Secure communication between a company's internal network (AD or LDAP) and CyberArk Identity: is a connector function
Radius Server and Client: is a connector function
VPN gateway: is not a connector function
User Behavior Analytics gateway: is not a connector function
App gateway: is a connector function
Integrated Windows authentication (IWA): is a connector function
LDAP proxy: is a connector function
Firewall: is not a connector function
CyberArk Identity connectors serve as bridges between CyberArk Identity and other components of an organization's IT infrastructure:
Secure communication with a company's internal directory services like Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) is facilitated by CyberArk Identity connectors to ensure secure user authentication and synchronization.
Radius Server and Client functionality is often supported by CyberArk Identity connectors to enable multi-factor authentication (MFA) and integrate with various network devices and services.
VPN gateways are typically separate network devices or services that handle the security for virtual private network traffic and are not managed by CyberArk Identity connectors.
User Behavior Analytics (UBA) gateways are specialized services for analyzing user activities and detecting potential security threats; they are separate from the standard connector functions.
App gateways refer to application gateways that manage traffic to web applications, which can be part of CyberArk Identity's connector functionalities for single sign-on (SSO) and secure application access.
Integrated Windows Authentication (IWA) is a secure method for users to sign in to applications that can be facilitated by CyberArk Identity connectors to allow seamless authentication.
LDAP proxy functionality is within the scope of CyberArk Identity connectors to provide additional security and abstraction layers for LDAP operations.
Firewall management is beyond the scope of CyberArk Identity connectors as it is a network security system that controls incoming and outgoing network traffic based on predetermined security rules.