Centrify Authentication Service

Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.


Multi-Directory Brokering

Simplify user authentication to servers from any directory service including Active Directory, LDAP and cloud directories. Organizations can take advantage of the benefits of the cloud without compromising the level of privileged access security and enterprise access they currently have on-premises.

AD Bridging diagram

Active Directory Bridging

Secure Linux and UNIX with the same identity services currently used to secure access to Windows systems. Centralize discovery, management and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory.

Machine credentials diagram

Machine Identity & Credential Management

Centrally manage machine identities and their credentials within Active Directory or the Centrify Zero Trust Privilege Services to establish an enterprise root of trust for machine-to-machine authentication based on a centralized trust model.


Local Account & Group Management

Manage system accounts the same way you would manage user accounts in Active Directory. Instead of using a variety of IT tools to provision, maintain and decommission local accounts and groups, leverage the Centrify Authentication Service capabilities to take care of the job. Save time and money while increasing your IT staff’s productivity.

Go beyond the vault and properly verify who requests privileged access with Authentication Service.

Limit Lateral Movement diagram

Centrify Zone Technology

Quickly consolidate complex and disparate UNIX and Linux user identities into Active Directory with Centrify's patented Zone technology — without having to first rationalize all user identities. Centrify's Zone Technology enables you to manage your heterogeneous environment by tying the rights a user has on a Windows, Linux or UNIX system with a single identity, stored and managed in Active Directory.

Review and Approve

Group Policy Management

Manage authentication, access control, and group policy for non-Windows systems the same as Windows. Use Active Directory group policy to automate firewall and SSH configuration, decide which users can connect to each system, drop inactive sessions and act as a network-based authentication.

MFA at System Login diagram

MFA at System Login

Login to privileged systems is often the primary attack interface, which must be protected from cyber adversaries who wish to steal information or do harm in the environment. Multi-factor authentication at login for Linux, UNIX, and Windows servers minimize the risk of exposure and fulfills stringent regulatory mandates like PCI DSS and NIST 800-63A.

We needed to get away from admins having to use multiple IDs — or worse — sharing a common identity on the same box...Centrify has allowed us to accomplish all of our goals.

Scott Teipe, Manager of Information Security for GOGO, Inc.

Learn More About Centrify Authentication Service

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial