How to Operationalize the Zero Trust Security Pillar 'Limit Access & Privilege'


Watch this on-demand with Centrify and ServiceNow® to learn why it is essential to leverage automation technology (e.g., workflow engines) to manage temporary access to roles that grant privilege, shared account credentials, or remote sessions. Learn why self-service access requests and multi-level approvals need to be closely integrated in the overall identity and access management process to allow for scalability and timeliness.

  • The Four Pillars of Zero Trust Security
  • How IT users can request temporary or permanent access to privileged accounts, a privileged session, checkout of a password, or a new role assignment from the ServiceNow asset management database
  • How end users can request access to applications within the ServiceNow service catalog