English

ADAPTIVE MFA for Privileged Access

Reinforce Secure Access to Critical Systems

Add an extra layer of security to stop breaches by configuring behavior-based access control for IT admins who access Windows and Linux servers, elevate privilege or leverage privileged credentials.

mfa-for-priv-access-reverse.png

Guard Against Attacks with Behavior-based Access Control

checkmark-in-circle-blue.png

Extra layer of security for users logging into Windows, Linux and UNIX systems or who require privilege elevation

checkmark-in-circle-blue.png

Keep accounts secure even if your passwords are compromised

checkmark-in-circle-blue.png

Easily implement one cohesive solution to enforce PCI DSS’ multi-factor authentication (MFA) requirements across your enterprise for all your local, remote users and third party users who require access to your sensitive data environment

checkmark-in-circle-blue.png

Reinforce privileged access policies with additional multi-factor authentication (MFA)

checkmark-in-circle-blue.png

Guard against cyber threats to prevent access to valuable data

checkmark-in-circle-blue.png

Flexible choices for MFA challenges, including those you already own — RSA environments, OATH-based tokens, USB PKI keys and Smart cards including derived credentials for regulatory compliance

Protect Infrastructure by Enforcing Second Factor of Authentication at Login

Centrify Zones, roles, and rights capabilities provide the ability to enforce a second factor of authentication — such as Centrify mobile authenticator, push notification, SMS/text, email, phone call and security questions — for specific users or Windows, Linux and UNIX servers during login.

mfa-list-with-rsa-secur-id.png

Enforce Step up Authentication When Users Require Elevated Privilege

Users who have successfully logged into a server but need to run highly privileged commands may be prompted for a second factor when elevating privilege, per policy.

mfa-for-servers-login-with-mfa-email.png

Risk-based Policies for Password Checkouts and Privileged Sessions

Identify anomalous behavior while it is happening, by enforcing risk-aware policies for users who are initiating a privileged session or checking out a password. Combining risk-aware policies with role-based access controls, user context and multi-factor authentication (MFA) enable intelligent, automated, real-time decisions on whether to grant privileged access. These dynamically enforced access policies grant the user access, prompt for a second factor of authentication, or block access completely.

mfa-login-checkout-video.png

Interoperability with Third-party Authentication Methods

Centrify’s MFA capabilities are designed to work well with existing investments in RSA, OATH-based tokens and smartcards such as PIV/CAC. These can all be brought under Centrify’s centralized management and enforced across your enterprise.

mfa-list-with-rsa-securid-login.png

MFA Everywhere You Need It

Implementing policy-based MFA for every user (end users and privileged users), and every IT resource whether on-premises or in the cloud blocks cyberattacks at multiple points in the attack chain — and protects even when credentials are compromised.

Learn More
mfa-phone-2017.png

VIDEO

Multi-factor Authentication for Windows Servers

mfa-for-windows-servers-video.png

This video provides a demonstration and benefits of including a second authentication factor in your privileged access policies for Windows servers.