Local Account & Group Management


With the Centrify Authentication Service customers can streamline the management of local accounts and groups across their heterogenous infrastructure. Centrify automates the creation of local accounts and integrates with password vaults where necessary for services or applications to centralize all account and group management within one management platform.

Centralize and Automate the Management of Local Accounts and Groups

  • Centralize the creation and management of local accounts.
  • Automate the integration with password vaults for simplified password management.
  • Centrally manage local groups to ensure stable and consistent security policies.
  • Leverage the power of Centrify Zones to define default local accounts for different sets of systems that may have different service account or local group requirements.

Consolidate Local Accounts. Secure and Manage Passwords

Centrally manage the life cycle for application and service accounts, and automatically secure credentials and access. Minimize your attack surface by using Centrify Zones to uniformly provision and de-provision identities across the systems running your applications.


Integrate Local Account Password Management with Existing Password Vaults

Life cycle management for local accounts includes customizable integration with existing password vaults, automating the account registration and password vaulting for newly created accounts. Password vault integration simplifies the administration of these accounts and ensures their passwords are secured upon creation.




Centralize Management of Local Groups

Local Groups can be centrally managed to ensure consistency across a set of computers as well as to ensure they have a consistent set of members to those groups. Administrators can ensure that membership is not changed from the centrally defined configuration for critical security groups such as wheel.

Centrify Authentication Service

centrify AUTHENTICATION service

The Centrify Authentication Service data sheet outlines how customers can go beyond the vault and properly verify who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts, and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

get data sheet

Trusted by over 2,000 Organizations, Worldwide

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial