DevOps Secrets Vault is Optimized for Machines
API-as-a-Service provides instant availability of secrets, SSH keys,
certificates, API keys, and tokens.

Applications and
Databases
Enable app-to-app communications and app-to-database access without hardcoding credentials.

DevOps
Toolchains
Secure access to tools for software and infrastructure deployment, testing, orchestration, and configuration.

Robotic Process
Automation
Centrally manage, control, and audit secrets for automated processes that operate without human oversight.
See how you can reduce DevOps secret sprawl across your attack
surface as you adopt cloud platforms and automate processes.
DevOps Secrets Vault helps you

Establish
Secure Vault
Store DevOps privileged credentials in an encrypted, centralized vault in minutes.

Manage
Secrets
Consolidate disparate DevOps vaults for easier secret rotation and a central audit trail.

Automate and
Scale
Match the pace of DevOps pipelines and RPA deployments with CLI and APIs.

Issue
Certificates
Issue X.509 and SSH certificates. Enable automated certificate signing and distribution.

Remove Standing
Access
Provide Just-in-Time access to databases and cloud platforms with URLs that expire automatically.
DEVOPS SECRETS VAULT
Features Chart
Deployment | Deploy rapidly with cloud-native SaaS architecture and elastic scalability that static, IP-based PAM solutions can’t provide. |
Advanced automation | Tap into command-line interface (CLI) and REST API. Simplify human navigation with CLI wizards for PKI, SIEM, Policy, and Auth-provider commands. |
Infinite scalability | Eliminate the need to add servers. |
High availability | Ensure 99.999% availability. |
Disaster recovery | Add a layer of protection with hot standby for rapid switchover. |
Local caching | Easily handle high-performance workloads. |
Cloud authentication | Assign AWS roles, Azure Service Principles, or GCP service accounts to servers (EC2, VMs) and authenticate to DSV. |
OpenID Connect (OIDC) authentication | Enable SSO and two-factor authentication with identify providers. |
Dynamic secrets for IaaS and databases | Make secrets available instantly for AWS, Azure, GCP, Microsoft SQL, MySQL, PostgreSQL, and Oracle. Expiring secrets mean you won’t have to worry about leaked secrets, rotation, or revocation. |
Secret Zero | Create a one-time-use URL for initial access to DSV. |
Languages / tool support |
|
Integrations |
|
Certificate issuance | Import a root or intermediate certificate and automate the distribution of client (leaf) certificates. Also enable short-lived leaf certificates and rotation of the intermediate certificate. |
SSH Keys and Certificates | Sign client keys with target keys in SSH certificate. Automate SSH key generation and distribution to eliminate standing access. |
Home Vault | Give each user their own space for secrets; even admins don’t have access by default. |
Sandbox tenant available | Test before deploying to production. |
Compliance | Rely on SOC 2 certification. |
Try DevOps Secrets Vault
Free 30 Day Trial
See how you can simplify password management at DevOps speed and scale.
Empower developers, engineers, and other IT teams to conduct their work securely, with a centralized, policy-based DevOps secrets management system.
TRY DEVOPS SECRETS VAULT FREE
DevOps Secrets Vault and Secret Server: Better Together
Synchronize secrets between Secret Server and DevOps Secrets Vault
DevOps Secrets Vault
is Optimized for Machines
- Application to application communications
- Application to database access
- DevOps tools for software and infrastructure deployment, testing, orchestration, and configuration
- Robotic Process Automation
Secret Server
is Optimized for Humans
- GUI centric
- Sharing Secrets/Controlled Access
- Session Management and Recording
- Heartbeat
- Password Rotation
- Compliance and Reporting
Top Cloud Security Use Cases
On-demand webinar
Managing privileged access as part of your cloud strategy
needs to be one of your top priorities.
In this webinar, you’ll learn the most common privileged account vulnerabilities in the cloud for IaaS, PaaS, and SaaS and get a sneak peek of Thycotic’s DevOps Secrets Vault.
Our Speakers

Director Product Marketing

Director Product Management
Critical Controls for Modern
Cloud Security
The rapid, iterative DevOps workflow exposes numerous security vulnerabilities.
Download the whitepaper to see how PAM for the cloud lowers your risk.