Access Request & Approval Workflow

Self-Service Privileged Access Request and Approval Workflow System

Reduce risk by minimizing the attack surface with temporary, time-bound privileged access to cloud and on-premises infrastructure. Centrify Platform's workflow service is a built-in access request and approval engine and it is integrated with leading IT service management software to protect your existing technology investments.

Control Privileged Access with Built-In Request & Approval Workflow

Enable controlled, incident-based access to privileged account credentials.
Require workflow-based management approvals for checkouts, sessions, or roles.
Automatically limit the duration for which approvals are valid.
Monitor privileged access in real-time with the ability to terminate remote sessions.
Ensure accountability by reporting on who has access and who granted that access.
Easily prove access controls are working by reconciling approved with actual access.
self service for p accounts

Self-Service Request for Privileged Accounts

Empower IT admins to request temporary access to the specific systems and network devices they need to manage — from anywhere. A simple, intuitive interface enables administrators to request access to privileged account credentials or to request a privileged session to perform a designated task. Access is granted or denied through an automated management approval workflow.

workflow report

Multi-Level Approval Workflow & Auditing

Increase control over privileged account credentials, or the “keys to the kingdom,” by requiring approvals for privileged access grants. Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access. A complete audit trail improves privileged access governance by capturing who requested access, their business need, and who approved it.


Support for Mobile Approval

As a SaaS service accessible from anywhere, Centrify Platform's workflow service streamlines the approval process by sending requests to a supervisor’s device, allowing for timely approvals and increased productivity.


Time-Bound Privileged Access

Minimize the attack surface by enabling temporary, and time-bound access to privileged accounts and privileged roles for just-in-time privilege. Grant IT admins access to privileged account credentials and remote management. Optionally, monitor privileged sessions for suspicious activity and terminate instantly.


Privileged Access Request via Third Party Integrations

IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.

Centrify Self-Service Request for Network Devices

Watch this video to learn more about how an IT admin can request temporary access to network devices they need to manage — from anywhere.

Learn More About Centrify Vault Suite

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us