Time-bound, Temporary Roles Grant Just-in-Time Privilege
Minimize risk by requiring administrators to request roles to obtain the privileged access they need to manage systems and network devices for just the amount of time they need – from anywhere. Access request for privileged roles, password checkout, and privileged sessions enables organizations to maintain zero standing privilege with a flexible, just-in-time model that accommodates dynamic business needs.
Minimize Cyber Risk Exposure & Limit Lateral Movement
Self-Service Role Requests for Just-In-Time Privilege
Enable administrators to elevate privilege by requesting a role that grants rights to perform tasks. Centrify’s privileged access request workflows streamline role assignment and approvals. Role assignments can be long-lived or temporary, restoring the administrator’s zero standing privilege upon expiration.
Multi-Level Approval Workflow & Auditing
Easy to configure multi-level approval workflows ensure managers and other approvers review associated context before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.
Support for Mobile Approval
As a SaaS service accessible from anywhere, Centrify Platform workflow service streamlines the approval workflow process by sending approval requests to a supervisor’s device for timely approvals and increased productivity.
Govern Privileged Access
Minimize the attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls work as designed with reporting on approved privileged access and actual access to critical infrastructure.
Privileged Role Request via Third-Party Solutions
IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.
Automate Privileged Role Assignment
Instantly grant privilege to outsourced IT and outsourced development teams through automated privileged role assignments. Context furnished by the identity provider to the Centrify Platform determines dynamic role assignments and privileged access security policies.
Learn More About Centrify Cloud Suite
Centrify Cloud Suite
Govern and Control Access to your Cloud- or Multi Cloud-Hosted IT Infrastructure
A Leader in The Forrester Wave: Privileged Identity Management (PIM), Q4 2020
The Forrester Wave™: Privileged Identity Management, Q4 2020 includes 10 providers based on a 24...