After you have verified the successful deployment on target computers, there are many ways you can refine, manage, and enhance on-going operations.

Here are a few of the key ways you can add value after deployment:

  • Add custom roles and role assignments for users, groups, and computers.
  • Import custom permissions from sudoers configuration files.
  • Deploy group policies on the appropriate organizational units.
  • Add the auditing infrastructure and add auditing to custom roles.
  • Integrate Centrify software and Active Directory authentication and authorization services with database or web applications.