Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:
Your Next Great Move

Why moving PAM from on-premise to cloud could be your next great move

Filter by Tags: 

Using Secret Server Links to Securely Transmit Sensitive Data

August 24th, 2012

Having been a Systems Engineer, I’m familiar with the problem of sharing credentials.  My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully).  However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…


Secret Server and Secure LDAP

July 23rd, 2012

In April 2012, we released Secret Server v7.8.000036. This was the first release to include support for Secure LDAP often referred to as LDAPS (and not to be confused with SLAPD!) Subsequent releases of Secret Server will support LDAPS. Since the release of LDAPS, it has remained a bit of an unintentional secret (no pun…


Using the PuTTY launcher on custom ports

November 23rd, 2011

Do you use custom ports for accessing your systems through SSH or telnet?  If you do, you’ll find that the launcher is configured for standard ports.  Configuring these ports requires the creation of a custom launcher and a few other steps. This can be a useful tool for Secret Server users, especially in those situations…


Inheriting Permissions Based on Folders

July 29th, 2011

Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…