Secret Server Cloud
โ–ถ Delinea Platform

Platform Upgrade Center
Training Guide

A practical, task-by-task training guide mapped directly to the 7 steps of the Delinea Platform Upgrade Center โ€” the in-product wizard at Settings โ†’ Platform Upgrade Center in Secret Server Cloud. Covers pre-upgrade preparation, all seven guided steps, engine and connector readiness, secrets migration, function testing, and integration health validation.

0
Total Tasks
0
Completed
7
Upgrade Center Steps
4
Phases
๐Ÿ“Œ
Key Migration Facts โ€” What Changes vs. What Stays the Same
โš  What Changes
  • Roles & permissions management moves to Platform (read-only in SS)
  • Users log in via delinea.app instead of secretservercloud.com
  • SSO must be re-configured natively on the Platform
  • AD Connector replaces SS AD sync for platform identity
  • Groups become "Managed by Platform" and are read-only in SS
โœ“ What Stays the Same
  • All secrets, folders, permissions โ€” fully intact, zero disruption
  • All SS integrations remain configured
  • All customisations, workflows, and files preserved
  • Historical data and full audit trails remain visible
  • Current SLA and uptime guarantees remain in effect
Phase 01
Pre-Upgrade
0 / 2 modules
Phase 02
Upgrade Center
0 / 7 steps
Phase 03
Engines & Connectors
0 / 2 modules
Phase 04
Post-Upgrade
0 / 3 modules
โ—ˆ Phase 01 โ€” Pre-Upgrade Preparation
๐Ÿ”
Module A ยท Pre-Upgrade

Permissions & Prerequisites

Before the Platform Upgrade Center is even visible in Secret Server Cloud, specific permissions must be assigned to the SS Admin role, and โ€” for AD environments โ€” five Quick Start prerequisites must be completed first.

โ—ˆ Complete before opening Upgrade Center
Assign Required SS Admin Role Permissions
Admin โ†’ Roles โ†’ Secret Server Admin role
CRITICAL
โ–ถ

The Platform Upgrade Center option will not appear in the Settings menu unless the Secret Server Administrator role has all three of the following permissions enabled.

  • 01Navigate to Admin โ†’ Roles and open the Secret Server Administrator role.
  • 02Ensure the following permissions are enabled: Administer Platform Integration, View Platform Integration, Migrate Data to Platform.
  • 03Save the role. Then navigate to Settings โ†’ Platform Upgrade Center to confirm the option is visible.
โ„นIf the option still does not appear, an admin can manually enable it by visiting <tenant>.secretservercloud.com/ConfigurationAdvanced.aspx and setting the Delinea Platform Enablement Code to BETTERTOGETHER.
Administer Platform Integration permission added to SS Admin role
View Platform Integration permission added
Migrate Data to Platform permission added
Settings โ†’ Platform Upgrade Center visible and accessible
Active Directory Quick Start Prerequisites (AD Customers Only)
Required before AD-integrated upgrades
CRITICAL ยท AD
โ–ถ

If your SSC instance uses Active Directory synchronisation, Delinea requires five preparatory steps from the Quick Start Guide for AD Customers before starting the Upgrade Center โ€” skipping these causes group sync failures post-upgrade.

  • 01Add the Platform System Administrator group to the list of synchronized groups: Secrets Administration โ†’ Platform Upgrade โ†’ Groups tab.
  • 02Add a Secret Server Administrator role to the new Platform System Administrator group so your domain account retains SS admin rights post-upgrade.
  • 03Ensure your personal domain admin account is a member of the Platform System Administrator group.
  • 04Provision one (minimum) or two (recommended) Windows Server 2019+ VMs to host the Delinea AD Connector.
  • 05Confirm the AD Connector servers meet requirements: domain-joined, no outbound SSL inspection, outbound TCP 443 to delinea.app.
โšกDo not skip the group synchronisation step. Without it, cloudadmin on the Platform will not have Secret Server admin permissions, and you cannot see existing secrets when initially logged in as cloudadmin.
Platform System Administrator group added to AD sync groups in SS
SS Administrator role assigned to Platform System Administrator group
Personal domain account added to Platform System Administrator group
At least one (preferably two) connector VM provisioned and domain-joined
TCP 443 outbound to *.delinea.app confirmed open from connector servers
Break-Glass Local Admin Account
cloudadmin fallback ยท Non-SSO access during transition
CRITICAL
โ–ถ

The cloudadmin@[tenantname] account is the first account on the Platform. It is a local account with no SSO dependency. Ensure you have this account's credentials stored offline before starting the upgrade โ€” it is your only access path if SSO fails during Step 5 (Federation).

โš While logged in as cloudadmin you will not see existing SS secrets and will not have SS admin permissions โ€” this is expected. To gain SS admin access, complete the AD Connector setup and log in with your domain admin account.
cloudadmin@[tenantname] credentials stored in a secure offline location
Account tested with successful platform login confirmed
โš™
Module B ยท Pre-Upgrade

Distributed Engine Health Check

Secret Server Distributed Engines run on-premises and must be healthy before the upgrade begins. Engines that are offline or out-of-date before the upgrade will not automatically reconnect to the Platform.

โ—ˆ Pre-Upgrade ยท Verify all SS engines are online
Verify All Engine Heartbeats in Secret Server
Admin โ†’ Distributed Engine โ†’ Manage Sites
REQUIRED
โ–ถ

Navigate to Admin โ†’ Distributed Engine โ†’ Manage Sites. All engines should show a green Online status. Engines in a degraded or outdated state must be resolved before proceeding with the upgrade.

StatusMeaningAction Required
โ— OnlineEngine healthy and communicatingNone โ€” proceed
โ— Needs UpdateEngine version behind current SS versionRun engine updater on host
โ— OfflineEngine not responding to SSCheck service, firewall, connectivity
โ— InitialisingEngine recently restartedWait 5 min then recheck
All engines show Online status โ€” no Needs Update or Offline states
Engine version inventory documented (hostname, version, site)
Any previously offline engines investigated and resolved
Firewall Egress Rules for delinea.app
Engine hosts โ†’ *.delinea.app ยท TCP 443
CRITICAL
โ–ถ

After upgrade, all engine communication moves to the new Platform domain. Add the new outbound rules to perimeter firewalls and proxy PAC files covering each engine host before the upgrade begins.

# Add to perimeter firewalls / proxy allowlists on all engine hosts Destination: *.delinea.app TCP/443 ALLOW Destination: *.delinea.com TCP/443 ALLOW # Keep existing rule until post-upgrade validation is done Destination: *.secretservercloud.com TCP/443 ALLOW (keep temporarily)
*.delinea.app egress rule added on all engine-host firewalls
Proxy PAC file / WPAD updated for new domain
SSL inspection bypass configured for delinea.app (if applicable)
โ—ˆ Phase 02 โ€” Platform Upgrade Center (Steps 1โ€“7)
๐Ÿ—
Upgrade CenterStep 1 of 7

Provision a Platform Tenant

Create the new Delinea Platform tenant from within the Platform Upgrade Center. The tenant name mirrors your SSC tenant โ€” if SSC is alpha1.secretservercloud.com, the Platform will be alpha1.delinea.app. The default region matches your SSC region.

โ—ˆ Upgrade Center ยท Step 1
Navigate to Platform Upgrade Center & Provision Tenant
Settings โ†’ Platform Upgrade Center โ†’ Step 1
STEP 1
โ–ถ

Open Secret Server Cloud and navigate to Settings โ†’ Platform Upgrade Center. Begin Step 1 to provision your Platform tenant. If branding customisations exist in SSC, they will be automatically copied to the Platform tenant at this stage.

  • 01In SSC, go to Settings โ†’ Platform Upgrade Center.
  • 02Click Start on Step 1: Provision Platform Tenant.
  • 03Confirm or adjust the tenant name (typically same as SSC name).
  • 04Confirm the region (defaults to your SSC region).
  • 05Click Launch Platform once provisioning completes.
  • 06You will be prompted to set a password for the cloudadmin account โ€” record this securely.
  • 07Once logged in to the Platform, navigate to the Platform Upgrade Center from within the Platform to continue with Step 2.
โšกAll subsequent upgrade steps (2โ€“7) must be completed from within the Delinea Platform Upgrade Center, not from within Secret Server Cloud.
Platform tenant provisioned successfully
cloudadmin password set and stored securely offline
Successfully logged in to <tenant>.delinea.app as cloudadmin
Branding copied (if applicable)
Platform Upgrade Center opened from within the Platform
๐Ÿ”’
Upgrade CenterStep 2 of 7

Secure Access

Configure Identity Policies on the Platform. For AD-integrated tenants, an Allow List policy and a Deny policy are automatically created. These control which users can authenticate to the Platform โ€” tailor them to your organisation's requirements.

โ—ˆ Upgrade Center ยท Step 2
Review Auto-Created Identity Policies
Platform โ†’ Settings โ†’ Identity Policies
STEP 2
โ–ถ

For AD environments, the Upgrade Center automatically creates two Identity Policies: an Allow List policy scoped to the "Secret Server Directory Users" group, and a Deny policy for all other users. Review these policies and customise them to your security requirements.

  • 01Navigate to Settings โ†’ Identity Policies on the Platform.
  • 02Review the auto-created Allow List policy โ€” it mirrors the default policy but is scoped to group membership.
  • 03Confirm the Secret Server Directory Users group is included in the Allow List policy.
  • 04All existing AD-synced users and new synchronized users will be automatically added to this group.
  • 05Adjust MFA requirements, session duration, and other policy settings to match your security standards.
โ„นIf you need full manual control over policy configuration, see Manual Policy Configuration in Delinea docs โ€” but for most customers the auto-created policies are sufficient and correctly configured.
Allow List identity policy reviewed and confirmed correct
Deny policy reviewed and confirmed in place
MFA requirements set per organisational policy
Step 2 marked complete in Upgrade Center
๐Ÿ”Œ
Upgrade CenterStep 3 of 7

Install AD Connector & Connect Domains

The Delinea AD Connector replaces Secret Server's built-in AD sync for the Platform. Install one connector per forest containing AD domains currently synchronised with Secret Server. The connector enables live, on-demand directory querying rather than scheduled sync.

โ—ˆ Upgrade Center ยท Step 3 โ€” AD Customers Only
Download & Install the Delinea AD Connector
Platform โ†’ Settings โ†’ Connectors โ†’ Add Connector
STEP 3
โ–ถ

The AD Connector is downloaded from within the Platform. It is installed on a Windows Server 2019+ machine that is domain-joined to the forest containing your AD users. The same server running a Distributed Engine can be used, but check minimum requirements differ.

  • 01In the Platform, navigate to Settings โ†’ Connectors.
  • 02Click Add Connector.
  • 03In Box 1, click Download to get the 64-bit Connector Installer.
  • 04In Box 2, copy and save the Tenant URL.
  • 05Generate or copy a Connector Registration Code โ€” save it for the installer wizard.
  • 06Copy the installer to the target connector server and run it as Administrator.
  • 07In the Connector Configuration Wizard, select Use Registration Code and paste the saved code.
  • 08The wizard reads the forest and displays all domains โ€” select the domains to connect.
  • 09Return to the Platform and confirm the connector shows as Connected.
โšกInstall one connector per forest, not per domain. A single connector can handle all domains within a forest. If you have multiple forests with separate AD syncs in SS, install a connector in each forest.
โš The connector server must have no outbound SSL inspection for the delinea.app domain. Deep packet inspection on the connector's HTTPS traffic to the Platform will cause registration failures.
Connector installer downloaded from Platform
Registration Code generated and saved
Installer run on domain-joined Windows Server 2019+ host
All target forest domains selected in wizard
Connector shows Connected status in Platform Settings โ†’ Connectors
Step 3 marked complete in Upgrade Center
โ˜
Upgrade CenterStep 4 of 7

Connect Entra ID Tenants

If Secret Server currently uses Microsoft Entra ID (formerly Azure AD) for directory synchronisation, this step creates a matching integration on the Delinea Platform. Skip this step if no Entra ID directories are configured in Secret Server.

โ—ˆ Upgrade Center ยท Step 4 โ€” Entra ID Customers Only
Configure Entra ID API Integration on the Platform
Platform Upgrade Center โ†’ Step 4 โ†’ Configure Entra ID
STEP 4
โ–ถ

The Upgrade Center detects any Entra ID tenants currently in use by Secret Server and presents this step. An Azure application registration is required to enable the Platform to authenticate against Entra ID. Choose one of two methods:

MethodWho Manages AzureBest For
Delinea-managed appDelinea handles Azure componentsCustomers who want minimal Azure admin overhead
Customer-managed appYou create & manage the Azure app registrationCustomers who require full Azure resource control
  • 01Click Start on Step 4 in the Upgrade Center.
  • 02Select your preferred method (Delinea-managed or customer-managed).
  • 03Follow the configuration wizard to complete the Entra ID app registration.
  • 04Return to Upgrade Center and click Refresh to confirm the Entra ID tenant shows as connected.
  • 05Mark the step complete.
โ„นIf no Entra ID Domains are configured in Secret Server, this step auto-completes with the message "No Entra ID tenants configured in Secret Server and no configuration is required."
Entra ID app registration created (Delinea-managed or customer-managed)
Entra ID tenant shows Connected in Upgrade Center
Step 4 marked complete in Upgrade Center
๐Ÿ”‘
Upgrade CenterStep 5 of 7

Set up Federation (SSO)

Configure SAML 2.0 or OIDC federation providers for single sign-on on the Platform. The Secret Server Cloud SSO integration is not automatically transferred โ€” it must be re-configured natively on the Platform. The SSO URL changes from secretservercloud.com to delinea.app.

โ—ˆ Upgrade Center ยท Step 5
Configure SAML / OIDC Federation Providers
Platform โ†’ Settings โ†’ Federation Providers
STEP 5
โ–ถ

Add federation providers (Okta, Entra ID / Azure AD, Ping, ADFS, etc.) following the Delinea SAML & OIDC Federation guides. Critically, the new ACS URL and Entity ID use the delinea.app domain โ€” update these in your IdP application before testing.

# SAML SP values โ€” update these in your IdP application # OLD (secretservercloud.com) โ€” no longer valid post-upgrade ACS URL (old): https://<tenant>.secretservercloud.com/saml/consume # NEW (delinea.app) โ€” use these when configuring IdP ACS URL (new): https://<tenant>.delinea.app/saml/consume Entity ID: https://<tenant>.delinea.app/saml

Use the correct user mapping settings based on your user population:

User TypeMap Federated UserCreate local if unable to map
AD users logging into PlatformRequiredDISABLED
Non-domain users (local SS users)RequiredENABLED
โšกAdd all UPN suffixes and login domains to the federation config's domain list โ€” this determines which usernames trigger redirect to the IdP and which AD connector is used for user lookup.
IdP application (Okta/Azure AD/Ping) updated with new ACS URL (delinea.app)
Federation provider added to Platform with correct user mapping settings
UPN suffixes and login domains added to federation provider config
Test SSO login performed successfully via new Platform URL
Step 5 manually marked complete in Upgrade Center
๐Ÿ“Š
Upgrade CenterStep 6 of 7

Data Pre-check

Synchronise Secret Server users, groups, and roles into the Delinea Platform Identity Store. This copies the identity data needed for the Platform to correctly authenticate and authorise existing SS users. Migrate a small pilot group first, validate, then complete in batches.

โ—ˆ Upgrade Center ยท Step 6
Migrate Users, Groups & Roles to Platform Identity Store
Upgrade Center โ†’ Step 6 โ†’ Data Pre-check
STEP 6
โ–ถ

This step copies Secret Server roles, local users, and local groups into the Platform. Understand what gets created:

SS ObjectWhat Gets Created on PlatformEffect in SS
SS RolesPlatform roles prefixed with "Secret Server " (e.g. "Secret Server Administrator")No change to existing roles
Local UsersCopied to Platform with password hash; Thycotic One users invited to set a passwordUsers exist in both until login
Local GroupsPlatform groups created with same name, set to "Managed by Platform"Groups become read-only in SS
Group โ†’ Role associationsGroup becomes member of matching Platform rolePermissions remain equivalent
  • 01Start with a pilot: select 2โ€“5 users representing different role types.
  • 02Run the migration for the pilot group and validate login and SS access.
  • 03Confirm migrated users can log in via the Platform URL and see their secrets in SS.
  • 04Once pilot is validated, migrate remaining groups in batches.
  • 05After all groups are migrated, users can authenticate to either SS or the Platform equivalently.
๐Ÿ””At this stage, users can use either Secret Server Cloud or the Delinea Platform and have equivalent access. The full cut-over to Platform-only occurs in Step 7.
Pilot group migrated (2โ€“5 users) and login validated
Pilot users confirmed able to see secrets from Platform URL
All remaining groups migrated in batches
All platform roles confirmed with correct SS role prefix naming
Step 6 marked complete in Upgrade Center
๐ŸŽฏ
Upgrade CenterStep 7 of 7

Complete the Upgrade

The final Upgrade Center step transfers role and permissions management authority permanently to the Delinea Platform. After this step, roles and permissions in Secret Server become read-only. All user and group orchestration is owned by the Platform.

โ—ˆ Upgrade Center ยท Step 7 โ€” Point of No Return
Transfer Management Authority to Platform
Upgrade Center โ†’ Step 7 โ†’ Complete Upgrade
STEP 7
โ–ถ

Executing Step 7 unifies management. From this point, any changes to user details, group membership, or role assignments must be made in the Platform โ€” they replicate down to Secret Server automatically.

โš This step is irreversible. Role and permissions management in Secret Server will become read-only. Ensure Steps 1โ€“6 are fully validated and all users have been migrated before proceeding.
  • 01Confirm all users, groups, and roles from Step 6 are verified and correct.
  • 02Confirm all federation/SSO integrations are working (Step 5).
  • 03Click Complete Upgrade in the Upgrade Center.
  • 04Verify that Roles and Permissions in SS now show as read-only.
  • 05Communicate to all users that the Platform URL (delinea.app) is now the primary access point.
โœ“Once complete, direct all users to log in via <tenant>.delinea.app. Any updates to group membership or permissions must now be done in the Platform, not in Secret Server.
All Steps 1โ€“6 fully validated before proceeding
Complete Upgrade executed in Upgrade Center
SS Roles & Permissions confirmed read-only
User communication sent โ€” new Platform URL is primary access point
โ—ˆ Phase 03 โ€” Engines & Connectors
๐Ÿ›ก
Module C ยท Engines & Connectors

Engines Preparation (PRA, CiD, PCS)

Prepare the specialised engine types โ€” Privileged Remote Access (PRA), Continuous Identity Discovery / PCCE (CiD), and Privilege Control for Servers (PCS) โ€” for operation under the Platform. Session-carrying services must be gracefully drained before configuration changes are applied, and CiD / PCCE discovery sources must be correctly wired to Platform Engines with the right workload capabilities.

