Products

Delegated Privilege Role and Policy Management

SIMPLIFY THE MANAGEMENT OF HETEROGENOUS ENVIRONMENTS

Centralized roles, rights and privilege policies simplify management across heterogeneous (UNIX, Linux and Windows) environments. Centrify Zero Trust Privilege Services policies are stored in Active Directory separate from other common objects to support delegation to Server administrators and separation of duties from Active Directory administrators , preventing server admins from managing AD objects they should not. In addition, Centrify provides a hierarchical policy model designed to support common enterprise management models for top-down centralized control with centrally managed common roles and rights while also supporting departmental, role-based and computer-based delegation to subordinate administrative teams for rights assignments to systems.

SIMPLIFIED POLICY MANAGEMENT ACROSS HETEROGENEOUS ENVIRONMENTS

  • Make talking with auditors and compliance a breeze with consistent policy and management across heterogeneous environments.
  • Ensure proper separation of duties between policy owners and system administrators.
  • Simplify administration of Policies through Active Directory enforced access controls to support LDAP, PowerShell and Linux CLI -based administration.
  • Ease of management with delegated administration model to match your organizational structure.
  • Ensure compliance through tightly integrated policies that define privileges to be granted after MFA as well as requiring session audit.
policy model

HIERARCHICAL POLICY MODEL

Consistent and structured policy model for both Windows and UNIX/Linux enables compliance and lower cost of maintenance. The hierarchical nature allows you to manage the way you are structured. Departmental, role-based and or computer-based delegation to the correct administrative teams.

centralized-hetro

CENTRALIZED, HETEROGENEOUS, POLICY MANAGEMENT

Managing both Windows AND UNIX/Linux policy in Active Directory enforces a consistent approach towards privileged access security and in addition, creates the proper separation of duties between policy owners and system administrators. This heterogeneous approach ensures shorter audits and eases compliance.

Ready to protect against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial