Centrify and Yubico bring Context-based Adaptive Authentication to the Enterprise


Together, Centrify and Yubico provides strong authentication for users across enterprise resources.

Whether it’s for FIDO U2F, smart card (PIV-based authentication), OATH based One-Time-Passcode, or as a physical NFC token for mobile devices — Centrify and Yubico provides IT the flexibility to enforce security without user frustration.

Centrify can leverage the YubiKey for use cases such as:

  • FIDO U2F based strong authentication to applications.
  • Smartcard (PIV) login to Windows, Mac and Linux workstations.
  • OATH based One-Time-Passcode for strong authentication to applications.
  • OATH based One-Time-Passcode for strong authentication for server login and privilege elevation.
  • Physical NFC token for MFA to secure access to applications on mobile devices.

The rise of cloud and mobile means that business employees are using a broader set of devices than ever to access cloud and on-premises applications — each with their own username and password. With so many credentials to remember, employees resort to re-using simple passwords across applications, endpoints and infrastructure.


Given the massive amount of credentials that have been compromised in the recent past, it’s safe to assume that every password has been stolen and made available to attackers. Multi-factor authentication reduces the risk of compromised credentials, but is often cumbersome for end users, or — in the case of smart cards – requires dedicated readers on all end-user devices.

Companies are looking to bolster security in order to prevent attacks due to compromised credentials but must also balance solutions with employee productivity and satisfaction.

Key Benefits of Centrify and Yubico

  • Bolstered security: Use Centrify to secure access to all enterprise applications, endpoints and infrastructure while leveraging Yubikey’s for strong authentication.
  • Rapid adoption: Simplify deployment and adoption with easy self-service enrollment and intuitive use across applications, endpoints and infrastructure.
  • Meet regulations: Comply with regulations such as NIST and PCI DSS requiring strong authentication for accessing sensitive resources.