Conjur

Conjur is an open source security service that integrates with popular tools to secure secrets, provide machine identity based authorization, and more.

Run Your Own Conjur Server

Running your own Conjur server gives you total control over the software.

Try Conjur in the Cloud

The quickest way to get started using Conjur. Get immediate access to a running server in the cloud. Not for production secrets.

Conjur Features

Machine Identity icon

Machine Identity

Machine Identity is the heart of Conjur. Conjur was designed from the ground up to support security automation workflows of all kinds - secrets management, SSH, traffic authorization, container environments, configuration management, and custom access control scenarios.
Secrets Management icon

Secrets Management

Conjur provides a policy framework to manage access to secrets. The policy definitions contain no secret themselves, making them safe and easy to share, review, and edit among a group of people without exposing confidential information. With secrets abstraction, even the users of secrets need not know their values.
Authorization icon

Authorization Model

Conjur’s machine identity capabilities are built on the foundation of RBAC, ensuring that the automated workloads managed by Conjur are running with proven and scalable security properties. Conjur's policy management can be managed strictly, ensuring that security rules at scale is both tightly managed and scalable.
Scalability icon

Scalability

Conjur has collected extensive benchmarks of the scale-out performance of Conjur, and can demonstrate linear scaling from clusters of 1 machine to 10 or more. Conjur can demonstrate the fully authenticated, authorized, retrieval of up to 4 million secrets per minute.
Containers icon

Built for Containers

Containers come with their own security challenges and Conjur is specifically built with those in mind. Conjur uniquely identifies containers where each container has its own unique permissions (RBAC) managed by a Conjur root policy. Applications and services running on those containers are also uniquely authenticated and authorized, making sure secrets are shared securely only with their intended recipients.
Integrations icon

Integrations

CyberArk officially provides and supports integration libraries between Conjur and external tools such as Puppet, Ansible, and Summon, as well as API libraries for Ruby, Go, Java, and .NET. CyberArk has officially partnered with Puppet to provide joint support for the Conjur Puppet Module. CyberArk is extending this partnering relationship to other major tool vendors in the DevOps space.

Learn about Conjur Enterprise

  • Admin Web UI and Activity Dashboard
  • Cloud SSH authorization and permission level management
  • Password rotation
  • Tamper-proof audit and export of audit data
  • CyberArk Privileged Account Security Solution integration
  • Infrastructure elastic auto-scaling
  • Multi Datacenter Deployment
  • HSM support

How Conjur Works

To use Conjur, you write policy files to enumerate and categorize the things in your infrastructure: hosts, images, containers, web services, databases, secrets, users, groups, etc. You also use the policy files to define role relationships, such as the members of each group, and permissions rules, such as which groups and machines can fetch each secret. The Conjur server runs on top of the policies and provides HTTP services such as authentication, permission checks, secrets, and public keys. You can also perform dynamic updates, such as change secret values and enroll new hosts.

What's Happening?

Webinar

Best Practices for Securing Containerised Applications

November 30

Survey

CyberArk Global Threat Landscape Survey – FOCUS ON DEVOPS

Only 25% of security professionals report that their organization has a secrets management strategy for DevOps