Just-in-Time Privilege

Just in Time

Time-bound, Temporary Roles Grant Just-in-Time Privilege

Minimize risk by requiring administrators to request roles to obtain the privileged access they need to manage systems and network devices for just the amount of time they need – from anywhere. Access request for privileged roles, password checkout, and privileged sessions enables organizations to maintain zero standing privilege with a flexible, just-in-time model that accommodates dynamic business needs.

Minimize Cyber Risk Exposure & Limit Lateral Movement

Enable controlled, incident-based access to Administrator or root privileges.
Require workflow-based approvals for roles, credentials, or privileged sessions.
Automatically limit when privilege can be used and for how long.
Ensure accountability by reporting on who has access and who granted that access.
Role Request Screen

Self-Service Role Requests for Just-In-Time Privilege

Enable administrators to elevate privilege by requesting a role that grants rights to perform tasks. Centrify’s privileged access request workflows streamline role assignment and approvals. Role assignments can be long-lived or temporary, restoring the administrator’s zero standing privilege upon expiration.

workflow report

Multi-Level Approval Workflow & Auditing

Easy to configure multi-level approval workflows ensure managers and other approvers review associated context before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.


Support for Mobile Approval

As a SaaS service accessible from anywhere, Centrify Platform workflow service streamlines the approval workflow process by sending approval requests to a supervisor’s device for timely approvals and increased productivity.

screen Just in Time

Govern Privileged Access

Minimize the attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls work as designed with reporting on approved privileged access and actual access to critical infrastructure.


Privileged Role Request via Third-Party Solutions

IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.


Automate Privileged Role Assignment

Instantly grant privilege to outsourced IT and outsourced development teams through automated privileged role assignments. Context furnished by the identity provider to the Centrify Platform determines dynamic role assignments and privileged access security policies.

Learn More About Centrify Cloud Suite

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us