Centrify Releases Privileged Access Service 20.4
August 31, 2020

Centrify added additional modern Privileged Access Management (PAM) integration capabilities enabling DevSecOps with new Secure Shell (SSH) key management features included in the 20.4 release of Centrify Privileged Access Service.

By going beyond traditional application-to-application password management (AAPM) approaches, Centrify offers a broad range of capabilities that keep privileged access controls and security out of the way for developers, machines, and administrators.

An ongoing challenge for DevOps is seamlessly inserting PAM into the pipeline to simplify and centralize credential management. With standard AAPM this is complicated to deploy and requires a lot of manual administration. Standard AAPM approaches have leveraged the password vault for PAM, relying on IDs and static passwords to authenticate applications and services to other workloads. Some organizations prefer to use SSH keys, since they’re harder to crack and there’s no password crossing the wire.

Centrify Privileged Access Service 20.4 has extended SSH key vaulting capabilities beyond key storage and log in to now support SSH key management (inclusive of key rotation), setting policies for SSH key rotation, and leveraging an account that has an SSH key for system and account discovery operations.

“SSH keys are a step up in security posture from simple vaulting of shared, static passwords for AAPM because they can meet the most stringent governance and compliance standards while increasing agility and productivity,” said Tony Goulding, Cybersecurity Evangelist at Centrify. “However, those SSH keys still need to be managed by a set of policies, and rotated to ensure they are dynamic. These new capabilities all feed into our vision for a more modern approach to AAPM, which progressively reduces the number of service accounts and shrinks the attack surface.”

The breadth of Centrify’s platform gives DevOps teams several choices based on specific context, their maturity, and their risk tolerance. For example, while SSH keys offer a familiar solution that transcends simple password vaulting, they both still require rotation as a best practice. A more mature AAPM approach may be to use ephemeral tokens, created automatically on-demand, that are temporary, time-based, and have automatic or one-time-use expirations. This approach frees up DevOps from manual administration, application availability issues related to out-of-sync passwords, and empowers a “Just-in-Time" access control model.

Ultimately, Centrify’s vision calls for flexibility to transcend standard AAPM models and offer the right credential for the right use case, including a new approach that uses both ephemeral tokens and a trusted machine identity. Centrify Delegated Machine Credentials eliminate the requirement for hundreds or thousands of additional service accounts.

“Organizations may be at any point of maturity in both their PAM and DevOps journeys, but the good news is that a range of options are now available to build PAM into the DevOps pipeline,” Goulding continued.

Share this

Industry News

November 21, 2024

Red Hat announced the general availability of Red Hat Enterprise Linux 9.5, the latest version of the enterprise Linux platform.

November 21, 2024

Securiti announced a new solution - Security for AI Copilots in SaaS apps.

November 20, 2024

Spectro Cloud completed a $75 million Series C funding round led by Growth Equity at Goldman Sachs Alternatives with participation from existing Spectro Cloud investors.

November 20, 2024

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, has announced significant momentum around cloud native training and certifications with the addition of three new project-centric certifications and a series of new Platform Engineering-specific certifications:

November 20, 2024

Red Hat announced the latest version of Red Hat OpenShift AI, its artificial intelligence (AI) and machine learning (ML) platform built on Red Hat OpenShift that enables enterprises to create and deliver AI-enabled applications at scale across the hybrid cloud.

November 20, 2024

Salesforce announced agentic lifecycle management tools to automate Agentforce testing, prototype agents in secure Sandbox environments, and transparently manage usage at scale.

November 19, 2024

OpenText™ unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work.

November 19, 2024

Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade developer portal based on the Backstage project.

November 19, 2024

Pegasystems announced the availability of new AI-driven legacy discovery capabilities in Pega GenAI Blueprint™ to accelerate the daunting task of modernizing legacy systems that hold organizations back.

November 19, 2024

Tricentis launched enhanced cloud capabilities for its flagship solution, Tricentis Tosca, bringing enterprise-ready end-to-end test automation to the cloud.

November 19, 2024

Rafay Systems announced new platform advancements that help enterprises and GPU cloud providers deliver developer-friendly consumption workflows for GPU infrastructure.

November 19, 2024

Apiiro introduced Code-to-Runtime, a new capability using Apiiro’s deep code analysis (DCA) technology to map software architecture and trace all types of software components including APIs, open source software (OSS), and containers to code owners while enriching it with business impact.

November 19, 2024

Zesty announced the launch of Kompass, its automated Kubernetes optimization platform.

November 18, 2024

MacStadium announced the launch of Orka Engine, the latest addition to its Orka product line.