Skip to main content
TrustRadius
CyberArk Workforce Identity

CyberArk Workforce Identity
Formerly Idaptive Next-Gen Access

Overview

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security,…

Read more
Recent Reviews

TrustRadius Insights

Fast implementation: Users have found the implementation of Centrify's solution for federation with Azure/Office 365 to be significantly …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor…

Entry-level set up fee?

  • $4 per user/per month
    Optional
For the latest information on pricing, visithttps://www.centrify.com/products/appli…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self…

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device.  The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection.

Workforce Access solutions:

  • CyberArk Single Sign-On (SSO) is a solution for one-click access to cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk.

  • CyberArk App Gateway is an add-on to the Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises.

  • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation.

  • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions.

  • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization.

Identity Management Services:

  • CyberArk Identity Lifecycle Management provides a way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary.

  • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can automate complex identity management workflows and synchronize identity data across diverse applications, directory stores, and repositories.

  • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal

CyberArk Workforce Identity Videos

CyberArk Workforce Identity Competitors

CyberArk Workforce Identity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

The Okta Identity Cloud, OneLogin by One Identity, and PingOne from Ping Identity are common alternatives for CyberArk Workforce Identity.

Reviewers rate ID-Management Access Control and Account Provisioning and De-provisioning and ID Management Workflow Automation highest, with a score of 9.

The most common users of CyberArk Workforce Identity are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-23 of 23)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use CyberArk Workforce Identity to easily and securely log in to the apps. The platform is easy to implement, offers great features like frictionless login, AI-powered authentication, making it easy to detect anomalies against security breaches, and integrates with most frequently used apps like ZOOM. .
  • Reset passwords in all software is really easy and simple.
  • Integrations to more than 120 external applications.
  • Easy to use and implement.
  • Reports.
  • Custom reports don't always support SQL input.
CyberArk Workforce Identity gives small and non-small businesses the ability to protect their data and applications. Identity management allows my organization to classify and label data to make it easier to assign permissions based on user roles. It also allows you to track activity on shared applications and data, so you know exactly who is accessing what files.It offers great identity management features to help find exactly what we need.
October 30, 2019

A great Okta alternative

Score 8 out of 10
Vetted Review
Verified User
Incentivized
It's a great option for SSO in a larger size business. It's pretty easy to use and is intuitive.
  • Easy app management.
  • Easy deployment.
  • Intuitive to use.
  • No name recognition.
  • The re-enrollment options are clunky.
  • Push can be buggy sometimes.
This is a great option for those who can't use Okta. The functionality is pretty much the same. It's really easy to use and our user base of 1500 plus don't seem to have any issues with this option.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Idaptive is the secure access platform being used for access to certain production systems. This is being adopted over time by my project. The business problems it solves are resolving identity and access management issues over the enterprise systems and having a better way to record all actions on the production machine.
  • Identify.
  • Access management.
  • Audit.
  • Interface.
  • The complexity of the set-up.
Idaptive is well suited in situations where you have many people accessing a production system and need to control access and be able to prove audibility for compliance. It is less appropriate and unnecessary for smaller organizations.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used for Multi-Factor Authentication and Single Sign-on Feature in organization-wide products. Multi-Factor Authentication has been implemented using RESTFul Services exposed by Centrify and Single Sign-on is implemented using Partner integration features provided by Centrify.
  • Single Sign-on Integration is easy and complete configuration is UI driven with lots of help tips
  • RESTFul APIs for Multi-factor Authentication is easy to use and implement. Also, Centrify supports all new Security features for Multi Factor Authentication and hence you can easily select and configure different challenges based on the policies and roles for the user.
  • Lots of Built-in reports available for normal day to day auditing.
  • Should be flexible to support all industry-wide LDAP solution. Currently, it requires customization if any specific version of LDAP is used.
Single Sign-on and Multi-Factor Authentication
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our engagement with Centrify started with a separate requirement from another critical vendor. They migrated to an SSO only supported platform which meant we had to find a solution to continue using their services. We evaluated several vendors but ultimately we determined Centrify best met our current and future needs.
  • The administrative functions have a low learning curve which saves on the administrative overhead.
  • There are already thousands of pre-built apps to integrate Centrify with.
  • Deployment to the organization was seamless and worked as intended with the apps we went live with.
  • Support was a little slow on responding to new cases
  • You cannot disable the "Mobile" tab from a users profile meaning they think they have the ability to provision mobile devices and access apps via their mobile device.
Centrify encompasses several solutions right out of the box. In addition to SSO, we are now looking to implement MFA across the enterprise and also at our VPN.
Andy Close | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It is being used across the whole organization. We started out with them for our mobile device management solution and have moved on to SSO and their user portal. The user portal will help us centralize the user experience and give us a way to point our users to one spot for their apps rather than all over the place.
  • Mobile Device Management
  • SSO
  • User Portal to centralize your apps
  • They do not support Microsoft Remote Desktop Gateway
They are well suited for mobile device management. The only place we see so far that they don't address is support for the Microsoft Remote Desktop Gateway. That could just be not enough people use it to make it worthwhile, but there doesn't seem to be a way to make the software run with it.
April 16, 2018

Centrify is awesome

Brian Hicks | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify is being used across the whole organization. We are currently using it to join Macs to the domain and for single sign-on.

Centrify really bridges the gap for Macs in an enterprise environment. Being able to manage them with group policy has made my job better and will allow us to scale much more efficiently.

We are also using this for SSO in all of our applications. Being able to have our users enter and single, MFA protected portal, is a great experience.
  • Single Sign-On has been a great way to get our employees into the systems they need
  • Mac AD integration has been a lifesaver for managing Macs with GPOs
  • MFA was a smooth and easy roll out
  • I haven't had many issues with Centrify to date. The few technical ones have been solved pretty quickly.
Centrify is great if you have to have Macs in your environment. The support and integration they give has been amazing and really bridges the gap that Macs otherwise have in an enterprise environment.

Thinking about all the time we have saved using this really makes me chuckle at all the old business practices we used to do.
Denise Mark | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have been using Centrify for quite some time and are very pleased with the product itself. Their support and team of Customer Success Managers are exceptional, always are available and have never gone without resolving an issue. I work for a property management company and to have all of our applications in one place and easily accessible is a huge time saver. Our users have only one user name and password to remember making our help desk queue go down by not having all those passwords reset tickets. Can't say enough about Centrify: great product, excellent support!
  • Manages access in central location
  • Gives us that extra layer of security
  • Cuts down time spent on password reset
  • More apps available
Managing users in a corporate environment and also end users at outside locations
Score 7 out of 10
Vetted Review
Verified User
Centrify Multifactor and Same Sign-On (SSO) functionality were rolled out to our entire company to protect the companies resources and IT systems from unauthorized access. Passwords are no longer safe enough and expecting our users to remember many different passwords simply isn't an answer. We selected Centrify to protect access to our companies resources from anyone accessing the systems external to one of our branch offices. If external to the company, you must perform a multifactor authentication to gain access -- across all systems, period. Internally and externally, we utilize Centrify so that users can log in to many different IT systems using just their email address and network password. This reduces the number of passwords a user is expected to know.
  • Many methods of Multifactor Authentication - a Phone call, SMS text message, security questions, mobile app, etc.
  • Top Notch Support - Willing to work on issues until resolved.
  • System Up-time and Stability.
  • Security-Minded Company.
  • Lacks a large application catalog of pre-built solutions to work with many online vendors. Okta and Duo have a larger catalog of pre-built solutions to just click and configure. Centrify lacks this, but their support is great at configuring the applications regardless of the catalog.
Very well suited to protected IT systems for Multifactor authentication and single sign-on
Score 9 out of 10
Vetted Review
Verified User
Centrify is being used to migrate thousands of users on thousands of Linux and UNIX servers to Microsoft Active Directory authentication and authorization. This provides a single location to remove/grant access and roles and maintain passwords.
  • Central management of accounts.
  • Central management of access roles.
  • Central management of authorizations (Sudoers file).
  • API support seems to be a little lacking, but we've just begun exploring.
If you're looking to consolidate thousands of usernames and passwords to one central location, Centrify is the way to go.
Aaron Mitchell | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We first chose to use Centrify just as a federation alternative for ADFS for use with Office 365. It gives our users the same seamless SSO that they got from ADFS and it provides us with granular MFA and better security to meet the requirements of our company security policies. After implementing Centrify for federation, we found that we were able to replace several existing systems with what was already included with our Centrify subscription. We replaced BES, AirWatch, and Good with Centrify for our MDM solution; we of course replaced ADFS; we replaced SecureAuth for SAML assertions; and we are bout to replace DirSync with Centrify provisioning. This solution also became the default user portal for access to our web-based applications and hosted services, which simplified our users' access when away from our office.
  • Implementation of the Centrify solution for federation with Azure/Office 365 takes about 15 minutes versus the several hours it can take to stand up other solutions.
  • Mobile Device Management (MDM) has granular controls for administrators yet is very easy for our users.
  • I have been in the IT field for over 20 years, and the technical support at Centrify is by far the best I have ever encountered.
  • Granular Multi-factor Authentication (MFA) works perfectly and is easy to set up and maintain.
  • If you ever have to re-federate with Azure/Office 365, it only takes a few minutes, which is amazingly fast in comparison to other solutions we have tried in the past.
  • Establishing SAML assertions is well documented and easily accomplished. If you do run into any issues, Centrify technical support will assist you.
  • Centrify is excellent about proactively sending communications regarding problems and maintenance releases.
  • The Centrify Identity Service solution is constantly being updated and improved to not only bring new features/innovations, but also to make sure that everything is kept safe against the latest security threats.
  • As a customer, I truly get the impression that my business is important to Centrify and they try to be a good business partner.
  • Centrify listens to suggestions regarding the product development. This is true for suggestions regarding the admin/user interface as well as requests for new features.
  • I wish the setup for Centrify MDM with Android for Work was more streamlined like the way they have the Office 365 federation. This may be something that Centrify can't improve since it involves Google.
  • We have had a few issues with mobile devices not updating their settings as quickly as we would want.
  • I would love to see a client-side application for use with FIDO devices such as YubiKey.
  • It's difficult to really provide many cons for Centrify since they trend to be very proactive. At least half the time that I have a suggestion for them, it turns out that they have just released or are about to release the feature I'm requesting. Like I said in the pros section of this review, Centrify has the best support team I have encountered in over 20 years of being an IT professional.
  • I would love it if Centrify were to release a hosted SSLVPN solution so that we could get away from needing a dedicated on-prem SSLVPN appliance.
Centrify is a great solution for anyone looking to start using Office 365. It is also a great solution for anyone wanting to provide their users with an SSO solution using OAUTH, Federation, or SAML for any hosted service. If you are looking to use Centrify for MDM but you aren't using a hosted/hybrid email solution such as Office 365, there are better on-premise options that should be explored.
Jeremiah Miller | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Centrify to provide single-sign on services for our users. Our users can log in to Centrify and gain access to a variety of different applications without having to remember multiple passwords or sign in again. Centrify also allows us to implement multi-factor authentication.
  • Multi factor authentication.
  • Broad support for a variety of applications.
  • Customer service.
  • I'd like to see support for a few more SSO technologies, like OAuth.
SAML integration is great, it makes a good identity provider for all of your applications that support this. It's also great if you want to share an application between multiple users without them having to know the password, for example a corporate Facebook or Twitter account.
Debbie Brannan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized

Mobility management for tablets in use by various County departments. Increased secure use of mobile devices by providing security configuration with enforcement and ability to wipe device if needed. Remote device location provides ability to locate missing devices and also provides an added security feature allowing us to track and find employees in the field if in distress.

SSO for on premise applications using federation with Active Directory. SSO, user provisioning, and license management for cloud applications.

Provides users with ability to perform Password Reset.


  • Easy User Password Reset
  • Provisioning and protecting enterprise mobile devices
  • Integration with Office 365
  • Location services for Centrify administrators should be enhanced
  • Centrify browser extension becomes unstable and needs to be reinstalled

Well suited for any applications that are Active Directory integrated.

Cloud applications that require password changes due to inactivity or require passwords to be changed after X number of days.

