Products

Workflow Service

Just-in-Time Privileged Access

Minimize risk by requiring administrators to request the privileges they need to access and manage systems and network devices for just the amount of time they need — from anywhere. Centrify Platform provides a built-in workflow for self-service access requests and approvals that spans privileged roles, password checkout, and privileged sessions. With Centrify, organizations enforce zero standing privileges with a flexible, just-in-time model that accommodates dynamic business needs.

Control All Privileged Access with Request and Approval Workflows

dia Workflow

Workflow for privileged access reinforces a zero standing privileges model and limits damage during a cyber-attack — protecting even when credentials are compromised.

Simplify and Secure

Eliminate privilege abuse with zero standing privileges

Simplify with one workflow solution for all privileged access

Dynamic policies limit the scope and duration of approvals

Workflow_1

Multi-Level Approval Workflow

Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.

Workflow_2

User Context

Access requests include user- and Centrify PAM-supplied context so that approvers can make informed grant/deny decisions. Context can consist of, for example, user-supplied rationale, trouble ticket number, role name, system name, timeframe, and duration.

Workflow_3

Time-bound Privileged Access

Centrify Platform’s workflow service streamlines role assignments and approvals. Role assignments can be permanent or short-lived. Upon expiration, the roles are automatically deprovisioned, returning to a zero standing privilege posture.

Workflow_4

Approve from Anywhere

As a SaaS service accessible from anywhere, Centrify Platform streamlines the approval workflow process by sending requests to a supervisor’s device, allowing for timely approvals and increased productivity.

Workflow_5

Govern Privileged Access

Minimize your attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls work as designed with reporting on approved privileged access versus actual access to critical infrastructure.

Workflow_6

Privileged Access Request - 3rd Party Integrations

IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial