Products

Access Request & Approval Workflow

SELF-SERVICE PRIVILEGED ACCESS REQUEST AND APPROVAL WORKFLOW SYSTEM

Reduce risk by minimizing the attack surface with temporary, time-bound privileged access to on-premises and cloud-based infrastructure. Centrify Privileged Access Service provides a built-in access request and approval workflow engine or integrations with leading IT service management software to protect your existing technology investments.

Control Privileged Access with Built-In Request & Approval Workflow

  • Enable controlled, incident-based access to privileged account credentials.
  • Require workflow-based management approvals for checkouts, privileged sessions or role assignments.
  • Automatically limit the duration for which approvals are valid.
  • Monitor privileged access in real-time with the ability to terminate remote sessions.
  • Ensure accountability by reporting on who has access and who granted that access.
  • Easily prove access controls are working as designed by reconciling approved access with actual access.
self service for p accounts

Self-Service Request for Privileged Accounts

Empower IT admins to request temporary access to the specific systems and network devices they need to manage — from anywhere. A simple, intuitive interface enables administrators to request access to privileged account credentials or to request a privileged session to perform a designated task. Access is granted or denied through an automated management approval workflow.

self-service-request-priv-roles

Self-Service Request for Privileged Roles

Enable administrators to log in as themselves and elevate privilege by systematically requesting a new role assignment to obtain the rights they need to perform tasks. The self-service request system facilitates the request for the specified role and time period, and if approved will automatically revoke that entitlement upon expiration.

workflow_report

Multi-Level Approval Workflow & Auditing

Increase control over privileged account credentials, or the “keys to the kingdom,” by requiring approvals for privileged access requests. Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.

mobile

Support for Mobile Approval

Streamline the approval workflow process by sending approval request to a supervisor’s smartphone, allowing for timely approval of requests and increased productivity.

approve_pwdcheckout_request

Time-Bound Privileged Access

Minimize the attack surface by enabling temporary, and time-bound access to privileged accounts and privileged roles for just-in-time privilege. Grant IT admins access to privileged account credentials, remote management sessions or when they need to temporarily modify their role assignment for performing additional admin tasks. Optionally, monitor privileged sessions for suspicious activity and terminate instantly. Prove that access controls are working as designed with reporting on approved privileged access versus actual access to critical infrastructure.

third-party

Privileged Access Request via Third Party Solutions

Reduce the risk of data breaches by requiring approval for IT users who need access to privileged accounts. IT users of the ServiceNow® asset management and configuration management database (CMDB) or SailPoint Technologies® identity governance and administration solutions can request privileged account credentials or a privileged session to access specific servers or network devices for a designated time period. Approvals are granted or denied through a workflow-based management process.

See Centrify Privilege Access Service in Action

Centrify Privileged Access Request and Approval Workflow
Centrify Self-Service Request for Privileged Accounts

Watch this video to learn more about the Centrify privileged access request and approval workflow capabilities.

Watch this video to learn more about how an IT admin can request temporary access to specific systems and network devices they need to manage — from anywhere.

Centrify Privileged Access Request for ServiceNow
Centrify Self-Service Request for Network Devices

Watch this video to learn more about how IT users of ServiceNow can request privileged account credentials or a privileged session to access specific servers or network devices for a designated time period.

Watch this video to learn more about how an IT admin can request temporary access to network devices they need to manage — from anywhere.

DOWNLOAD THE DATA SHEET
Privileged Access Service

centrify privileged access service

The Centrify Privileged Access Service data sheet outlines how organizations can establish core privileged access controls across their growing attack surface.

READ Now

Ready to protect against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial