Shared Account & Password Vault

Manage Your Shared Accounts and Passwords Securely

While today’s threatscape is leaning towards individual identities rather than shared accounts to achieve increased assurance levels as mandated by newer legislation and industry best practices, there will still be shared passwords in many organizations. Thus, it’s vital in a first step to discover and register all machines and then vault all shared, alternate admin and service accounts. Access to those accounts is then brokered for users, services and applications.

Reduce Risk When Sharing Privileged Accounts

Automatically Discover Systems and Service Accounts

Automatically Discover Systems and Service Accounts

Windows, and domain-joined Linux and UNIX systems and their associated service accounts are automatically discovered in Active Directory and taken under management. Domain accounts used to launch Windows services and scheduled tasks on infrastructure and endpoints are also discovered and managed. For resources not in Active Directory, Centrify’s port scanning discovery method can discover network devices, Windows, Linux and UNIX systems, as well as local accounts.

Password Vault, password vaulting, enterprise password management by Centrify

Secure Checkout of Account Passwords

Authorized IT, whether internal or outsourced, and third-party vendors can check out passwords for shared accounts, including service, application and database accounts for a limited duration. Centrify provides the option to take passwords under its full control, where it automatically changes the password after the checkout expires or simply stores the password for future access without changing it.

Enterprise Password Vault, Enterprise Password Management

Session Establishment Without Disclosing Passwords

Authorized users can access resources using shared accounts without knowing the passwords and Centrify will not expose the passwords. IT admins can use shared accounts without encountering the risk of password sharing or unauthorized access.


Streamline Secure Privileged Access for Local Clients

Users initiate RDP and SSH sessions directly from their local Windows systems for privileged access that doesn’t disrupt their daily routine. Maintain the same level of security and control for privileged sessions with monitoring, session termination and multi-factor authentication (MFA).

Learn how organizations can establish core privileged access controls across their growing attack surface.


Risk-Aware Policies for Checkouts and Privileged Sessions

Identify anomalous behavior while it is happening by enforcing risk-aware policies for users who are initiating a privileged session or checking out a password. Combining risk-level with role-based access controls (RBAC), user context and multi-factor authentication (MFA) enables intelligent, automated, real-time decisions on whether to grant privileged access or block it. These dynamically enforced access policies grant the user access, prompt for a second factor of authentication or block access completely.

iphone with password checked out

Break-Glass Access to Passwords from a Mobile Device

Get controlled, emergency access to privileged account passwords from your mobile device enrolled in the Centrify Zero Trust Privilege Services. Secured password checkout requires a PIN or fingerprint validation. Checkout automatically times out based on per-resource policy.


Government-Grade, Secure and Encrypted Storage for Your Data

Your data is securely stored using the Centrify Zero Trust Privilege Services for all user, resource, account, password and secrets information. Centrify also supports SafeNet KeySecure key management appliances from Gemalto as an alternative for encrypted storage of account passwords and secrets.

Learn More About Centrify and Shared Accounts & Password Vaults

See Centrify Privilege Access Service in Action

Centrify Automatic Discovery of Systems and Service Accounts

Watch this video to learn how Centrify Privilege Access Service automatically discovers Windows, Linux and UNIX systems and their associated service accounts.

Centrify Break-Glass Access to Passwords

Watch this video to learn how to get controlled, emergency access to privileged account passwords from your mobile device.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial