Group Policy Management


Centrify delivers comprehensive support for extending group policy management to non-Windows systems. It’s the only solution to provide user and computer policies with advanced features such as group filtering and loopback processing.

Seamlessly Integrate into the Centrify UNIX Agent to Manage Configuration of both System Configuration and User’s Environment

  • Leverage existing group policy tools and processes to standardize security configurations across UNIX and Linux.
  • Automate consistent security configurations for systems with group policy such as Centrify and Kerberos configuration management, host-based firewall configuration and OpenSSH configuration.
  • Standardize user environment configurations on Linux such as screen auto-lock after inactivity and desktop environment configuration (Gnome).
Screen Group Policy

Enforce Active Directory Group Policies Across Non-Windows Platforms

To enforce Active Directory Group Policies across non-Windows platforms, Centrify Authentication Service applies configuration settings to each appropriate managed system and the users logging in to it. For each computer, Centrify contacts Active Directory to determine the relevant policies and copies them to a set of virtual registry files. System files are refreshed in the same way as Windows: On demand, at user log in, on computer restart, and at periodic intervals defined by group policy.

Manage Authentication, Access Control, and Group Policy for Non-Windows Systems

Organizations can use group policy to automate firewall and SSH configuration, decide which users can connect to each system, drop inactive sessions and act as a network-based authentication. Centrify provides the only solution that manages authentication, access control and group policy for non-Windows systems through a single agent that can:


  • Reduce IT infrastructure costs and complexity, as well as streamline operations using your current Active Directory tools for enterprise-wide management.
  • Strengthen security with automated, consistent management of configuration files for individual computers or groups of computers.
  • Centrally configure the policies that the Centrify Agent uses to authenticate and authorize.
  • Efficiently control crontab files, firewall settings, screensaver password lock and other properties.
  • Automatically issue and renew PKI certificates for each computer for stronger identification.
  • Enable security managers to define consistent global policies for diverse systems without specific OS and system information.
  • Leverage ready-to-use group policies for Linux and UNIX with standard administrative templates for policy definition and scripts for client-side processing.
Centrify Authentication Service

centrify AUTHENTICATION service

The Centrify Authentication Service data sheet outlines how customers can go beyond the vault and properly verify who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts, and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

get data sheet

Trusted by over 2,000 Organizations, Worldwide

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial