Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >

Introducing Centrify DirectSecure Part 3: Leveraging the Racoon Internet Key Exchange (IKE) Daemon

11 April,19 at 11:49 AM


Part 3 of our series takes a deeper look at the architecture of Centrify DirectSecure, explaining how Centrify leveraged and customized the Racoon Internet Key Exchange (IKE) protocol daemon to efficiently and reliably secure your local and wide area networks. For more background, see Introducing Centrify DirectSecure Part 2: Securing UNIX and Linux Systems with IPsec and Active Directory


Running Time: 40 minutes


Paul Moore, Chief Technical Officer


David McNeely, Director, Product Management


Topics Covered

  • Enhancing Racoon for both Linux and Solaris platforms for enterprise-scale applications
  • How Racoon diverged from the Open SWAN, Free SWAN, and Strong SWAN IKE code bases
  • Using Coverity and Valgrind to bullet-proof open source code for enterprise use
  • How DirectSecure and IKE use certificate trust chains and CRLS