Authentication Policy Management

Centrify’s Patented Zones Technology

Quickly consolidate complex and disparate Linux and UNIX user identities into Active Directory with Centrify's patented Zones technology — without first rationalizing across identity silos. Centrify Zones technology enables you to manage privileged access and MFA in your heterogeneous environment by tying the rights an individual user has on a Windows, Linux, or UNIX system to a single user identity, stored and managed in Active Directory.

Privileged Access Management for Windows, Linux, and UNIX Systems

Whether a few servers or thousands of Linux and UNIX systems, Centrify Zones technology quickly centralizes management of privileged access to all systems within Active Directory.
Facilitates the efficient consolidation of a set of complex and disparate non-Windows identities into Active Directory without any disruptive changes to schema or software installed on Domain Controllers.
Delivers the most flexible solution for establishing consistent least-access and least-privilege security models for a diverse set of users, roles, and policies across Windows, Linux, and UNIX systems.
Controls and governs system access, privileges, and auditing with a granular model that scales through inheritance, reducing duplicate roles and policies that can result in privileged access abuse.

Definitive Privileged Access Security Policies

Centrify Zones make it easy to eliminate identity and authentication policy silos by connecting a users’ access and privilege on Windows, Linux, and UNIX systems to a single, definitive identity in Active Directory. The resulting centralized management model for identities and privileged access establishes the foundation for a zero standing privileges approach to minimizing your attack surface.


Bounded Privileged Access Control Zones

Create sets of systems with like security requirements, business function, or geographical location within Centrify Zones that, when combined, govern users’ access with a least-privilege approach and establish a boundary for delegated administration. Security is more robust when policies consistently grant users scoped privileged access to cloud and on-prem infrastructure, and revoke it when jobs change. Centrify Zones’ establish logical boundaries around systems that prevent attackers from lateral movement in the case of a security breach


Grant Just Enough Privilege

Centrally define roles and security policies that granularly control access and privilege across Windows, Linux, and UNIX to implement Zero Trust principles. With Centrify Zones, you create tiered relationships between a user, job functions, and system criticality that result in privileged access security policies that grant just enough privilege for a scoped set of infrastructure and for a limited amount of time.


Power and Flexibility to Reflect Your Unique Business

Centrify Zones are flexible enough to reflect unique organizational structures. The hierarchical design is powerful with departmental, role-based, and computer-based delegation. For example, a web server role combines all relevant computers across Zones. It is associated with a web developer role whose users now have access to all web servers in all Zones but cannot access any other systems in the Zones. 


Balance Zero Standing Privileges Principle and Scale

Implement a zero standing privileges security model that reduces the risk of a breach. Grant users the privileged access they need to do their jobs without disruption, but only the minimum amount, when they need it. Centrify Zones balance the flexibility of a hierarchical model for creating intricate role and policy definitions with scale enabled through the inheritance of shared roles and policies.


Local Enforcement of Centrally Managed Policies

Centrify Zones makes it easy to centrally manage user identities and authentication policies while globally and consistently enforcing privileged access security controls on the host. Centrify Client technology enforcing security controls on the host eliminates the creation of more privileged accounts and backdoor access typical of other centralized management approaches, the resulting security posture minimizes your attack surface and aligns with best practices for zero standing privileges.

Learn More About Centrify Server Suite

Trusted by over 2,000 Organizations, Worldwide

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us