+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…


Breaking the Glass With Unlimited Administration Mode

May 28th, 2013

What happens when a user creates Secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your Secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…


Customizing Roles For Your Company – Part One

May 10th, 2013

Secret Server uses Roles and Permissions to control access to various capabilities within the system. In this two part blog post we will review how to set up customized roles and permissions to meet your company’s security policy. Roles in Secret Server control what a user is allowed to do in the tool. Secret Server…


Restricting User Input for Launcher

May 3rd, 2013

A new feature in Secret Server is the ability to control which servers users are able to connect to using a Launcher. This can be done by specifying a list of machines or servers on a Secret in a notes field. This list can either be a whitelist or a blacklist of servers the Launcher…


Taking Web Password Filler On The Road

April 23rd, 2013

The same Web Password Filler that you use on your desktop browser is also available for your mobile devices. For iPhones and iPads, first you will want to create the Web Filler on Safari on your Mac desktop, then after using iCloud Bookmark sync with your iPhone the Web Password Filler will be ready for…


Integrated Windows Authentication and Two-Factor Authentication

April 11th, 2013

In Google Chrome and Internet Explorer with Integrated Windows Authentication, enabled users are automatically signed in to Secret Server when they visit the site using their Active Directory credentials. This feature reduces the number of passwords that a user has to type, and the possibility of a forgotten password. This also allows domain administrators to…


Secret Server Copy-To-Clipboard Add-On for Browsers Google Chrome and Mozilla Firefox

March 26th, 2013

The Mozilla Firefox add-on and the extension for Google Chrome enables values from Secret Server to be copied directly to the clipboard. This allows for ease of access when a user needs to apply information from Secret Server to other locations, however, clipboards generally do not clear the data that was copied. How do you…


SOX Compliance on external systems using PowerShell scripts in Secret Server

February 25th, 2013

A critical component of many compliance mandates such as SOX, HIPAA, and PCI is guaranteeing that user activity is audited. Secret Server maintains an internal audit trail for user actions and access to shared privileged accounts, but it doesn’t necessarily guarantee that external systems maintain their own audits. After several customer requests, Secret Server can…


Devolution’s Remote Desktop Manager integrates with Secret Server

February 20th, 2013

Thycotic Software would like to thank our technology partner, Devolutions, for recently integrating their Remote Desktop Manager with Secret Server. Remote Desktop Manager’s integration with Secret Server enables you to launch your remote access applications easily and securely without knowing the credentials. By using our publicly available Secret Server API, Remote Desktop Manager is able…


Launching Batch Files in Secret Server

January 18th, 2013

A feature that was introduced in Secret Server 8.0 was the ability for the launcher to launch a batch script that is stored in Secret Server. This is useful when a custom launcher needs to be able to start multiple processes. For example, to create a custom launcher that starts an SSH tunnel program then…