Products

Privilege Elevation Service

Centrify Privilege Elevation Service minimizes risk exposure to cyber-attacks caused by individuals with too much privilege across Linux, UNIX, and Windows systems. The service streamlines just enough and just-in-time privileged access best practices, limiting potential damage from a security breach.

Privilege Elevation Diagram

Just-Enough Privilege

Secure and manage fine-grained privileges for individuals instead of sharing accounts. Get users to log in as themselves for accountability, and elevate privilege based on their role within an organization. Granting just enough privilege to administrators minimizes the power hackers wield through stolen privileged account credentials.

dia-policy-locations

Consistent Security Policy Management

Centrally create and consistently apply roles and security policies that granularly control privilege across Windows, Linux, and UNIX. Centrify’s hierarchical privileged access security model delivers the flexibility to manage privilege the way your organization demands by creating relationships between users, job function, and system criticality. This model ensures scale, efficient delegation, and clear separation of duties.

Time-Based Role Assignment Diagram

Just-in-Time Privilege

Minimize risk with zero standing privileges. IT administrators request a new role on a specific resource, access to privileged account credentials, or a privileged session — from anywhere — to obtain the rights they need to get their job done when they need it. Privileged access requests enable organizations to grant temporary privileges and roles with a flexible, just-in-time model that accommodates business needs.

mfa

Multi-Factor Authentication (MFA) at Privilege Elevation

Running a highly privileged application or command should always require MFA for identity assurance. Validating that an authorized human is elevating privilege and that it is not a malicious actor leveraging stolen credentials can stop an attack in its tracks. Centrify delivers MFA for privileged access before system and vault login, password checkout, and privilege elevation with a broad range of supported authenticators.

We started out with very simple roles and now we manage user privileges with extreme granularity. The roles in Centrify are essential in limiting what people can access and locking our systems down.

Jeff Williams, Systems Integration Chief, National Weather Services

Learn More About Centrify Privilege Elevation Service

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial