Time-Based Role Assignment

Self-Service Role Requests for Just-in-Time Privilege

Minimize security risk by enabling administrators to systematically request a new role to obtain the rights they need to perform tasks. Access request for privileged roles enables organizations to grant temporary privileges and roles with a flexible, just-in-time model that accommodates fluctuating business needs.

Minimize Cyber Risk Exposure & Limit Lateral Movement

  • Reduce risk by minimizing the attack surface with temporary, time-bound privileged access to on-premises and cloud-based infrastructure.
  • Automatically limit the duration for which approvals are valid.

Self-Service Role Requests for Just-In-Time Privilege

Enable administrators to log in as themselves and elevate privilege by systematically requesting a new role assignment to obtain the rights they need to perform tasks. Self-service request system facilitates the request for the specified role and time period, and if approved will automatically revoke that entitlement upon expiration.

Time-Bound Privileged Access

Time-Bound Privileged Access

Minimize the attack surface by enabling temporary, and time-bound access to privileged accounts and privileged roles for just-in-time privilege. Grant IT admins access to privileged account credentials, remote management sessions or when they need to temporarily modify their role assignment for performing additional admin tasks. Optionally, monitor privileged sessions for suspicious activity and terminate instantly. Prove that access controls are working as designed with reporting on approved privileged access versus actual access to critical infrastructure.


Privilege Elevation Request via Third Party Solutions

Reduce the risk of data breaches by requiring approval for IT users who need access to systems with privileged roles. IT users of the ServiceNow® asset management and configuration management database (CMDB) or SailPoint Technologies® identity governance and administration solutions can request usage of a role with privileges to access specific servers for a designated time period. Approvals are granted or denied through a workflow-based management process.

Learn how the Privilege Elevation Service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege.

See Centrify Privilege Elevation Service in Action

Centrify Privilege Elevation Service: Just Enough, Just-in-Time Privilege

Watch this video to learn how Centrify Zero Trust Privilege Services help establish a just enough, just-in-time privilege approach across on-premise and cloud infrastructure

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial