Having been a Systems Engineer, I’m familiar with the problem of sharing credentials. My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully). However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them a simple URL format:
- “SERVERNAME” is the DNS name or IP Address of the server that hosts Secret Server.
- “VIRTUALDIRECTORY“ is the name of the Virtual Directory used when Secret Server was installed. Typically, this is “SecretServer”.
- “SECRETNUMBER” is the actual number associated with the secret data as found in your instance of Secret Server. This number increases sequentially as secrets are added.
For instance, the secret of a test server I have installed is shared with this link: http://192.168.0.2/SecretServer/SecretView.aspx?secretid=52
Note: Using this link requires Secret Server login permissions and permissions for that user to at least view the secret you’re trying to share.
The elegance of this method is that users can share credentials between them through email. The use of the data and permission to use the data is still controlled by a Secret Server Administrator. It’s worth mentioning is that all of this activity is logged and reportable within Secret Server.
Admins with the need for additional security can link to a secret that has a Launcher enabled and the password is hidden from users. This way, an Engineer can directly link to a secret’s launcher with a coworker. The coworker can use the credential to login via Remote Desktop (or any other launcher functionality) to a server without knowing the actual credentials.
Hide Launcher Password is a feature that allows the password field of a secret to remain hidden from view or clipboard access, but still usable by the launcher. The activity is completely logged in Secret Server and nothing was written down, able to be copied, or shared with anyone but those that have express permissions in Secret Server. Enable this security feature by clicking the Edit button for a secret, then Security tab -> Edit button -> check Hide Launcher Password -> Save button.
The use of links go beyond email. Admins could also use these links in support documentation for applications or systems. In the documentation, a link to Secret Server data can be embedded in place of the actual admin credentials. This would negate the need for a document-based password protection scheme.
Latest posts by JordanTrue (see all)
- Streamline Compliance with your Internal Security Policy by using Secret Server - March 4, 2014
- Is Your Hash Being Passed? - February 25, 2014
- Sneak Peek: New Secret Server features only at RSA Conference 2014 - February 20, 2014