Products

Active Directory Bridging

Identity Consolidation and Management for Linux and UNIX

Centrify Authentication Service allows customers to unify their IT infrastructure by centralizing identity, authentication and access management for Linux and UNIX within Microsoft Active Directory. Centrify was the first vendor to integrate UNIX and Linux into Active Directory and establish a single identity for users across hybrid infrastructure. In the 2020 Magic Quadrant for Privileged Access Management (PAM), Gartner specifically calls out Centrify’s unique strength in this area, which is a popular capability among customers and prospects alike due to its potential to increase IT productivity, lower IT maintenance costs, and reduce the attack surface.

The Simplicity of a Single Identity. The Power of Active Directory.

Consolidate identities for over 450 platforms into Active Directory with a non-intrusive solution that streamlines IT processes. Leverage investments in infrastructure and skillsets.
Grant users the right to access only the systems required by their job role(s). Seamlessly access those systems using Kerberos-enabled SSH tools or Centrify’s enhanced PuTTY.
Native support for all the complexity and nuances of Active Directory, including automatic registration of new systems with DNS to ensure IT admins can seamlessly access newly joined systems.
Reduce helpdesk burden by enabling single sign-on (SSO) to Linux and UNIX systems and ultimately reducing operational costs associated with password resets.
active-directory-integration

Popular and Powerful Identity Consolidation

Natively join Linux and UNIX systems to Active Directory, turning the host system into an Active Directory client. Secure systems using the same authentication and Group Policy services currently deployed for Windows systems. Requiring users to authenticate with a single identity across all systems ensures accountability, reduces the attack surface, and simplifies compliance reporting on who has access to what systems.

centralized-identity-access-and-management

Consolidate User Profiles. Enforce Separation of Duties.

Centrify's patented Zone technology consolidates complex and disparate non-Windows identities into Active Directory for greater security and manageability. No software is installed on domain controllers and no schema changes are needed to store UNIX identity data in Active Directory. Centrify Zones transform Active Directory's flat container and delegation model to align with your chosen governance model and ensure separation of administrative duties.

group-policy

Enforce Group Policies

Centrify delivers comprehensive support for extending group policy management to non-Windows systems. It’s the only solution to provide user and computer policies with advanced features such as group filtering and loopback processing. Group policy configuration settings are seamlessly integrated into the Centrify Agent to manage the configuration of both the system and the user’s environment.

screen-hierarchy-screenshot

Complex Active Directory Environment Support

While many vendors claim support for Kerberos, only Centrify provides native support for all the complexity and nuance of Active Directory. For example, the Centrify Agent has robust support for automatic discovery of the nearest domain controller, the global catalog, one- or two-way cross-forest trusts, multi-site environments, domain controller failover and disjoint Active Directory-DNS namespaces.

screen shot migration wizard

Thousands of Successful Deployments Enabled Through Powerful Tools

Built on the experience of more than 2,000 successful customer deployments, Centrify delivers assessment, deployment, migration and management services, as well as innovative reporting tools and wizards. Time-saving automation is made easier with extensive CLI and scripting options.

Learn More About Centrify Server Suite

Trusted by over 2,000 Organizations, Worldwide

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial