Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

Introducing Centrify DirectSecure Part 3: Leveraging the Racoon Internet Key Exchange (IKE) Daemon

11 April,19 at 11:49 AM

 

Part 3 of our series takes a deeper look at the architecture of Centrify DirectSecure, explaining how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks. For more background, see Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory

 

Running Time: 40 minutes

 

Speaker
Paul Moore, Chief Technical Officer

 

Moderator
David McNeely, Director, Product Management

 

Topics Covered

  • Enhancing Racoon for both Linux and Solaris platforms for enterprise-scale applications
  • How Racoon diverged from the Open SWAN, Free SWAN, and Strong SWAN IKE code bases
  • Using Coverity and Valgrind to bullet-proof open source code for enterprise use
  • How DirectSecure and IKE use certificate trust chains and CRLS

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.