Control Shared Access to Privileged Accounts

Give your authorized internal users, outsourced IT and third party vendors secure, always-on access to critical shared account passwords, while maintaining control over who has access, which account passwords they have access to and how those passwords are managed.

Try it Now

Reduce Risk of Security Breach When Sharing Privileged Accounts

Single location for emergency access to super-user passwords for all on-premises and cloud-based systems and network infrastructure

Step up authentication and secure access to infrastructure without knowing privileged account passwords

Enforce centralized control over who can access credentials and audit administrator activity — including securing 3rd party access

Simplify and automate shared account password management for super-user and service accounts

Secure storage of encrypted privileged account credentials in the Centrify Identity Platform or a key management appliance on-premises (or in the cloud)

Flexible and cost-effective solutions with the robust security you expect — whether deployed in the public cloud, private cloud or your data center

Secure Checkout of Account Passwords

Authorized IT, whether internal or outsourced, and third party vendors can check out passwords for accounts for a limited duration. Privilege Service provides the option to take passwords under its full control, where it automatically changes the password after the checkout expires or simply store the password for future access without changing it.

Session Establishment Without Disclosing Passwords

Authorized users can access resources using shared accounts without knowing the passwords and Privilege Service will not expose the passwords. IT admins can use shared accounts without risk of password sharing or unauthorized access.

Role-based Access Controls for Checkouts and Privileged Sessions

Privilege Service provides you with both global and granular control of permissions for account usage and password access. Secure by default, users have no access to resource configurations or passwords, unless explicitly granted.

Risk-based Policies for Checkouts and Privileged Sessions

Identify anomalous behavior while it is happening, by enforcing risk-aware policies for users who are initiating a privileged session or checking out a password. Combining risk-level with role-based access controls, user context and multi-factor authentication (MFA) enables intelligent, automated, real-time decisions on whether to grant privileged access. These dynamically enforced access policies grant the user access, prompt for a second factor of authentication, or block access completely.

“Break-glass” Access to Passwords From a Mobile Device

Get controlled, emergency access to privileged account passwords from your mobile device enrolled in the Centrify Identity Platform. Secured password checkout requires a PIN or fingerprint validation. Checkout automatically times out based on per-resource policy.

Watch Video

Secure, Encrypt and Manage Application Passwords

Prevent cyberattacks that target privileged account credentials and streamline operations by eliminating hard-coded, plain text account passwords from scripts and applications. Applications and scripts authenticate and retrieve passwords securely without human intervention, enabling organizations to meet compliance and security policies.

Learn More

Secure and Encrypted Storage of Your Data

Your data is securely stored using the Centrify Identity Platform for all user, resource, account, and password information. Privilege Service also supports SafeNet KeySecure key management appliances from Gemalto as an alternative for encrypted storage of account passwords.

Learn More

White Paper

Best Practices for Privileged Identity Management in the Modern Enterprise

This paper explores the trends impacting data security for today’s modern enterprise — a hybrid organization with infrastructure on premises and in the cloud, and best practices on how to manage and govern privileged user access to mitigate risk.

Download White Paper