โ—ˆ Engines & Connectors Phase
PRA โ€” Privileged Remote Access Session Drain
Active sessions ยท RDP / SSH / Browser ยท Maintenance mode
CRITICAL
โ–ถ

PRA handles all privileged session proxying. Before modifying engine or gateway configuration to point at the new Platform URL, drain all active sessions and put the PRA gateway in maintenance mode to prevent in-flight sessions from being interrupted.

  • 01Send user notification (minimum 30 minutes): all PRA sessions will be terminated.
  • 02Navigate to Admin โ†’ Session Recording and verify zero active sessions.
  • 03Put PRA gateway in maintenance mode (blocks new sessions, allows active ones to complete).
  • 04Export current PRA gateway configuration: engine address, port, certificate binding.
  • 05Update the PRA gateway callback URL to the new Platform tenant URL (delinea.app).
  • 06Take PRA out of maintenance mode and validate a test session launches successfully.
โš PRA sessions cannot survive a gateway reconfiguration. Any active sessions at the time of the URL change will be abruptly terminated. Always drain sessions before modifying gateway settings.
User communications sent โ€” sessions will be terminated during window
Zero active sessions confirmed before maintenance mode
PRA gateway config backed up
Gateway callback URL updated to delinea.app
Test PRA session launched successfully post-reconfiguration
CiD โ€” Continuous Identity Discovery & PCCE Discovery Setup
ITP / PCCE ยท Cloud entitlements ยท Privileged account inventory
REQUIRED
โ–ถ

Continuous Identity Discovery (CiD) extends the discovery capabilities of Secret Server Cloud on the Delinea Platform. It is a subset of ITP/PCCE (Identity Threat Protection / Privilege Control for Cloud Entitlements) and continuously inventories privileged accounts, shadow admins, and unvaulted credentials across cloud services and applications โ€” without requiring custom scripts.

PCCE adds full Cloud Infrastructure Entitlement Management (CIEM) and Identity Threat Detection and Response (ITDR), enforcing least privilege across AWS, Azure, GCP, and SaaS platforms using ML-based analytics.

โ„นCiD and PCCE are two separate products sharing a common engine and integration framework. CiD is included with the SSC upgrade; full ITP/PCCE capabilities require a separate entitlement โ€” contact your Delinea account team to enable them on your tenant.

What CiD / PCCE discovers:

  • 01Inventories โ€” Centralised view of all identities, groups, and assets across cloud services. Visibility into privileged accounts by permissions, roles, groups, and federations.
  • 02Checks โ€” Continuous monitoring for identity misconfigurations and over-privileging: unvaulted admin credentials, shadow admins, stale access, and PAM bypass detection (direct cloud logins that circumvent the vault).
  • 03PCCE Cloud Entitlements โ€” Right-size permissions across AWS, Azure, GCP, and SaaS. Detect privilege escalation paths, incomplete off-boarding, and federated account sprawl.

Engine requirement for CiD / ITP: A Platform Engine with the ITP for Active Directory or cloud workload capability must be installed and healthy in a site with network access to the relevant directory or cloud environment.

