Manage passwords from any machine with Internet access. Or, install Secret Server password manager locally on your own network.
Read about web-based password management >
Secret Server enables administrators to manage multiple users through Groups. Users can belong to different groups and receive the permissions attributed to those groups.
Read about managing users in groups >
Create New Secrets
Secrets are individually named sets of sensitive information and can address a broad spectrum of secure data. Secret security can be centrally managed, and the folder structure allows one or more Secrets to inherit permissions from a parent folder.
Read about creating Secrets
Secrets are configured using templates called Secret Templates. Secret Server provides preinstalled templates for managing sensitive information such as: Active Directory passwords; passwords for admin accounts, routers, databases and websites; bank account information and credit card numbers.
Read about Secret templates. >
Search and Browse
Managing passwords is easy when you have an efficient method of locating them. Search for secrets using a simple text search.
Read about searching and browsing in Secret Server >
Organize Secrets in folders based on customers; geographical locations; and business units -for example DBAs, UNIX admins and Windows Server Admins. Folders can be nested at multiple levels to represent a useful structure.
Read about folder organization in Secret Server >
Import large numbers of Secrets from an Excel or csv/tab delimited file. Integration with legacy systems is easy.
Read about importing Secrets in Secret Server >
Administrators can create custom reports based on any Secret Server information stored in the database (e.g. users, audits, permissions, folders, etc.). You can also organize your reports into custom built Report Categories.
Read about custom reports >
Track every single read, write or permission change--essential for assessing vulnerability when someone leaves your company.
Read about audit reports >
Protect your documents the same way you secure your passwords. Attach pictures, PDFs, zip files, and spreadsheets.
Read about attaching a file while creating or editing a Secret >
View a record of previous passwords used for any account.
Read about password history >
Role Based Access Control
Secret Server ships with three Roles: Administrator, User, and Read-Only User. Each Role contains various permissions to match the job function of the user.
Read about role based access control >
Dashboard is a widget-based screen that serves as the main page for searching and viewing Secrets. The dynamic drag-and-drop UI improves efficiency and increases data access from a single screen.
Read about the easy to use Dashboard >
Choose from four standard themes, then brand or customize your Secret Server!
Read about Themes >
Secrets can be set to expire at certain intervals, reminding users when sensitive data needs review.
Read about expiring Secrets >
Change Network Passwords
Change network passwords and synchronize Scheduled Tasks, Service Accounts and IIS App Pools instantly.
Read about changing network passwords in Secret Server >
Receive email notification when shared Secrets are changed. It's also a convenient way to alert your team of password changes.
Read about email notifications in Secret Server >
Custom Commands for RPC and Heartbeat gives administrators the ability to craft their own Password Changers with the flexibility to target any SSH or Telnet device.
Read about Command SSH >
Heartbeat allows effective, up-to-the-minute monitoring of credentials across a company network.
Read about Heartbeat >
Set up Event Subscriptions to send you an email alert when specified actions are performed, or when an event occurs within the system.
Read about Event Subscriptions >
Remote Agents keep Secrets up to date on external networks by allowing Remote Password Changing and Heartbeat to occur on networks not directly connected to Secret Server (e.g. DMZ vs. internal or over the internet).
Read about Remote Agents >
The Check Out feature forces accountability on Secrets by granting exclusive access to a single user with a One Time Password. No other user can access a Secret while it is checked out.
Read about Check Out >
Manage access to Secrets with Request Access. This feature requires a user to be granted approval to access a Secret.
Read about accessing Secrets with Request Access >
Active Directory Integration
Log in to Secret Server using your workstation account and have one less password to manage.
Read about Active Directory Integration in Secret Server >
RDP / PuTTY Launcher
Increase security by allowing administrators to use passwords without knowing what they are. Use the Launcher for permitting remote access to machines, launching applications, and logging into websites.
Read about Launcher >
Keep your critical passwords at your fingertips at all times. Our iPhone app comes with enterprise-level security.
Read about the password manager app for iPhone >
Keep your critical passwords at your fingertips at all times. Our BlackBerry app comes with enterprise-level security.
Read about the password manager app for BlackBerry >
API (Web Services)
Access Secret Server using mobile apps, third party applications, and scripts - with proper authentication.
Read about Web Services >
A custom Firefox extension ensures that Firefox has access to all Secret Server's great features.
Read about Firefox for Secret Server >
Integrate your Secret Server with industry applications such as ConnectWise, AutoTask and Microsoft CRM.
Read about integrating Secret Server with other applications >
Cisco Enable / UNIX root
Using the customizable command sets, specific Cisco commands can be targeted at any Cisco device with SSH or Telnet access.
Read about Cisco Enable >
Import Secrets from other applications using Secret Server's migration tool.
Download the Import Migration Tool >
Virtual Machine Support
Install Secret Server on a Virtual Machine such as VMWare using the exact same process as a standard server installation.
Read about Virtual Machine Support >
If you're working toward achieving SOX compliance, password management is critical.
Read about how Secret Server can help you with SOX compliance >
PCI DSS Compliance
Vulnerability management and access control are vital to PCI DSS compliance. Secret Server equips you with the means to apply these measures to your password management process.
Read about how Secret Server can help you with PCI DSS compliance >
MASS Regulation 201 CMR 17
The Massachusetts Data Protection Law which mandates that all organizations protect access to personal information for Massachusetts residents.
Read about Secret Server can help you with MASS 201 regulation >
AES 256 bit encryption
Among many other security features Secret Server uses AES 256 bit encryption on each Secret to ensure maximum security.
Read about AES 256 Encryption >
Secret Server's passwords are hashed in the database using the SHA 512 hashing function. A hash function differs from an encryption method in that a hash function, when used correctly, is computationally infeasible to reverse
Read about SHA-512 Hashing >
This feature provides additional security for your password manager.
RADIUS-based authentication is also supported.
Read about two-factor authentication > >
Generate passwords automatically using the settings of the template used to create a Secret.
Read about generating secure passwords >
FIPS 140 Compliance
Secret Server accomodates Federal government departments and private industries needing to achieve this standard by using a FIPS compliant algorithm.
Read about FIPS 140 Compliance >
Integrate Secret Server with RADIUS to provide a more robust and secure level of user authentication.
Read about RADIUS Authentication >
Unique to Secret Server, DoubleLock provides an additional layer of security by encrypting Secret data with a custom encryption key.
Read about DoubleLock security >
Control the locations and networks from which users can gain access - configure Secret Server to be accessible only by IP addresses within a specified range.
Read about IP Restrictions >
Schedule automatic backups with one click, ensuring that the latest database can be restored at any time.
Read about automatic backups >
Some financial organizations are required to print certain sensitive information and store it in a bank vault. Secret Server's Admin Export feature allows administrators to export Secrets to a plain text CSV file.
Read about Cleartext Export >
Unlimited Administration Mode or "Break the Glass" is an emergency feature designed to allow an administrator access to all Secrets and Folders in their Secret Server instance without explicit permission. This can be set up so that two people must agree before the feature can be used.
Read about the the Unlimited Admin feature >
Secret Server supports SQL database mirroring to create a real-time backup of all the stored data. With SQL mirroring, the SQL database can be configured with a primary, secondary and witness server to set up automatic failover.
Read about Database Mirroring >
Back to top ^