Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

Top 10 Best Cyber Security Podcasts of 2019

A curation of the 10 best cyber security podcasts designed to
educate and advise you on all things InfoSec.

Filter by Tags: 

Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…


Customizing Roles For Your Company

May 10th, 2013

Secret Server uses Roles and Permissions to control access to various capabilities within the system. How to set up customized roles and permissions to meet your company’s security policy Roles in Secret Server control what a user is allowed to do in the tool. Secret Server ships with three default Roles: 1. Administrator, which has…


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

In Google Chrome and Internet Explorer with Integrated Windows Authentication, enabled users are automatically signed in to Secret Server when they visit the site using their Active Directory credentials. This feature reduces the number of passwords that a user has to type, and the possibility of a forgotten password. This also allows domain administrators to…


Secret Server Copy-To-Clipboard Add-On for Browsers Google Chrome and Mozilla Firefox

March 26th, 2013

The Mozilla Firefox add-on and the extension for Google Chrome enables values from Secret Server to be copied directly to the clipboard. This allows for ease of access when a user needs to apply information from Secret Server to other locations, however, clipboards generally do not clear the data that was copied. How do you…


Get passwords out of batch files and scripts

September 28th, 2012

Some editions of Secret Server have an Application Server API that can be used to get passwords out of your configuration files and scripts.  The idea is to authorize the application server to access Secret Server (this is done by installing the Secret Server Application Server API on the application server) – there is then…


https://thycotic.com/wp-content/uploads/2008/09/SS.jpg

Secret Server and DoubleLock

September 13th, 2012

Do you have a need for additional security when storing your most sensitive data? Where do you store the company’s banking account numbers and other critical financial data?  …top-level credentials for your customer database that contains Credit Card and Social Security numbers?  …credentials for classified system access? When you need that additional layer of security…


Creating Custom Reports in Secret Server

August 30th, 2012

Secret Server contains robust reporting capabilities, as mentioned in on the Secret Server Report Features Page.  In addition to the default reports included with Secret Server (see Figure 1), additional reports are available for download in the Online Reports Gallery.  Beyond these options, users who aren’t familiar with SQL reporting, may also make a Custom…


How to Create a Custom Web Launcher in Secret Server

August 29th, 2012

Creating a custom Web Launcher in Secret Server is useful for several reasons. First, it allows your organization to share online accounts without revealing the password. Second, it saves time for Secret Server users. It allows users to use one click from Secret Server seamlessly pass the credentials directly to the destination’s login page. Used…


Managing. SSL Certificates, License Keys & More in Secret Server

August 27th, 2012

Do you have copies of your SSL Certificates, Licensing Data, and Support Documentation? Of course! Can you easily search for all of those files with a single term? Maybe. Is it well-organized, access-controlled, and verified? Maybe not. Secret Server supports the functionality above by simply building a Secret Template with the proper settings. For example:…


Using Secret Server Links to Securely Transmit Sensitive Data

August 24th, 2012

Having been a Systems Engineer, I’m familiar with the problem of sharing credentials.  My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully).  However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…