Using access and auditing features together

You can use access-related features and components without auditing if you aren’t interested in collecting and storing information about session activities. You can also deploy auditing-related features and components without access control and privilege management features if you are only interested in auditing user activity on Linux and UNIX computers. However, you can recognize the most value from Centrify Authentication Service, Privilege Elevation Service, and Audit & Monitoring Service by using all of the services as an integrated solution for managing elevated privileges and ensuring accountability and regulatory compliance across all platforms in your organization.