Time-bound, Temporary Roles Grant Just-in-Time Privilege
Minimize risk by requiring administrators to request roles to obtain the privileged access they need to manage systems and network devices for just the amount of time they need — from anywhere. Access request for privileged roles, password checkout, and privileged sessions enables organizations to maintain zero standing privilege with a flexible, just-in-time model that accommodates dynamic business needs.
Minimize Cyber Risk Exposure & Limit Lateral Movement
Self-Service Role Requests for Just-In-Time Privilege
Enable administrators to elevate privilege by requesting a role assignment to obtain the rights they need to perform tasks. Centrify’s privileged access request system streamlines role assignment and approvals. Role assignments can be long-lived, or expire and the administrator goes back to zero standing privilege.
Multi-Level Approval Workflow & Auditing
Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.
Support for Mobile Approval
As a SaaS service accessible from anywhere, Centrify Platform workflow service streamlines the approval workflow process by sending approval requests to a supervisor’s device, allowing for timely approvals and increased productivity.
Govern Privileged Access
Minimize the attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls are working as designed with reporting on approved privileged access versus actual access to critical infrastructure.
Privileged Role Request via Third Party Solutions
IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.
Learn More About Centrify Privilege Elevation Service
CyberCast: Enforcing Least Privilege: Just Enough, Just-in-Time
Least Privilege Access based on Just Enough, Just-in-Time Privileged Access Management (JIT PAM) is...
Centrify Privilege Elevation Service
The Centrify Privilege Elevation Service data sheet outlines how the service minimizes the risk...