Adaptive Multi-Factor Authentication (MFA)


Add an extra layer of security only when needed — and based on risk rating — to reduce the threat associated with compromised privileged credentials. Configure behavior-based access control for IT admins who access Windows and Linux servers, elevate privilege or leverage privileged credentials.

Guard Against Attacks with Behavior-Based Access Control

  • Extra layer of security for users logging into Windows, Linux and UNIX systems or who require privilege elevation.
  • Keep accounts secure even if your privileged credentials are compromised.
  • Easily implement one cohesive solution to enforce PCI DSS’ multi-factor authentication (MFA) requirements across your enterprise for all your privileged local, remote and third-party users who require access to your sensitive data environment.
  • Reinforce privileged access policies with additional multi-factor authentication (MFA).
  • Guard against cyber threats to prevent access to valuable data.
  • Flexible choices for MFA challenges, including those you already own — RSA environments, OATH-based tokens, USB PKI keys and smart cards, including derived credentials for regulatory compliance.


Multi-factor authentication (MFA) adds a layer of security that allows organizations to protect against today’s leading cause of data breaches — privileged access abuse. Privileged users simply provide extra information or factors when they access critical enterprise resources.

Multi-factor authentication uses a combination of the following factors:


Risk-Based Policies for Password Checkouts and Privileged Sessions

Identify anomalous behavior while it is happening, by enforcing risk-aware policies for users who are initiating a privileged session or checking out a password. Combining risk-aware policies with role-based access controls, user context and multi-factor authentication (MFA) enable intelligent, automated, real-time decisions on whether to grant privileged access. These dynamically enforced access policies grant the user access, prompt for a second factor of authentication, or block access completely.


Interoperability with Third-Party Authentication Methods

Centrify’s adaptive multi-factor authentication (MFA) capabilities are designed to work well with existing investments in RSA, OATH-based tokens and smartcards such as PIV/CAC. These can all be brought under Centrify’s centralized management and enforced across your enterprise.

See Centrify Privilege Threat Analytics Service in Action

Centrify Privilege Analytics Service

Add an extra layer of security to stop the breach with risk-aware MFA for IT admins who access Windows and Linux systems, elevate privilege or leverage privileged credentials.

READ THE Centrify Privilege Threat Analytics Service DATA SHEET


Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial