Comprehensive Centrify Identity and Access Management (IAM) Cheat Sheet

Introduction to Centrify IAM

Centrify is a leading Identity and Access Management (IAM) solution that provides Zero Trust Privilege services to secure modern enterprises against the primary attack vector – compromised credentials. Centrify’s platform unifies privileged access management, authentication, and identity management across cloud, on-premises, and hybrid environments. This approach enables organizations to enforce least privilege access, implement multi-factor authentication, and achieve regulatory compliance while reducing security risks, complexity, and costs.

Core Centrify IAM Concepts

Centrify Platform Components

  • Centrify Identity Platform: Cloud-based identity service foundation
  • Centrify Privileged Access Service: Secures privileged access to infrastructure
  • Centrify Authentication Service: Unifies identity across all environments
  • Centrify Endpoint Services: Secures endpoints with privilege management
  • Centrify Infrastructure Services: Centralizes identity management for servers

Zero Trust Security Model

Zero Trust PrincipleCentrify Implementation
Verify every userRisk-based, adaptive multi-factor authentication
Validate every deviceDevice identity and health verification
Limit access & privilegeJust-enough, just-in-time privilege
Learn & adaptBehavior-based analytics and continuous verification
Never trust, always verifyNo implicit trust based on network location

Identity Security Lifecycle

  1. Discovery: Identify users, systems, and applications
  2. Enrollment: Register identities and resources
  3. Authentication: Verify identity claims
  4. Authorization: Determine access rights
  5. Privileged access: Just-in-time, just-enough privilege
  6. Monitoring: Audit and analyze access patterns
  7. Governance: Maintain compliance and manage identity lifecycle

Centrify Architecture & Deployment

Deployment Models

  • Cloud-hosted: SaaS model with Centrify managing infrastructure
  • On-premises: Customer-hosted in private data center
  • Hybrid: Combination of cloud and on-premises components
  • Multi-tenant: Shared infrastructure with logical separation
  • Dedicated tenant: Isolated environment for a single customer

Key Components & Services

  • Centrify Identity Platform: Core identity management service
  • Centrify Connector: Bridge between cloud and on-premises
  • Centrify Client: Endpoint agent for local authentication
  • Centrify Directory: Identity repository and directory service
  • Policy Service: Enforces security policies across environments
  • Centrify Cloud Gateway: Secures access to cloud resources
  • Centrify Audit Service: Records and analyzes activity

High-Availability Configuration

  • Load-balanced connectors: Multiple connectors for redundancy
  • Database replication: For on-premises deployments
  • Geo-redundant cloud services: Multiple data centers
  • Offline authentication: Cached credentials for disconnected systems
  • Backup and recovery: Regular backup of configuration and policies

Authentication & Access Management

Authentication Methods

Authentication TypeUse CasesConfiguration Path
PasswordBasic authenticationSettings > Authentication > Password Settings
MFAEnhanced securitySettings > Authentication > MFA
FederationSSO with external IdPsSettings > Authentication > Federation
CertificateDevice-based authSettings > Authentication > Certificates
Mobile authenticatorPasswordlessSettings > Authentication > Mobile Authenticator
OATH OTPHardware tokensSettings > Authentication > OATH OTP
Smart cardsHigh securitySettings > Authentication > Smart Cards
BiometricsUser convenienceSettings > Authentication > Biometrics

MFA Configuration

  1. Enable MFA: Settings > Authentication > Multi-Factor Authentication
  2. Configure factors: Select desired authentication methods
  3. Set MFA policy: Define when MFA is required
  4. Configure risk settings: For risk-based authentication
  5. Test MFA setup: Verify authentication flow
  6. User enrollment: Manage user MFA registration

Policy Management

  • Role-based policies: Apply based on user roles
  • Risk-based policies: Apply based on risk factors
  • Time-based policies: Apply based on time of day
  • Location-based policies: Apply based on network location
  • Device-based policies: Apply based on device status
  • Application-based policies: Apply per application

Privileged Access Management

PAM Features & Functions

  • Password vaulting: Secure storage of privileged credentials
  • Session management: Recording and monitoring of privileged sessions
  • Just-in-time access: Temporary elevation of privileges
  • Workflow approval: Request/approval process for privileged access
  • Credential rotation: Automatic password changing
  • Command filtering: Control over specific commands
  • Privileged elevation: Run specific applications with elevated rights

Implementing Privileged Account Security

  1. Discover privileged accounts: Identify all accounts with elevated access
  2. Vault credentials: Store privileged account passwords in secure vault
  3. Implement checkout processes: Establish workflow for credential access
  4. Configure session recording: Enable audit trail for privileged sessions
  5. Define checkout duration: Set time limits for credential access
  6. Establish approval workflows: Define who can approve privilege requests
  7. Configure automatic rotation: Set password change policies

Server Suite Commands

# Add system to Centrify zone
adjoin -z "Global Zone" -u admin domain.com

# View zone information
adinfo -z

# Check domain connection status
adinfo -t

# List available roles for current user
dzinfo -r

# Request role elevation
dzdo <command>

# View effective rights
dzinfo -c

# Check authentication status
adinfo -a

Identity Management

Directory Integration

  • Active Directory: Primary directory service integration
  • LDAP directories: Support for standard LDAP directories
  • Cloud directories: Integration with cloud identity providers
  • Database repositories: Custom identity sources
  • Federated directories: Cross-domain identity federation
  • External identity providers: Support for third-party IdPs

User Provisioning & Lifecycle

  1. User creation: Initial account provisioning
  2. Entitlement assignment: Role and permission allocation
  3. Access certification: Regular access review
  4. Account reconciliation: Validation against authoritative sources
  5. Account deactivation: Temporary access removal
  6. Account termination: Complete removal of access rights

Role-Based Access Control (RBAC)

  • Administrative roles: Platform administration capabilities
  • Application roles: Application-specific permissions
  • System roles: Operating system access rights
  • Role hierarchy: Nested roles for simplified management
  • Role assignment: Direct, group-based, or rule-based assignment
  • Role elevation: Temporary access to higher privilege roles

Application Access Management

Application Types

Application TypeAccess MethodConfiguration Approach
Web applicationsSAML, OIDC, WS-FedApp Catalog > Add Web App
On-premises appsWeb proxy, VPNApp Catalog > On-Premises Apps
Mobile appsMobile SSOApp Catalog > Mobile Apps
Desktop appsLocal authenticationSettings > Desktop Apps
Cloud servicesAPI integrationApp Catalog > Cloud Services
Legacy applicationsPassword fillApp Catalog > Legacy Apps

Single Sign-On Implementation

  1. Identify applications: Catalog apps requiring SSO
  2. Configure authentication protocols: SAML, OIDC, etc.
  3. Map identities: Link Centrify identities to application accounts
  4. Configure attribute mapping: Pass user attributes to applications
  5. Test SSO flow: Verify seamless authentication
  6. Enable for users: Roll out to user base

Application Policy Settings

  • Authentication policies: Define auth requirements for each app
  • MFA policies: Set when MFA is required for application access
  • Session policies: Control session duration and behaviors
  • Device policies: Restrict access based on device status
  • Network policies: Limit access based on network location
  • Risk policies: Adjust access based on risk assessment

Endpoint Management

Device Enrollment

  1. Prepare devices: Ensure OS compatibility
  2. Distribute client software: Deploy Centrify Client
  3. Enroll device: Register device with Centrify Platform
  4. Apply policies: Assign appropriate device policies
  5. Verify enrollment: Confirm successful registration
  6. Maintain compliance: Monitor ongoing device status

Endpoint Security Policies

  • Local account management: Control local admin accounts
  • Application control: Restrict application execution
  • Device encryption: Enforce storage encryption
  • Patch compliance: Verify security updates
  • Password policy: Local password requirements
  • Firewall settings: Network protection configuration
  • Timeout policies: Screen lock and session termination

Privilege Elevation on Endpoints

# Request privilege elevation for a command
dzdo <command>

# Run application with elevated privileges
dzrun <application>

# Check available roles
dzinfo -r

# View current privilege status
dzinfo -c

# Elevate to admin role for set time
dzsh -r "admin_role" -t 60

Audit & Compliance

Audit Capabilities

  • Authentication events: Login attempts and results
  • Authorization decisions: Access grants and denials
  • Administrative actions: Changes to system configuration
  • Privilege use: Elevated privilege activity
  • Session recording: Video recording of privileged sessions
  • Command logging: Record of executed commands
  • Policy changes: Modifications to security policies

Compliance Reporting

RegulationKey ReportsReport Location
SOXAccount reconciliation, Privilege useReports > Compliance > SOX
PCI DSSAccess control, Authentication auditReports > Compliance > PCI
HIPAAActivity monitoring, Access reviewReports > Compliance > HIPAA
GDPRAccess logs, Data processingReports > Compliance > GDPR
NIST 800-53Control assessment, Audit trailReports > Compliance > NIST
ISO 27001Risk assessment, Control verificationReports > Compliance > ISO

Creating Custom Reports

  1. Navigate to Reports > Custom Reports
  2. Select data sources and fields
  3. Define filters and parameters
  4. Configure sorting and grouping
  5. Set permissions and scheduling
  6. Save and execute report

Common Challenges & Solutions

ChallengeSymptomsSolution
Authentication failuresUsers unable to log inVerify AD connectivity, check MFA settings, ensure connector health
Policy conflictsUnexpected access resultsReview policy priority, check for conflicting rules, examine role assignments
Performance issuesSlow authenticationScale connectors, optimize directory queries, check network latency
Federation problemsSSO failuresVerify certificate validity, check claim mappings, test IdP connectivity
Connector issuesService disruptionRestart connector service, verify network connectivity, check for version conflicts
MFA enrollment failuresUsers can’t register devicesCheck enrollment policies, verify mobile app compatibility, test notification services

Best Practices & Tips

Security Hardening

  • Implement least privilege access for all accounts
  • Enable MFA for administrative access
  • Regularly rotate administrative credentials
  • Maintain separation of duties for admin functions
  • Use risk-based authentication for sensitive resources
  • Implement just-in-time privileged access
  • Conduct regular access reviews and cleanup

Performance Optimization

  • Deploy multiple connectors for load balancing
  • Optimize directory queries and group memberships
  • Implement caching where appropriate
  • Use efficient role design and assignment
  • Schedule intensive operations during off-peak hours
  • Monitor and tune database performance
  • Regularly update clients and connectors

Deployment Planning

  • Start with well-defined use cases
  • Implement phased rollout approach
  • Begin with non-critical systems
  • Create comprehensive test environment
  • Document configuration decisions
  • Establish backup and recovery procedures
  • Develop user training and support materials

Resources for Further Learning

Official Documentation

  • Centrify Technical Documentation Portal
  • Centrify Developer Network
  • Centrify Security Best Practices Guide
  • Centrify Deployment Planning Guide
  • Centrify API Reference

Training Resources

  • Centrify Certification Program
  • Centrify Academy Online Courses
  • Centrify Admin Bootcamp
  • Centrify Technical Webinars
  • Centrify Solutions Guide

Community & Support

  • Centrify Community Forums
  • Centrify Knowledge Base
  • Centrify Support Portal
  • Centrify User Groups
  • Annual Centrify User Conference

This cheat sheet provides a comprehensive overview of Centrify IAM capabilities, but specific implementations may vary based on deployment type, version, and specific organizational requirements. Always consult official documentation for your specific Centrify version when implementing production solutions.

Scroll to Top