Keith Ryan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We've implemented Centrify Identity Service across our entire organization and it has solved multiple day to day tasks such as SSO and MDM. It makes Mobile Device Management incredibly easy so that employees can enroll their own devices. It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • If an employee loses their device, Centrify gives them the ability to lock, wipe, and even locate their device.
  • Centrify gives employees the ability to change their AD password easily via the Centrify portal.
  • The device enrollment process could be a little better. For the average user and the less than average user the process is a little cumbersome. It could be made a bit easier as it is a little lengthy. For the above average user it is not a problem.
  • I think creating a security question should not be an option. It should be mandatory since it is the easiest way to authenticate. If SSO is enabled and a user cannot get into their Office 365 account and does not have their security question set up or a device enrolled then the only option is to send them an email to authenticate then they are locked out and need the help of an administrator.
Centrify gives you SSO and MDM all wrapped up in one package making the administrator's job a bit easier. However, the end user may struggle a bit with authentication if they cannot log into their account and they don't have a device enrolled to use mobile authentication, or they didn't set up a security question.
July 21, 2016

MAC with Centrify

Daniel Tripo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
With Centrify we are able to fully manage Macs in our windows environment. We also use it for enforcing group policies on end users' workstations, therefore protecting our assets and information.
  • Mac management
  • Identity managemnet
  • BYOD enforcement
  • Deployment of clients
In today's environments we are seeing an increased usage of Macs and PCs. Centrify has a plan for managing this type of setup and it works seamlessly with your windows Active Directory structure.
Daniel Czuchra | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Centrify across our entire company. Centrify solves several problems in our organization. First it helps improve our security by creating a secure, easy to use user authentication service across applications that would have previously required separate login credentials. This allows our users to only remember one password for multiple applications, reducing the possible security risks of password reuse and credential sharing. Centrify helps our IT Support staff by reducing the number of support calls for password management. Centrify also provides excellent credential management for our *NIX users as they often do not use Windows machines.
  • Centrify does an excellent job of supporting multiple platforms. Windows, Macs, Linux, iOS and Android are all well supported.
  • Ease of use. Centrify is easy and self explanatory for our users. Centrify is also great at integrating non SAML or LDAP systems into its service.
  • Centrify does a great job at uptime. The uptime provided is outstanding and ensures our users can always access their systems anywhere.
  • Centrify support could use more transparency in its actions. I've made provisioning changes and been burned in the past by them.
  • Centrify could support more browsers to integrate apps with.
  • Centrify could provide a user focused education platform to help users understand what CIS is and how it helps them.
Centrify is great in most organizations that do not have the resources to build their own SAML/ADFS authentication platform. It allows for the quick rollout and integration of SAML, AD, LDAP and more applications into the environment. CIS may not be appropriate in use cases where there are a large number of proprietary login methods or systems that require their own 2 factor auth mechanisms.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Centrify on our MacBooks and as our MDM for Iphones. Centrify allows us to lock down and if needed remotely lock/wipe devices.
  • Allows you to push windows group policy to Macbooks
  • Allows you to remote lock/wipe macbooks and iphones
  • Is a quick easy Mobile Device Management solution for iphones.
  • n/a
  • n/a
  • n/a
We are a small to medium organization and Centrify has been fairly easy to set up and deploy to our devices.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We use it solely with Office 365 to replace on premise DirSync. It gives us a SSO for Office 365 and auto license provisioning.
  • Does well with SSO for Office 365.
  • Mobile device management seems to work pretty well.
  • It seems like features break or change on a somewhat regular basis and there is a disconnect with internally with Centrify with these ongoing changes regarding best practices for setting up and configuring Centrify.
  • Would love to see impersonation feature under admin portal to be able to troubleshoot user logins. OneLogin currently has this feature and comes in handy.
We have had a few instances where functionality that was working with Centrify, all the sudden does not anymore with us not making any changes to the Centrify portal. When it's working though, it seems to work fine.
Mike Flegel B.Sc CISSP CEDS | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use it as a platform for all cloud and/or web based applications, and application of consistent access policy. It is also used to streamline administration of application access. As well, it will also be used to manage all mobile devices in the near future.
  • It's very intuitive - extremely important when trying to get users to do something totally different than they have been used to their whole careers. User acceptability has been extremely high.
  • The 'value' of the product is very obvious. The amount of time and resources used to administer access control is sharply down and the level of detailed reports and metrics provides senior management with the information they need.
