As IT organizations look to connect their non-Windows® resources to Microsoft® Active Directory®, one question comes up quite often: what is Centrify®? In web searches targeted at discovering a way to extend AD, Centrify comes up quite a bit, so it’s important to understand what their product does. In short, Centrify is an identity bridge. It works by extending legacy, on-prem Microsoft Active Directory identities to non-Windows resources such as Mac® and Linux® systems as well as web applications. Centrify is essentially an add on to on-prem Active Directory infrastructure.
Instead of Asking What Centrify Is, Ask What It Isn’t
What we should really be asking when we attempt to define Centrify is more of a question about the right approach to identity management in the cloud era. Do we want to continue to leverage on-prem hardware and its expenses when the industry is shifting to the cloud? No longer are IT networks based on just Microsoft Windows. They’re an amalgamation of different types of solutions including G Suite™, Office 365™, AWS® and GCP™, Mac® and Linux® machines, web applications such as Slack, Github, Salesforce®, cloud and physical file servers (NAS devices, Samba file servers, and Box™) and many other types of IT resources. So, with all of these IT changes, why must the directory remain on-prem and require add ons like Centrify to work with all these resources?
Resulting from the shift of IT resources in most environments (Windows-based workstations, wired networks, on-prem file servers) to what we have today in our cloud-forward environment (Macbooks, WiFi, and cloud storage) IT organizations are struggling to extend their legacy directory service to these modern IT resources. On-prem identity bridges such as Centrify extended AD to some of these new digital tools, but not all. While it may seem like a good approach, Centrify’s scope is limited in that it still requires Active Directory on-prem to fulfill its purpose. The shift to the cloud is underway; don’t prolong it by continuing to purchase (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: https://jumpcloud.com/blog/centrify/what-is-centrify/