Just-in-Time Privileged Access
Minimize risk by requiring administrators to request the privileges they need to access and manage systems and network devices for just the amount of time they need — from anywhere. Centrify Platform provides a built-in workflow for self-service access requests and approvals that spans privileged roles, password checkout, and privileged sessions. With Centrify, organizations enforce zero standing privileges with a flexible, just-in-time model that accommodates dynamic business needs.
Control All Privileged Access with Request and Approval Workflows
Workflow for privileged access reinforces a zero standing privileges model and limits damage during a cyber-attack — protecting even when credentials are compromised.
Simplify and Secure
Eliminate privilege abuse with zero standing privileges
Simplify with one workflow solution for all privileged access
Dynamic policies limit the scope and duration of approvals
Multi-Level Approval Workflow
Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.
Access requests include user- and Centrify PAM-supplied context so that approvers can make informed grant/deny decisions. Context can consist of, for example, user-supplied rationale, trouble ticket number, role name, system name, timeframe, and duration.
Time-bound Privileged Access
Centrify Platform’s workflow service streamlines role assignments and approvals. Role assignments can be permanent or short-lived. Upon expiration, the roles are automatically deprovisioned, returning to a zero standing privilege posture.
Approve from Anywhere
As a SaaS service accessible from anywhere, Centrify Platform streamlines the approval workflow process by sending requests to a supervisor’s device, allowing for timely approvals and increased productivity.
Govern Privileged Access
Minimize your attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls work as designed with reporting on approved privileged access versus actual access to critical infrastructure.
Privileged Access Request - 3rd Party Integrations
IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.