Planning a deployment

This chapter describes the decisions you need to make during the planning phase of a deployment and summarizes what’s involved in deploying identity management, privilege management, audit and monitoring service, and Centrify agents. It includes simplified diagrams that highlight the steps involved.

Because of its multi-tier architecture and storage requirements, most of the information in this section applies to planning a deployment of audit and monitoring service. If you are only interested in deploying identity and privilege management without auditing, you should scan What’s involved in the deployment process for relevant topics and continue to Installing authentication, privilege elevation, and audit and monitoring services and updating Active Directory.