SELF-SERVICE PRIVILEGED ACCESS REQUEST AND APPROVAL WORKFLOW SYSTEM
Reduce risk by minimizing the attack surface with temporary, time-bound privileged access to on-premises and cloud-based infrastructure. Centrify Privileged Access Service provides a built-in access request and approval workflow engine or integrations with leading IT service management software to protect your existing technology investments.
Control Privileged Access with Built-In Request & Approval Workflow
Enable controlled, incident-based access to privileged account credentials.
Require workflow-based management approvals for checkouts, privileged sessions or role assignments.
Automatically limit the duration for which approvals are valid.
Monitor privileged access in real-time with the ability to terminate remote sessions.
Ensure accountability by reporting on who has access and who granted that access.
Easily prove access controls are working as designed by reconciling approved access with actual access.
Self-Service Request for Privileged Accounts
Empower IT admins to request temporary access to the specific systems and network devices they need to manage — from anywhere. A simple, intuitive interface enables administrators to request access to privileged account credentials or to request a privileged session to perform a designated task. Access is granted or denied through an automated management approval workflow.
Self-Service Request for Privileged Roles
Enable administrators to log in as themselves and elevate privilege by systematically requesting a new role assignment to obtain the rights they need to perform tasks. The self-service request system facilitates the request for the specified role and time period, and if approved will automatically revoke that entitlement upon expiration.
Multi-Level Approval Workflow & Auditing
Increase control over privileged account credentials, or the “keys to the kingdom,” by requiring approvals for privileged access requests. Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.
Support for Mobile Approval
Streamline the approval workflow process by sending approval request to a supervisor’s smartphone, allowing for timely approval of requests and increased productivity.
Time-Bound Privileged Access
Minimize the attack surface by enabling temporary, and time-bound access to privileged accounts and privileged roles for just-in-time privilege. Grant IT admins access to privileged account credentials, remote management sessions or when they need to temporarily modify their role assignment for performing additional admin tasks. Optionally, monitor privileged sessions for suspicious activity and terminate instantly. Prove that access controls are working as designed with reporting on approved privileged access versus actual access to critical infrastructure.
Privileged Access Request via Third Party Solutions
Reduce the risk of data breaches by requiring approval for IT users who need access to privileged accounts. IT users of the ServiceNow® asset management and configuration management database (CMDB) or SailPoint Technologies® identity governance and administration solutions can request privileged account credentials or a privileged session to access specific servers or network devices for a designated time period. Approvals are granted or denied through a workflow-based management process.
See Centrify Privilege Access Service in Action
Centrify Privileged Access Request and Approval Workflow
Centrify Self-Service Request for Privileged Accounts
Watch this video to learn more about the Centrify privileged access request and approval workflow capabilities.
Watch this video to learn more about how an IT admin can request temporary access to specific systems and network devices they need to manage — from anywhere.
Centrify Privileged Access Request for ServiceNow
Centrify Self-Service Request for Network Devices
Watch this video to learn more about how IT users of ServiceNow can request privileged account credentials or a privileged session to access specific servers or network devices for a designated time period.
Watch this video to learn more about how an IT admin can request temporary access to network devices they need to manage — from anywhere.
centrify privileged access service
The Centrify Privileged Access Service data sheet outlines how organizations can establish core privileged access controls across their growing attack surface.