<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://dikapediav2.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Centrify%2FDelinea</id>
	<title>Centrify/Delinea - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://dikapediav2.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Centrify%2FDelinea"/>
	<link rel="alternate" type="text/html" href="https://dikapediav2.com/wiki/index.php?title=Centrify/Delinea&amp;action=history"/>
	<updated>2026-05-15T09:16:43Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://dikapediav2.com/wiki/index.php?title=Centrify/Delinea&amp;diff=38&amp;oldid=prev</id>
		<title>Ardika Sulistija: Created page with &quot;This is the Centrify for UNIX/Linux/Mac Command Line Cheat Sheet&lt;br&gt; Ref: https://centrifying.blogspot.com/2016/02/centrify-for-unix-cli-cheat-sheet.html    ====AD-bridging commands (&quot;ad&quot; commands)==== ---- &lt;b&gt;adcheck&lt;/b&gt; - check OS, network and AD readiness for Centrify DirectControl  To check the system with domain (e.g. corp.contoso.com)  $ adcheck corp.contoso.com To only perform OS checks  $ adcheck --test os To only perform network-related tests  $ adcheck --test n...&quot;</title>
		<link rel="alternate" type="text/html" href="https://dikapediav2.com/wiki/index.php?title=Centrify/Delinea&amp;diff=38&amp;oldid=prev"/>
		<updated>2024-08-21T14:42:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;This is the Centrify for UNIX/Linux/Mac Command Line Cheat Sheet&amp;lt;br&amp;gt; Ref: https://centrifying.blogspot.com/2016/02/centrify-for-unix-cli-cheat-sheet.html    ====AD-bridging commands (&amp;quot;ad&amp;quot; commands)==== ---- &amp;lt;b&amp;gt;adcheck&amp;lt;/b&amp;gt; - check OS, network and AD readiness for Centrify DirectControl  To check the system with domain (e.g. corp.contoso.com)  $ adcheck corp.contoso.com To only perform OS checks  $ adcheck --test os To only perform network-related tests  $ adcheck --test n...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This is the Centrify for UNIX/Linux/Mac Command Line Cheat Sheet&amp;lt;br&amp;gt;&lt;br /&gt;
Ref: https://centrifying.blogspot.com/2016/02/centrify-for-unix-cli-cheat-sheet.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====AD-bridging commands (&amp;quot;ad&amp;quot; commands)====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adcheck&amp;lt;/b&amp;gt; - check OS, network and AD readiness for Centrify DirectControl&lt;br /&gt;
&lt;br /&gt;
To check the system with domain (e.g. corp.contoso.com)&lt;br /&gt;
 $ adcheck corp.contoso.com&lt;br /&gt;
To only perform OS checks&lt;br /&gt;
 $ adcheck --test os&lt;br /&gt;
To only perform network-related tests&lt;br /&gt;
 $ adcheck --test net corp.contoso.com&lt;br /&gt;
To only perform AD-related tests&lt;br /&gt;
 $ adcheck --test ad corp.contoso.com&lt;br /&gt;
To check the system with a service domain controller (e.g. dc1)&lt;br /&gt;
 $ adcheck --servername dc1 corp.contoso.com&lt;br /&gt;
To check connectivity only with DCs within the site&lt;br /&gt;
 $ adcheck --siteonly corp.contoso.com&lt;br /&gt;
To check only on 3 (or n) DCs in a large domain&lt;br /&gt;
 $ adcheck --bigdommain 3 corp.contoso.com&lt;br /&gt;
To check trust relationships (e.g. with hq.fabrikam.com)&lt;br /&gt;
 $ adcheck --xdomain corp.contoso.com&lt;br /&gt;
To skip NTP checking (if you are not doing sync with AD DCs)&lt;br /&gt;
 $ adcheck --skip-ntp corp.contoso.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;adinfo&amp;lt;/b&amp;gt;:  provides information about the status of the agent&lt;br /&gt;
&lt;br /&gt;
Looking-up Basic Information&lt;br /&gt;
To check the general status of the client&lt;br /&gt;
 $ adinfo&lt;br /&gt;
To see the current domain controller the client is using&lt;br /&gt;
 $ adinfo --server&lt;br /&gt;
To see the current domain the agent is joined to&lt;br /&gt;
 $ adinfo --domain&lt;br /&gt;
To see the status (mode) of the agent (connected to ad or in offline mode)&lt;br /&gt;
 $ adinfo --mode&lt;br /&gt;
To see the version of the installed client&lt;br /&gt;
 $ adinfo --version&lt;br /&gt;
To see the corresponding Centrify Suite Version&lt;br /&gt;
 $ adinfo --suite-version&lt;br /&gt;
To view Active Directory connectivity to the current domain&lt;br /&gt;
 $ adinfo --test&lt;br /&gt;
To view the current Active Directory site&lt;br /&gt;
 $ adinfo --site&lt;br /&gt;
To see the current joined Centrify zone&lt;br /&gt;
 $ adinfo --zone&lt;br /&gt;
 $ adinfo --zonedn  (in distinguishedName format)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;DNS&amp;lt;/u&amp;gt;=====&lt;br /&gt;
&lt;br /&gt;
To check for the &amp;quot;joined-as&amp;quot; name (local host name and joined as name may be different)&lt;br /&gt;
 $ adinfo --name&lt;br /&gt;
To check the status of the DNS cache and stats&lt;br /&gt;
 $ adinfo --diag dns&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;Connectivity&amp;lt;/u&amp;gt;=====&lt;br /&gt;
To check connectivity with an AD domain&lt;br /&gt;
 $ adinfo --test [domain.name]&lt;br /&gt;
To check network connectivity statistics&lt;br /&gt;
 $ adinfo --sysinfo neststate&lt;br /&gt;
To test connectivity against a specific domain controller&lt;br /&gt;
 $ adinfo --T --servername [domain.controller.name]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;Active Directory&amp;lt;/u&amp;gt;=====&lt;br /&gt;
To see the current AD Global Catalog&lt;br /&gt;
 $ adinfo --gc&lt;br /&gt;
To see the domain/forest map&lt;br /&gt;
 $ adinfo --sysinfo domain&lt;br /&gt;
To see the status of the AD computer trust relationship&lt;br /&gt;
 $ adinfo --sysinfo adagent&lt;br /&gt;
&lt;br /&gt;
Testing a user&amp;#039;s password&lt;br /&gt;
 $ adinfo -A --user [username] &lt;br /&gt;
 # this will prompt you for a password, the output is:&lt;br /&gt;
 Password for user &amp;quot;username&amp;quot; is correct/incorrect&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;Configuration&amp;lt;/u&amp;gt;=====&lt;br /&gt;
To parse the contents of the centrify.conf file&lt;br /&gt;
 $ adinfo --config&lt;br /&gt;
To show the client&amp;#039;s in memory configuration parameters&lt;br /&gt;
 $ adinfo --sysinfo config&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;Kerberos&amp;lt;/u&amp;gt;=====&lt;br /&gt;
To view Kerberos information like supported encryption types, key version and registered SPNs&lt;br /&gt;
 $ adinfo --computer&lt;br /&gt;
To view the updated Kerberos configuration in the local system&lt;br /&gt;
 $ cat /etc/krb5.conf&lt;br /&gt;
To list the principals in the system&amp;#039;s krb5.conf file&lt;br /&gt;
 $ dzdo /usr/share/centrifydc/kerberos/bin/klist -kt /etc/krb5.keytab&lt;br /&gt;
To determine the encryption types of the system&amp;#039;s cached ticket&lt;br /&gt;
 $ dzdo /usr/share/centrifydc/kerberos/bin/klist -fe /etc/krb5.ccache&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;PKI&amp;lt;/u&amp;gt;=====&lt;br /&gt;
&amp;lt;b&amp;gt;adcert&amp;lt;/b&amp;gt; - centrify Microsoft PKI client&lt;br /&gt;
&lt;br /&gt;
To perform auto-enrollment of Computer PKI certificates (requires elegible template and communications)&lt;br /&gt;
Using the computer object to authenticate&lt;br /&gt;
 $ dzdo /usr/share/centrifydc/sbin/adcert --enroll --machine&lt;br /&gt;
Using a user to authenticate&lt;br /&gt;
 $ dzo /usr/share/centrifydc/sbin/adcert --enroll --user [ADusername]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dynamic DNS====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;addns&amp;lt;/b&amp;gt; - a dynamic DNS client for AD DNS or RFC 2136-compliant servers&lt;br /&gt;
&lt;br /&gt;
To renew DNS using machine credentials&lt;br /&gt;
 $ sudo addns --update --machine&lt;br /&gt;
To renew DNS using user credentials&lt;br /&gt;
 $ sudo addns --update --user [ADusername]&lt;br /&gt;
To renew DNS only on a specific interface (e.g. eth0)&lt;br /&gt;
 $ sudo addns --update --machine --interface eth0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Querying Centrify-enabled AD Users and Groups====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adquery&amp;lt;/b&amp;gt;: provides information about Active Directory users and groups that are UNIX-enabled by Centrify&lt;br /&gt;
&lt;br /&gt;
To view all Centrify UNIX-enabled users&lt;br /&gt;
 $ adquery user&lt;br /&gt;
will show all AD users in Express mode / Only authorized in Zone mode&lt;br /&gt;
To view all Centrify UNIX-enabled groups&lt;br /&gt;
 $ adquery groupwill show all AD groups in Express mode / Only unix-enabled in Zone mode&lt;br /&gt;
To view a user&amp;#039;s entry (UNIX passwd file style)&lt;br /&gt;
 $ adquery user [username]&lt;br /&gt;
To view a group entry (UNIX group filestyle)&lt;br /&gt;
 $ adquery group [groupname]&lt;br /&gt;
To view only the user or group&amp;#039;s AD group memberships&lt;br /&gt;
 $ adquery user [user] --adgroup&lt;br /&gt;
To view all information about a user or group  (including AD object attributes)&lt;br /&gt;
 $ adquery user|group [user or group] -A&lt;br /&gt;
To view the distinguishedName a user or group&lt;br /&gt;
 $ adquery user|group [user or group] --dn&lt;br /&gt;
To view all information and include password expiration, account lockout/enabled state&lt;br /&gt;
 $ sudo adquery user [user] -A&lt;br /&gt;
To view information about a computer&lt;br /&gt;
 $ adquery user [computername]$ -A&lt;br /&gt;
To get results from cache (instead of fetching from AD)&lt;br /&gt;
 $ adquery user|group [options] --cache-first&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Centrify Cache Commands====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adflush&amp;lt;/b&amp;gt; - clears the Centrify cache in the local computer (dc, gc, credential &amp;amp; dns)&lt;br /&gt;
&lt;br /&gt;
To flush the authorization cache&lt;br /&gt;
 $ dzdo adflush --auth&lt;br /&gt;
To rebind and force a new DC selection&lt;br /&gt;
 $ dzdo adflush --bindings&lt;br /&gt;
To flush the DNS cache&lt;br /&gt;
 $ dzdo adflush --dns&lt;br /&gt;
To expire the information from domain controllers and global catalogs&lt;br /&gt;
 $ dzdo adflush --expire&lt;br /&gt;
To force complete removal/expiration even when disconnected (use carefully)&lt;br /&gt;
 $ dzdo adflush --force&lt;br /&gt;
To refresh the krb5.conf file&lt;br /&gt;
 $ dzdo adflush --trusts&lt;br /&gt;
To clear the health history&lt;br /&gt;
 $ dzdo adflush --health&lt;br /&gt;
To clear the cloud connectors (in MFA scenarios)&lt;br /&gt;
 $ dzdo adflush --connectors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Group Policy-related Commands====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adgpupdate&amp;lt;/b&amp;gt; - triggers the group policy refresh interval&lt;br /&gt;
&lt;br /&gt;
To refresh the GPOs in the system&lt;br /&gt;
 $ adgpupdate&lt;br /&gt;
To refresh only computer GPOs&lt;br /&gt;
 $ adgpupdate --target Computer&lt;br /&gt;
To refresh only user GPOs&lt;br /&gt;
 $ adgpupdate --target User&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;adgpresult&amp;lt;/b&amp;gt; - to view a RSOP (resultant set of policy) to the local system or user&lt;br /&gt;
&lt;br /&gt;
To view the report for computer and user&lt;br /&gt;
 $ adgpresult&lt;br /&gt;
To view the report for the computer&lt;br /&gt;
 $ adgpresult --computer&lt;br /&gt;
To view the report for the current&lt;br /&gt;
 $ adgpresult --user&lt;br /&gt;
To view the report for a particular user&lt;br /&gt;
 $ dzdo adgpresult --user [user.name]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Joining Active Directory====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adjoin&amp;lt;/b&amp;gt; - joins an Active Directory domain&lt;br /&gt;
&lt;br /&gt;
To run adjoin successfully, you need&lt;br /&gt;
* to be root or sudo&lt;br /&gt;
* to have the credentials (or the keytab) of an AD user that can join computers to a container (NOT Domain Admin)&lt;br /&gt;
* to know the Distinguished Name (e.g. &amp;quot;ou=servers,ou=unix&amp;quot;) of the container that you will place the system in AD&lt;br /&gt;
* to know the domain name you&amp;#039;re joining&lt;br /&gt;
* to have a clear network path to the DC or DCs you&amp;#039;re using (dns, global catalog, kerberos, ldap, cifs, ntp).&lt;br /&gt;
&lt;br /&gt;
To join AD in workstation/express mode (AD user must be able to add computers to &amp;quot;ou=workstations,ou=unix&amp;quot;)&lt;br /&gt;
 $ sudo adjoin --workstation --container &amp;quot;ou=workstations,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD in Self-Service mode (AD/Centrify admin pre-created the machine ahead of time using AM or Centrify PS) (&amp;lt;b&amp;gt;How we do it at work&amp;lt;/b&amp;gt;)&lt;br /&gt;
 $ sudo adjoin --selfserve [domain.name]&lt;br /&gt;
To join AD in zone mode (e.g. Global zone)&lt;br /&gt;
 $ sudo adjoin --zone Global --container &amp;quot;ou=servers,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD in zone mode and don&amp;#039;t initialize (precache)&lt;br /&gt;
 $ sudo adjoin --noinit --zone Global --container &amp;quot;ou=servers,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD and trust the Computer for Delegation (must know what you&amp;#039;re doing - security implications)&lt;br /&gt;
 $ sudo adjoin --trust Global --container &amp;quot;ou=servers,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD in workstation mode and specify a workstation license&lt;br /&gt;
 $ sudo adjoin --licensetype &amp;quot;workstation&amp;quot;--workstation --container &amp;quot;ou=workstations,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To use an specific domain controller to join (e.g. dc1.hq.fabrikam.com)&lt;br /&gt;
 $ sudo adjoin --server dc1.hq.fabrikam.com Global --container &amp;quot;ou=servers,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join a Mac in Workstation mode and instruct Centrify to use the Apple algorighm to generate UID/GID scheme&lt;br /&gt;
 $ sudo adjoin --enableAppleIDGenScheme --container &amp;quot;ou=macs,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD and provide a different &amp;quot;AD name&amp;quot; than the local system name (e.g. adserver vs. localhost)&lt;br /&gt;
 $ sudo adjoin --name adserver --container &amp;quot;ou=servers,ou=unix&amp;quot; --user [AuthorizedADUser] --verbose [domain.name]&lt;br /&gt;
To join AD using keytab (kinit Authorized AD user keytab first, then run adjoin without the --user option)&lt;br /&gt;
 $ env KRB5_CONFIG=[/path/to/krb5.conf] /usr/share/centrifydc/kerberos/bin/kinit -kt /path/to/keytab [principal]&lt;br /&gt;
 $ sudo adjoin --zone Global --container &amp;quot;ou=servers,ou=unix&amp;quot; --verbose [domain.name]&lt;br /&gt;
Another way we do it at work:&lt;br /&gt;
 $ sudo adjoin --zone &amp;lt;zone_name&amp;gt; -u &amp;lt;username&amp;gt; &amp;lt;domain&amp;gt; --name &amp;lt;hostname&amp;gt; --force&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Leaving Active Directory====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;adleave&amp;lt;/b&amp;gt; - leaves an Active Directory domain&lt;br /&gt;
&lt;br /&gt;
To run adleave succesfully, you neeed:&lt;br /&gt;
* sudo or root&lt;br /&gt;
* for online leave, authorized AD user credentials&lt;br /&gt;
&lt;br /&gt;
Leave the domain and disable the computer object (orphan object left behind)&lt;br /&gt;
 $ dzdo adleave --user [Authorized ADUsername]&lt;br /&gt;
Leave the domain and remove computer object (frees license)&lt;br /&gt;
 $ dzdo adleave --user [Authorized ADUsername] --remove&lt;br /&gt;
Offline/forced leave (no AD connectivity required, must clean-up in AD)&lt;br /&gt;
 $ dzdo adleave --force&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Privilege Elevation (&amp;quot;dz&amp;quot; commands)====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;dzinfo&amp;lt;/b&amp;gt; - displays information of the user&amp;#039;s access controls&lt;br /&gt;
&lt;br /&gt;
To view self access (all)&lt;br /&gt;
 $ dzinfo&lt;br /&gt;
To view the properties of the role(s), including effectiveness&lt;br /&gt;
 $ dzinfo --roles&lt;br /&gt;
To view how you can access the system (PAM rights)&lt;br /&gt;
 $ dzinfo --pam&lt;br /&gt;
To view the commands you can run&lt;br /&gt;
 $ dzinfo --commands&lt;br /&gt;
To view the computer roles that apply to the system (requires elevation)&lt;br /&gt;
 $ dzinfo --computer-role&lt;br /&gt;
To view authorization information about about another user (requires elevation)&lt;br /&gt;
 $ dzdo dzinfo [user.name]&lt;br /&gt;
To test a command against the role&lt;br /&gt;
 $ dzinfo --test [path/to/binary] [options]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Centrify-enhanced sudo=====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;dzdo&amp;lt;/b&amp;gt; - centrify-enhanced sudo. Uses Centrify zone data in AD for commands, otherwise identical to sudo.&lt;br /&gt;
&lt;br /&gt;
To view version information (as of 2015, based on sudo 1.8.10p3)&lt;br /&gt;
 $ dzdo -V&lt;br /&gt;
Use man sudo or man dzdo for more.&lt;br /&gt;
&lt;br /&gt;
Need to check what this does:&lt;br /&gt;
 $ dzdo -l&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====DirectAudit Commands (&amp;quot;da&amp;quot; commands)====&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;b&amp;gt;dainfo&amp;lt;/b&amp;gt; - shows information about the status of the audit agent&lt;br /&gt;
&lt;br /&gt;
To view the audit agent status&lt;br /&gt;
 $ dainfo&lt;br /&gt;
To view status with verbose output&lt;br /&gt;
 $ dainfo --diag  (or dadiag)&lt;br /&gt;
To view contents of the configuration file&lt;br /&gt;
 $ dainfo --config&lt;br /&gt;
To view audited status of another user (must elevate)&lt;br /&gt;
 $ dzdo dainfo --username lisa.simpson&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;dacontrol&amp;lt;/b&amp;gt; - controls the status/configuration of the directaudit client (requires elevation)&lt;br /&gt;
&lt;br /&gt;
To set the installation (if not set by Group Policy)&lt;br /&gt;
 $ dzdo dacontrol --installation [installation-name]&lt;br /&gt;
To check if the audit agent is enabled&lt;br /&gt;
 $ dzdo dacontrol --query&lt;br /&gt;
To enable direct audit&lt;br /&gt;
 $ dzdo dacontrol --enable&lt;br /&gt;
To disable direct audit&lt;br /&gt;
 $ dzdo dacontrol --disable&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====FAQ====&lt;br /&gt;
----&lt;br /&gt;
=====&amp;lt;u&amp;gt;What happens when adjoin is run succesfully?&amp;lt;/u&amp;gt;=====&lt;br /&gt;
This activates the DirectControl agent (adclient/CentrifyDC service).&lt;br /&gt;
