Secret Server Feature List

Dozens of Easy-to-Use Features

  • Integration

    • Active DirectoryProvides synchronization and authentication for easy management of permissions based on AD users and groups
    • API (Web Services)Allows users the ability to integrate custom applications or third party solutions with Secret Server
    • Application Server APIEliminate passwords stored in source code and config files with the Application Server API
    • Cisco EnableTarget specific commands on any Cisco device with Cisco Enable connection
    • CRM IntegrationIntegration with Connectwise, AutoTask and Microsoft CRM for easy organization
    • Firefox Add-OnFull support for the Firefox web browser including a custom extension to access Secrets
    • HSM IntegrationIncrease the security of encrypted data with optional support for HSM integration
    • PowerShell IntegrationUpload custom PowerShell scripts for greater flexibility making environmental changes
    • Qualys IntegrationPerform authenticated scanning on your network with Secret Server and QualysGuard
    • Remote Desktop and PuTTY LauncherProvides convenient and secure connections to Remote Desktop and SSH sessions without revealing password
    • SAML IntegrationEnjoy single-sign on to applications and sites with available SAML integration
    • SAP Platform SupportManage SAP accounts using an out of the box using a SAP Secret Template and Password Changer
    • Secret ImportAllows users to easily migrate existing sensitive data into Secret Server
    • Session RecordingRecords video of privileged account sessions using PuTTY and Remote Desktop
    • SIEM IntegrationIntegrates with SIEM tools that use the CEF and SYSLOG formats, aggregating events to reduce risk
    • Smartphone ApplicationsAllows secure access to sensitive information from smartphones
    • SSH ProxyingProxy SSH sessions through Secret Server for greater control and logging capabilities
    • Virtual Machine SupportInstall Secret Server on a virtual machine such as VMware for additional scalability
    • Web Password FillerUse the Web Password Filler to instantly fill in username and password credentials in your browser
    • Windows Form FillerLog into any Windows application using the Windows Form Filler
  • Manage and Organize

    • Advanced ReportsCreate custom reports in Secret Server using key metrics that will appeal to the C-level
    • Audit ReportsUser Audit Reports provides a detailed history of the admin's use of Secret Server
    • Bulk OperationsBulk operations are available for sharing permissions and moving multiple secrets in one step
    • Change Network PasswordsAutomatic remote password changing for Windows, AD, SQL, Unix/Linux, Cisco, ESX, Sybase and Oracle
    • Creating SecretsEasily create and manage Secrets for passwords, certificates, keys and more
    • DashboardA dynamic drag-and-drop Dashboard provides a tailored, customized view of Secret Server
    • File AttachmentsAllows users to store files such as private key files, SSL certificates, Microsoft Excel documents and more
    • FoldersAllows users to organize information, segregate access and apply specific permissions on sensitive data
    • Import SecretsAllows users to easily migrate existing sensitive data into Secret Server
    • Managing GroupsAssign users to multiple Groups along with custom permissions for each group
    • Password HistoryStores all previous values of passwords for review
    • Role Based Access ControlAllows admins to assign access to data and actions within the system
    • Scheduled ReportsSchedule the delivery of any report directly to your inbox
    • Search and BrowseAllows users to easily navigate stored sensitive data to efficiently locate information
    • Secret TemplatesAllows users to store different types of sensitive information in different formats
    • Sharing SecretsAllows users to access and manage privileged data among teams
    • ThemesEasily customize the Secret Server dashboard to reflect your personal touch or company brand
    • Web BasedAccess Secret Server securely from any web browser, including smartphone and tablet devices
  • Secure

    • AES 256 EncryptionProvides strongest level of encryption possible to protect sensitive data
    • DoubleLockAdditional custom encryption keys requiring an additional unique password for elevated security
    • FIPS 140 ComplianceAllows application to run in a FIPS compliant environment (enforced by Windows Operating System)
    • IP RestrictionsAllows access only from IP addresses within a specific range
    • Password GenerationCustomizable password generation using length and different character sets to determine complexity
    • Password RequirementsCreate custom security policies around password length, complexity and expiration
    • RADIUS AuthenticationIntegration using RADIUS for two-factor authentication
    • SHA-512 HashingStrong one-way hashing for authenticating user and DoubleLock passwords
    • SSH ProxyingProxy SSH sessions through Secret Server for greater control and logging capabilities
    • Two-factor AuthenticationProvide two-factor authentication for admins via confirmation email
  • Disaster Recovery

    • Automatic BackupsSupport for automatic database and IIS directory backups
    • Clear Text ExportAllows cleartext export of all sensitive data in the system for offline backup
    • Database MirroringDatabase mirroring and automatic failover provide high availability for disaster recovery
    • Unlimited AdminUse Unlimited Admin to override emergency access to sensitive Secret Server data
  • Compliance

  • Real Time Management

    • Check OutAllows users to "check out" passwords for a set time interval and reset to a random value after use (one time password)
    • ClusteringAllows Secret Server users to run multiple web servers to provide redundancy for high availability
    • DiscoveryScans and locates local admin accounts on the network to automatically manage their passwords
    • Event SubscriptionsCustomizable email alerts sent to system admins when a specific action/condition occurs
    • Expire SecretsAllows users to set expiration intervals to determine when passwords or sensitive data should be changed/reviewed
    • HeartbeatMonitors credentials across the network at a set time interval to ensure passwords are valid
    • Manage Service AccountsAutomatic password changing for Service accounts; will scan network for dependent applications (stop and restart app)
    • Remote AgentAllows users the ability to automatically change passwords across different networks
    • Request AccessForces users to request access to specific information (workflow)
    • Require CommentForces users to provide reason for accessing a password (used with change control systems)
    • Security HardeningUtilize Security Hardening to ensure your organization's security practices are being followed
    • Session MonitoringSession Monitoring provides an extra layer of accountability with a real-time view on live admin sessions
    • Session RecordingRecords video of privileged account sessions using PuTTY and Remote Desktop
    • SMTP AlertsReceive alerts via SMTP email notifications on system activity
    • SSHTarget any SSH or Telnet device for automatic password rotation and verification