Multi-Directory Brokering


Simplify user authentication to servers from any directory service including Active Directory, LDAP or cloud directories such as Google's. Organizations can take advantage of the benefits of the cloud without compromising the level of privileged access security and enterprise access they currently have on-premises. In addition, IT managers save time managing a heterogenous IT environment, achieving dramatic cost savings for the organization.

Secure Identities, Access and Privilege for All Infrastructure

  • Broker authentication to Active Directory, LDAP and other cloud directories without requiring direct connections from Linux or Windows Servers.
  • Centralize authentication services across independent Active Directory environments for infrastructure and applications.
  • Extend enterprise authentication services to the cloud without replicating identities.
  • Simplify authentication across on-premises, private cloud and public cloud.
  • Rapidly integrate authentication services for infrastructure and applications during mergers and acquisitions, as well as independent business units.
  • Reduce complexity of enterprise authentication for highly distributed cloud deployments.

Authenticate to Linux and Windows Servers with Any Directory Service

Users can authenticate directly to resources in your data center or an Infrastructure-as-a-Service (IaaS) environment. Centrify Authentication Service via the Centrify Identity Broker manages the authentication seamlessly to any LDAP, Active Directory or cloud directory.


Single Point of Authentication Control for Geographically Distributed Infrastructure

Enable centralized authentication and access controls to geographically dispersed infrastructure, leveraging identities from one or more Active Directory environments, LDAP Directories or cloud directories such as Centrify Directory or Google Directory.

Trusted by over 2,000 Organizations, Worldwide

Centrify Authentication Service

centrify AUTHENTICATION service

The Centrify Authentication Service data sheet outlines how customers can go beyond the vault and properly verify who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts, and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

get data sheet

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial