Centrify Application Services

Centrify Application Services

(74)
4.4 out of 5 stars

Centrify Application Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s users as well as its privileged accounts.

Work for Centrify Application Services?

Learning about Centrify?

We can help you find the solution that fits you best.

Centrify Application Services Features

Authentication Options
Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

92%
(Based on 20 reviews)
Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.

94%
(Based on 19 reviews)
Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.

95%
(Based on 15 reviews)
Supports Required Authentication Methods/Protocols

Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case

92%
(Based on 17 reviews)
Federation/SAML support (idp)

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

95%
(Based on 18 reviews)
Federation/SAML support (sp)

Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.

95%
(Based on 11 reviews)
User on/off Boarding
Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

81%
(Based on 14 reviews)
Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

86%
(Based on 22 reviews)
Role Management

Establish roles that create a set of authentication rights for each user in the role

89%
(Based on 25 reviews)
Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

88%
(Based on 22 reviews)
Access Termination

Terminate access to multiple applications based on dates

88%
(Based on 22 reviews)
Approval Workflows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow

80%
(Based on 13 reviews)
Authentication Options
Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

88%
(Based on 49 reviews)
Local Access

Controls access to legacy applications, web based applications, network resources and servers.

85%
(Based on 40 reviews)
Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

84%
(Based on 34 reviews)
Mobile Support

Provides mobile application for required mobile os platform and enables single sign on for native and web based business applications

85%
(Based on 30 reviews)
Breath of support for target systems

Standard integrations to most common cloud and on premise applications

88%
(Based on 45 reviews)
Supports BYOD users

Enables users to use their own device to access company applications.

88%
(Based on 26 reviews)
Access Control Types
Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices.

88%
(Based on 15 reviews)
Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.

93%
(Based on 15 reviews)
Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.

93%
(Based on 12 reviews)
Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

97%
(Based on 5 reviews)
Supports BYOD users

Enables users to use their own device to access company applications.

93%
(Based on 11 reviews)
User Maintenance
Self Service Password Reset

Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.

92%
(Based on 23 reviews)
Bulk Changes

Change users and permissions in bulk

85%
(Based on 20 reviews)
Bi-directional Identity Synchronization

Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application

87%
(Based on 19 reviews)
Multi-Factor Authentication
Supports Required Access Types

Works with required networking products and applications out of the box such as: VPN, Web, Cloud applications, Local/Remote Desktop

89%
(Based on 40 reviews)
Supports Required Authentication systems

Includes or supports required authentication technologies. Example systems: One Time Passwords, bioMetric, knowledge based, key cards, mobile phone based tokens, etc

89%
(Based on 41 reviews)
Usability & Access
Quick Login

Expedites user logins using methods like a master password or password autofill.

96%
(Based on 10 reviews)
Browser Extension

Integrates the tool with your browser for easy use.

83%
(Based on 9 reviews)
Mobile App Usability

Integrates with your mobile device for use on mobile apps.

76%
(Based on 8 reviews)
Multi-Device Use

Enables user to use the tool across multiple devices.

86%
(Based on 10 reviews)
Admin Management

Allows an employer or administrator to manage employee access.

87%
(Based on 9 reviews)
Administration
Ease of installation on server

Installation process is easy and flexible.

92%
(Based on 15 reviews)
Password Policy Enforcement

Options for resetting and enforcing password policies

94%
(Based on 16 reviews)
Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

95%
(Based on 18 reviews)
Ease of connecting applications

Easily provisions new systems, platforms or applications using configuration and not customization.

91%
(Based on 19 reviews)
Self Service Password Administration

Users can set, change passwords without interaction from IT staff

91%
(Based on 17 reviews)
Governance
Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

81%
(Based on 16 reviews)
Compliance Audits

Proactively audits access rights against policies

83%
(Based on 17 reviews)
Identity Directories
On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

91%
(Based on 39 reviews)
Application as profile master

Directory treats the user's profile that is in an application as the ongoing source of truth for that user's profile. Changes to profile in master application drive changes to profiles in other applications.

85%
(Based on 27 reviews)
Cloud Directory

Provides cloud based directory option that contains all user names and attributes

89%
(Based on 30 reviews)
Security Measures
Password Generator

Generates passwords for each of your logins.

93%
(Based on 10 reviews)
Two-Factor Authentication

Provides extra security by requiring an extra for of verification in addition to a password.

93%
(Based on 10 reviews)
Security Audits

Analyzes and evaluates the quality and variety of your passwords.

91%
(Based on 7 reviews)
Platform
Multiple Operating system support

Supports Endpoint access control to multiple operating systems

96%
(Based on 18 reviews)
Multi-Domain Support

Allows user authentication to be honored by all the hosts in two or more domains

98%
(Based on 9 reviews)
Cross Browser support

Support access to browser based applications across required browser types

95%
(Based on 17 reviews)
Fail over protection

Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate

94%
(Based on 15 reviews)
Third Party Web Services support

Can call and pass credentials to third party web services.

92%
(Based on 11 reviews)
Reporting

Contains pre-built and custom reporting tools to required to manage business

81%
(Based on 17 reviews)
Auditing

Provides mechanism for auditing authentication for trouble shooting purposes.

87%
(Based on 18 reviews)
Administration
Reporting

Standard and customized report creation to ensure appropriate access rights have been assigned

80%
(Based on 23 reviews)
Mobile App

Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights

73%
(Based on 17 reviews)
Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

83%
(Based on 25 reviews)
APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

77%
(Based on 15 reviews)
Provisioning
Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

87%
(Based on 24 reviews)
Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

87%
(Based on 27 reviews)
Bi-directional Profile Synchronization

Keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application

82%
(Based on 23 reviews)
Profile attribute transformation

Transforms profile atributes to the required format for all of the systems being updated

85%
(Based on 22 reviews)
Role Management

Establish roles that create a set of authentication rights for each user in the role

88%
(Based on 36 reviews)
Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

85%
(Based on 37 reviews)
Access Termination

Terminate access to multiple applications based on dates

89%
(Based on 33 reviews)
Approval Work-flows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined work-flow

86%
(Based on 20 reviews)
Storage
Digital Wallet

Stores records like credit cards or receipts in addition to passwords.

Not enough data available

File Storage

Stores files in addition to passwords.

Not enough data available

Governance
Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

84%
(Based on 28 reviews)
Compliance Audits

Proactively audits access rights against policies

82%
(Based on 23 reviews)
Administration
Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

85%
(Based on 43 reviews)
Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

87%
(Based on 43 reviews)
Bulk Changes

Change users and permissions in bulk

83%
(Based on 38 reviews)
Self Service Password Administration

Users can set, change passwords without interaction from IT staff

88%
(Based on 36 reviews)
Platform
Customization

Supports customizable UI

80%
(Based on 42 reviews)
Reliability

Cloud based service has minimal downtime

91%
(Based on 47 reviews)
Performance/Scalability

Service performs well under significant use and can scale to support large number of users

90%
(Based on 47 reviews)
Security

Vendor follows appropriate security protocols and has appropriate certifications to ensure no breech of confidential data occurs

93%
(Based on 46 reviews)
Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

80%
(Based on 41 reviews)
Federation/SAML support

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

90%
(Based on 40 reviews)
Cross Browser support

Support access to browser based applications across required browser types

87%
(Based on 40 reviews)
Reporting

Contains pre-built and custom reporting tools to required to manage business

79%
(Based on 35 reviews)
APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

83%
(Based on 24 reviews)