# Creates a computer object in AD and sets SPNs for http, host, nfs, cifs, afpserver&lt;br /&gt;
# Establishes a secure communication channel between the system and Active Directory&lt;br /&gt;
# A forest/domain/site map is created to locate the nearest DCs&lt;br /&gt;
# The Kerberos environment (krb5.conf, krb5.keytab) are maintained by Centrify (configurable).  A backup is created.&lt;br /&gt;
# Network time is synchronized with AD DCs (configurable)&lt;br /&gt;
# The PAM (Pluggable Authentication Modules) are modified to include Centrify auth, account, password, session modules. A back-up of the previous configuration is made.&lt;br /&gt;
# The NSS (Name Service Switch) providers for users and groups defaults to AD first, then other methods (e.g. files, ldap, etc).  A backup of the previous configuration is made.&lt;br /&gt;
## &amp;lt;b&amp;gt;Note&amp;lt;/b&amp;gt;: in the OS X platform, the PAM/NSS functions are channeled via the Directory Services Plugin API.&lt;br /&gt;
# An Access Control Model is enforced depending on the zone mode:&lt;br /&gt;
## In zone mode:  Authorization (RBAC) follows zone rules (defaults to closed, only authorized users can access and enabled groups are visible)&lt;br /&gt;
## In express/workstation mode:  Only Authentication is facilitated.  The system is open for all AD users and all groups are visible.&lt;br /&gt;
# Privilege Elevation:  Centrify-enhanced sudo (dzdo) becomes active based on the roles/rights defined.&lt;br /&gt;
# User/Group identity (RFC2307) data in AD is stored within the Centrify zone, NOT with the user/group object.&lt;br /&gt;
# The virtual registry is initialized and group policies are enforced.&lt;br /&gt;
&lt;br /&gt;
=====&amp;lt;u&amp;gt;What happens when adleave is run succesfully?&amp;lt;/u&amp;gt;=====&lt;br /&gt;
# Online the --remove object:  The object in AD is removed from the container and from the zone (frees license)&lt;br /&gt;
# Online the without --remove object:  The object in AD is marked as disabled.  Must be ovewritten to rejoin.&lt;br /&gt;
# Offline:  The object in AD is left orphaned.  Cleanup must happen via any Centrify API (AM, PowerShell, adedit)&lt;br /&gt;
# The UNIX environment is reset and rolled back (Kerberos, PAM, NSS)&lt;br /&gt;
# The Centrify adclient (CentrifyDC) service is disabled.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Important Files and Folders====&lt;br /&gt;
----&lt;br /&gt;
* &amp;lt;b&amp;gt;/usr/share/centrifydc/&amp;lt;/b&amp;gt; &lt;br /&gt;
** /bin &amp;gt; contains user binaries, including centrify-enhanced openldap tools like ldapsearch&lt;br /&gt;
** /sbin &amp;gt; contains system binaries, including adcert and centrify-enhanced OpenSSH&lt;br /&gt;
** /samples &amp;gt; sample files for hadoop, adedit and local account management&lt;br /&gt;
Note: on OS X El Capitan, things changed to /usr/local/share/centrifydc&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;/etc/centrifydc&amp;lt;/b&amp;gt;&lt;br /&gt;
** /centrifydc &amp;gt; config files for the DirectControl agent&lt;br /&gt;
** /centrifyda &amp;gt; config files for the DirectAudit agent&lt;br /&gt;
** /centrifycc &amp;gt; config files for the Privilege Service CLI Toolkit for AAPM&lt;br /&gt;
** /openldap &amp;gt; config files for Centrify-enhanced OpenLDAP proxy if installed&lt;br /&gt;
** /ssh &amp;gt; config files for Centrify-enhanced OpenSSH&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;var/centrifydc&amp;lt;/b&amp;gt;&lt;br /&gt;
** kset* files &amp;gt; dynamic information about the environment&lt;br /&gt;
** reg &amp;gt; virtual registry, contains the computer and user hives  (user GPO disabled on Servers)&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;/var/centrify&amp;lt;/b&amp;gt;&lt;br /&gt;
** net/certs &amp;gt; location of any Microsoft Certificate Authorithy auto-enrolled certs, keys and trust chain&lt;/div&gt;</summary>
		<author><name>Ardika Sulistija</name></author>
	</entry>
</feed>