Workflow Service

Just-in-Time Privileged Access

Minimize risk by requiring administrators to request the privileges they need to access and manage systems and network devices for just the amount of time they need — from anywhere. Centrify Platform provides a built-in workflow for self-service access requests and approvals that spans privileged roles, password checkout, and privileged sessions. With Centrify, organizations enforce zero standing privileges with a flexible, just-in-time model that accommodates dynamic business needs.

Control All Privileged Access with Request and Approval Workflows

dia Workflow

Workflow for privileged access reinforces a zero standing privileges model and limits damage during a cyber-attack — protecting even when credentials are compromised.

Simplify and Secure

Eliminate privilege abuse with zero standing privileges

Simplify with one workflow solution for all privileged access

Dynamic policies limit the scope and duration of approvals


Multi-Level Approval Workflow

Easy to configure multi-level approval workflows ensure managers and other approvers review and approve access before privileged access is granted. A complete audit trail improves privileged access governance by capturing who requested access, their business need and who approved it.


User Context

Access requests include user- and Centrify PAM-supplied context so that approvers can make informed grant/deny decisions. Context can consist of, for example, user-supplied rationale, trouble ticket number, role name, system name, timeframe, and duration.


Time-bound Privileged Access

Centrify Platform’s workflow service streamlines role assignments and approvals. Role assignments can be permanent or short-lived. Upon expiration, the roles are automatically deprovisioned, returning to a zero standing privilege posture.


Approve from Anywhere

As a SaaS service accessible from anywhere, Centrify Platform streamlines the approval workflow process by sending requests to a supervisor’s device, allowing for timely approvals and increased productivity.


Govern Privileged Access

Minimize your attack surface by enabling temporary and time-bound access for login and privilege elevation for just-in-time privilege. Prove that access controls work as designed with reporting on approved privileged access versus actual access to critical infrastructure.


Privileged Access Request - 3rd Party Integrations

IT users can request time-bound access via Centrify Platform’s native self-service workflow, or optionally, via integrations with ServiceNow® IT Service Management (ITSM) and SailPoint Technologies® identity governance and administration (IGA) solutions.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us