Group Policy Management

Enforce Group Policies for Users and Heterogeneous Systems

Centrify delivers comprehensive support for extending group policy management to non-Windows systems. It’s the only solution to provide user and computer policies with advanced features such as group filtering and loopback processing.

Seamlessly Integrate into the Centrify UNIX Agent to Manage Configuration of both System Configuration and User’s Environment

Screen Group Policy

Enforce Active Directory Group Policies Across Non-Windows Platforms

To enforce Active Directory Group Policies across non-Windows platforms, Centrify Authentication Service applies configuration settings to each appropriate managed system and the users logging in to it. For each computer, Centrify contacts Active Directory to determine the relevant policies and copies them to a set of virtual registry files. System files are refreshed in the same way as Windows: On demand, at user log in, on computer restart, and at periodic intervals defined by group policy.

Manage Authentication, Access Control, and Group Policy for Non-Windows Systems

Organizations can use group policy to automate firewall and SSH configuration, decide which users can connect to each system, drop inactive sessions and act as a network-based authentication. Centrify provides the only solution that manages authentication, access control and group policy for non-Windows systems through a single agent that can:

  • Reduce IT infrastructure costs and complexity, as well as streamline operations using your current Active Directory tools for enterprise-wide management.
  • Strengthen security with automated, consistent management of configuration files for individual computers or groups of computers.
  • Centrally configure the policies that the Centrify Agent uses to authenticate and authorize.
  • Efficiently control crontab files, firewall settings, screensaver password lock and other properties.
  • Automatically issue and renew PKI certificates for each computer for stronger identification.
  • Enable security managers to define consistent global policies for diverse systems without specific OS and system information.
  • Leverage ready-to-use group policies for Linux and UNIX with standard administrative templates for policy definition and scripts for client-side processing.

Go beyond the vault and properly verify who requests privileged access with Authentication Service.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial