Identity consolidation and privileged access management across Windows, Linux, and UNIXEnterprise Edition
Detailed auditing of privileged user sessions on Windows, Linux and UNIXPlatinum Edition
Dynamic segmentation and isolation of cross-platform systemsApplication Edition
Secure, centralized single sign-on to on-premises business applications
Single sign-on and unified management for cloud and mobile apps and devicesMac Edition
Centralized security and management for Macs and mobile devicesPremium Edition
SaaS and Mac Editions combined with mobile security managementCentrify for Samsung KNOX
Enterprise management of SSO, MCM and MDM for Samsung KNOX
Centrify Server Suite, Platinum Edition, lets you dynamically segment and isolate cross-platform systems by not relying on user authentication, but instead uses machine authentication to ensure that only trusted systems on your network can establish network communication with each other. This end-point authentication of a computer's machine credentials is based on Kerberos, PKI certificates, or pre-shared keys. Optionally, encryption can be enforced to secure communications between end points. Microsoft provides this capability as a standard part of the Windows platform and refers to this functionality as server and domain isolation (SDI). Centrify Server Suite, Platinum Edition’s DirectSecure feature set extends this same capability to non-Microsoft platforms, thereby enabling comprehensive support of mixed UNIX, Linux and Windows environments.
The DirectSecure feature set enforces the logical boundaries that you define through end-point authentication policies that are created, distributed and managed through Active Directory Group Policy. Policy deployment occurs seamlessly when a computer joins the Active Directory domain. Through Centrify's support for Group Policy, the same policies that Microsoft provides for Server and Domain Isolation can be applied to UNIX and Linux systems.
Policies are enforced by the built-in IPsec functionality found in modern Windows, UNIX and Linux platforms. Instead of the traditional use of IPsec as a tunneling and network encryption protocol (such as remote access through VPN), both Microsoft SDI and DirectSecure employ IPsec "transport mode" for end-to-end security between computers, even across Network Address Translation (NAT). Because IPsec is a Layer 3 security protocol, it provides security for all IP-based traffic and operates transparently to users and applications. Therefore, applications don't need to support IPsec — and require no modifications — to be compatible with this form of authentication and encryption.
With these policies in place, trusted systems are now protected and can easily communicate with each other without any additional steps and/or login procedures. Unmanaged or rogue computers are not able to establish network communication with systems protected within the logically isolated network.