Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

5 Most Popular Password Cracking Tools: Protect Your Enterprise

A look at a variety of password cracking tools and security tips to reduce password risk

Filter by Tags: 

Creating Custom Reports in Secret Server

August 30th, 2012

Secret Server contains robust reporting capabilities, as mentioned in on the Secret Server Report Features Page.  In addition to the default reports included with Secret Server (see Figure 1), additional reports are available for download in the Online Reports Gallery.  Beyond these options, users who aren’t familiar with SQL reporting, may also make a Custom…


How to Create a Custom Web Launcher in Secret Server

August 29th, 2012

Creating a custom Web Launcher in Secret Server is useful for several reasons. First, it allows your organization to share online accounts without revealing the password. Second, it saves time for Secret Server users. It allows users to use one click from Secret Server seamlessly pass the credentials directly to the destination’s login page. Used…


Managing. SSL Certificates, License Keys & More in Secret Server

August 27th, 2012

Do you have copies of your SSL Certificates, Licensing Data, and Support Documentation? Of course! Can you easily search for all of those files with a single term? Maybe. Is it well-organized, access-controlled, and verified? Maybe not. Secret Server supports the functionality above by simply building a Secret Template with the proper settings. For example:…


Using Secret Server Links to Securely Transmit Sensitive Data

August 24th, 2012

Having been a Systems Engineer, I’m familiar with the problem of sharing credentials.  My method for sharing login credentials with a colleague consisted of access to a spreadsheet with everything or a Post-it that would be shredded (hopefully).  However, with Secret Server, System Admins are easily able to share credentials with colleagues by sending them…


Secret Server and Secure LDAP

July 23rd, 2012

In April 2012, we released Secret Server v7.8.000036. This was the first release to include support for Secure LDAP often referred to as LDAPS (and not to be confused with SLAPD!) Subsequent releases of Secret Server will support LDAPS. Since the release of LDAPS, it has remained a bit of an unintentional secret (no pun…


Using the PuTTY launcher on custom ports

November 23rd, 2011

Do you use custom ports for accessing your systems through SSH or telnet?  If you do, you’ll find that the launcher is configured for standard ports.  Configuring these ports requires the creation of a custom launcher and a few other steps. This can be a useful tool for Secret Server users, especially in those situations…


Inheriting Permissions Based on Folders

July 29th, 2011

Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…