MANAGE LOCAL ACCOUNTS AND GROUPS EFFICIENTLY
With the Centrify Authentication Service customers can streamline the management of local accounts and groups across their heterogenous infrastructure. Centrify automates the creation of local accounts and integrates with password vaults where necessary for services or applications to centralize all account and group management within one management platform.
Centralize and Automate the Management of Local Accounts and Groups
Centralize the creation and management of local accounts.
Automate the integration with password vaults for simplified password management.
Centrally manage local groups to ensure stable and consistent security policies.
Leverage the power of Centrify Zones to define default local accounts for different sets of systems that may have different service account or local group requirements.
Consolidate Local Accounts. Secure and Manage Passwords
Centrally manage the life cycle for application and service accounts, and automatically secure credentials and access. Minimize your attack surface by using Centrify Zones to uniformly provision and de-provision identities across the systems running your applications.
Integrate Local Account Password Management with Existing Password Vaults
Life cycle management for local accounts includes customizable integration with existing password vaults, automating the account registration and password vaulting for newly created accounts. Password vault integration simplifies the administration of these accounts and ensures their passwords are secured upon creation.
Centralize Management of Local Groups
Local Groups can be centrally managed to ensure consistency across a set of computers as well as to ensure they have a consistent set of members to those groups. Administrators can ensure that membership is not changed from the centrally defined configuration for critical security groups such as wheel.
centrify authentication service
The Centrify Authentication Service data sheet outlines how customer can go beyond the vault and properly verify who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts, and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.