  • Adding legacy internal applications is quite difficult. Some of these are going to be around for a few years yet so it would be nice if they could be added in a much simpler fashion. Perhaps as an alternative, make it possible to add an icon for the legacy app on the SSO portal but it would just take you to the legacy application sign on screen. At least, it would keep all the applications together on one screen.
  • Some people still use Blackberries and likely always will so long as that company stays solvent (just saying).
I think for companies that are in a transitional plan of moving systems to the cloud, having an IAM/SSO system earlier rather than later would be ideal. This system should be included as part of that transitional plan. If a company's cloud strategy is still uncertain, I would say just the opposite.
Joseph Politi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify Identity Service is used for single sign on to the majority of our corporate applications. It is used across the entire organization. We utilize Centrify identity Service for critical applications such as Office 365, Salesforce and our ticketing system. In addition, we leverage Centrify for provisioning user accounts into a couple of SSO apps including Office 365. Centrify addresses a number of key business problems revolving around identity management including the lifecycle management of user identities as well as the ease of access to key applications for our business users.
  • Centrify makes it simple to ramp up new applications to the Identity Service. Case in point, Office 365 took a fraction of the time to set up when compared to the traditional ADFS configuration.
  • Centrify Support and Account Success Management have been far and away the best experience compared to other vendors.
  • The ability for Centrify to provision accounts for a couple of critical applications has really helped streamline our account creation and termination process.
  • I would like to see more detailed error reporting when it comes to sync reports in order to quickly identify the root cause of directory sync issues.
Applications that can be configured to provision accounts using Centrify are well suited for the service since it further streamlines identity management. The Advanced Scripting feature in the Identity service makes it easier to configure applications that require certain attributes and is another scenario where the Centrify Service shines.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used throughout our entire organization. One of the primary business problems addressed by Centrify for end users is access management. With Centrify, we've been able to centralize access management for users, thereby reducing the need to remember multiple passwords for a variety of systems. Additionally, we use Centrify for automatic provisioning and de-provisioning of user accounts for Office 365, Salesforce, and more. This has drastically improved the efficiency and effectiveness of our internal process for on-boarding and off-boarding of users.
  • User provisioning is accurate, effective, and fully customizable.
  • Custom configuration of applications for SSO and provisioning is easy using fully customizable scripts to address your exact need.
  • The user interface is clean and easy to navigate.
  • Support is helpful and prompt.
  • More robust Mobile Device Management solution.
Centrify Identity Service is well suited for nearly any organization, especially ones utilizing Active Directory for user management. It is especially well suited for organizations looking to reduce internal resource use, because it's easy to maintain and manage. Its features also allow you to free up resources previously dedicated to the provisioning and deprovisioning of Office 365/Salesforce users (as well as other applications).
Score 9 out of 10
Vetted Review
Verified User
Incentivized
As a predominately "Windows" shop, we realized that the Macintosh OS was a sore spot. After much research, I realized that Centrify was a perfect fit as a scalable, easy to use way to reign these devices in. I'm implementing this solution across all lines of business.
  • Allows central "group policy" administration, much like Windows.
  • Easy to use tools and methods of management.
  • Great support staff!
  • Maybe a little more in initial setup assistance.
  • Maybe allow for some central patch compliance reporting.
  • More straight forward logging?
Any environment with a Macintosh/UNIX population would benefit from this solution if your backbone lies with Microsoft. If the OSX devices under your control number less than a dozen, it may not be necessary but the ability to make large scale changes on these elusive computers is worth a fortune!
July 16, 2014

Centrify for Mac

James Bainter | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
For my Apple focused group, we see Centrify as a great fit for organizations that have concerns with binding Macs into Active Directory. For many IT departments, AD is THE way they manage users through group policy. Therefore, the ability to extend that out to Macs is a huge plus. They continue to "live" in AD and do not have to learn a new application, or go to another dashboard to do their job.
  • Active Directory integration for Mac user authentication and user and group management.
  • Smart card login to Active Directory provides strong authentication and SSO to enterprise services
  • Includes a cloud-based architecture for managing remote Macs that leverages Apple's mobile device support and profile-based management
  • It would be nice if an end user could open a helpdesk ticket directly from the App in Mac
There are multiple ways to accomplish what a customer is looking to do. The most important thing is to dig in and find out what that is. If managing Macs through Active Directory is the final objective, then I would highly recommend Centrify for Mac.
Return to navigation