich set of policies for which users must present which methods for multi-factor authentication to resources exposed via the Agilicus platform. Code-Based Apps? Web Push? WebAuthN TPM or USB keys? We recommend a strategy of Trust On First Use, lowering the cost of rolling out a multi-factor authentication plan to your team
  2. Enable a new Upstream Identity Provider. If you use Office 365, or Azure Active Directory, this is a natural to achieve Single Sign On. Its simpler than you think!. You are only a couple of clicks away from Authenticating to Agilicus via your Corporate Active Directory.
  3. Expose a simple internal Web Site, safely, securely, to the Internet, enabling strong single sign on and role-based access control
  4. Expose a new shared directory of files on an internal file server to specific users, no VPN, no client needed.
  5. Host a new web application

A set of example setups, including a sample web server to demonstrate exposing an internal application, is available in the Examples.