Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…


Customizing Roles For Your Company

May 10th, 2013

This blog post was originally written in 2013.  For the most up to date information on Secret Server’s Role Customization capabilities, please visit: Secret Server Features Page: Our features are among the reasons so many IT Admins and IT Security pros consider Secret Server the best Privileged Access Management software in the market.  Find information…


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

This blog post was originally written in 2013.  For the most up to date information on Secret Server’s Two-Factor Authentication capabilities, please visit: Secret Server Features Page: Our features are among the reasons so many IT Admins and IT Security pros consider Secret Server the best Privileged Access Management software in the market.  Find information…


Secret Server Copy-To-Clipboard Add-On for Browsers Google Chrome and Mozilla Firefox

March 26th, 2013

The Mozilla Firefox add-on and the extension for Google Chrome enables values from Secret Server to be copied directly to the clipboard. This allows for ease of access when a user needs to apply information from Secret Server to other locations, however, clipboards generally do not clear the data that was copied. How do you…


Get passwords out of batch files and scripts

September 28th, 2012

Some editions of Secret Server have an Application Server API that can be used to get passwords out of your configuration files and scripts.  The idea is to authorize the application server to access Secret Server (this is done by installing the Secret Server Application Server API on the application server) – there is then…


https://thycotic.com/wp-content/uploads/2008/09/SS.jpg

Secret Server and DoubleLock

September 13th, 2012

Do you have a need for additional security when storing your most sensitive data? Where do you store the company’s banking account numbers and other critical financial data?  …top-level credentials for your customer database that contains Credit Card and Social Security numbers?  …credentials for classified system access? When you need that additional layer of security…


Creating Custom Reports in Secret Server

August 30th, 2012

Secret Server contains robust reporting capabilities, as mentioned in on the Secret Server Report Features Page.  In addition to the default reports included with Secret Server (see Figure 1), additional reports are available for download in the Online Reports Gallery.  Beyond these options, users who aren’t familiar with SQL reporting, may also make a Custom…


How to Create a Custom Web Launcher in Secret Server

August 29th, 2012

Creating a custom Web Launcher in Secret Server is useful for several reasons. First, it allows your organization to share online accounts without revealing the password. Second, it saves time for Secret Server users. It allows users to use one click from Secret Server seamlessly pass the credentials directly to the destination’s login page. Used…


Managing. SSL Certificates, License Keys & More in Secret Server

August 27th, 2012

Do you have copies of your SSL Certificates, Licensing Data, and Support Documentation? Of course! Can you easily search for all of those files with a single term? Maybe. Is it well-organized, access-controlled, and verified? Maybe not. Secret Server supports the functionality above by simply building a Secret Template with the proper settings. For example:…


Using Secret Server Links to Securely Transmit Sensitive Data

August 24th, 2012

Having been a Systems Engineer, I’m familiar with the problem of sharing credentials.  My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully).  However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…