  • 01Navigate to Engine Management โ†’ [Site] โ†’ Engines โ†’ Capabilities โ†’ Add Capabilities and add the ITP for Active Directory workload to an engine with domain controller access.
  • 02For cloud sources (AWS, Azure, GCP), navigate to Integrations โ†’ Sources โ†’ Create Source. Select the cloud provider type (Threat Protection).
  • 03For AWS: ensure AWS CloudTrail is configured and writing logs to an S3 bucket before integrating. The platform uses an assumed-role integration (CloudFormation StackSet recommended for multi-account).
  • 04For Active Directory CiD: provision a service account with Domain Admins or Administrators membership on the engine host; add it as the credential secret for the AD source.
  • 05Navigate to Inventory โ†’ Identity Posture โ†’ Checks and review: Unvaulted Admin Credentials, Unvaulted Privileged Accounts, and PAM Bypass checks.
  • 06For accounts flagged as unvaulted, vault them directly from the Inventory view or define reports for scheduled compliance reviews.
  • 07Customise privileged and admin account definitions under Inventory โ†’ Collections โ†’ System if the defaults don't match your organisation's standards.
โšกCustom Secret Server templates are not supported for CiD unvaulted checks. Secrets stored using custom templates may be incorrectly flagged as unvaulted. Review and adjust Collections definitions to reflect your custom template usage.
๐Ÿ””CiD's Combined Discovery (Public Preview) allows you to create and manage both ITP and Secret Server Vault discovery sources from a single interface โ€” reducing duplicate configuration for environments using both.
CiD / ITP licence confirmed active on Platform tenant (contact account team if not visible)
Platform Engine with ITP for Active Directory workload capability added and healthy
AD discovery source created with appropriate service account credentials
Cloud sources configured (AWS CloudTrail / Azure / GCP) where applicable
Inventory populated โ€” identities, groups, and assets visible in Identity Posture
Checks reviewed: Unvaulted Admin, Unvaulted Privileged, PAM Bypass checks inspected
Privileged account Collections definitions reviewed and customised to org standards
PCCE cloud entitlement discovery running and findings visible (if PCCE licensed)
PCS โ€” Privilege Control for Servers Agent Deployment
Delinea Agent ยท Discovery ยท Authentication Profiles
REQUIRED
โ–ถ

PCS on the Delinea Platform uses an agent installed on managed Linux/Windows servers. If you are enabling PCS post-upgrade, install the Delinea Agent from the Platform Marketplace, run Discovery, and configure Authentication Profiles and PCS policies.

  • 01In the Platform, navigate to Marketplace โ†’ Download Center. Search for Agent and download for your OS.
  • 02Install the agent on each server to be managed. For Linux, ensure Perl and forward/reverse DNS are in place.
  • 03Run Discovery from the Platform to detect and inventory the newly-agented machines.
  • 04Configure Authentication Profiles for Endpoint Login and Local Administrator Privilege policies (do not set Challenge 1 to Password).
  • 05Set up PCS Policies and validate session recording is functional for agented Linux hosts.
โšกFor Linux with session recording policies: enable Direct Audit on the agent before applying PCS policies with session recording enabled. Skipping this will block login to the Linux agent.
Delinea Agent deployed to all managed servers
Discovery run and managed computers visible in Inventory
Authentication Profiles configured per PCS guidelines
PCS Policies applied and validated
Session recording verified on a test Linux/Windows managed host
๐Ÿ”ฌ
Module D ยท Engines & Connectors

Platform Engine Health Check

Platform Engines (the next-generation engine for the Delinea Platform, distinct from Secret Server Distributed Engines) support automatic upgrades from version 1.5.8+. Verify all Platform Engines are online, up-to-date, and capable of their assigned workloads.

โ—ˆ Engines & Connectors Phase
Verify Platform Engine Status in Engine Management
Platform โ†’ Engine Management โ†’ Sites
REQUIRED
โ–ถ

Navigate to Engine Management in the Platform. All Platform Engines should show as healthy. Engines transmit their status continuously โ€” if the Platform finds a status is outdated, it automatically sends upgrade instructions.

  • 01Navigate to Engine Management in the Platform left navigation.
  • 02For each site, open the site and review the Engines tab.
  • 03Confirm engine version and status. Engines on version 1.5.8+ will auto-upgrade.
  • 04For any engine showing unknown exceptions, follow the manual upgrade procedure: run the uninstall PS script โ†’ wait for engine to disappear from site โ†’ click Add Engine to reinstall the latest version.
โ„นA site is a logical grouping of engines by network boundary (e.g. data centre or main office). A site doesn't restrict workloads but influences communication scope. Confirm each site has at least one healthy engine.
All Platform Engines show healthy status in Engine Management
Engine versions at 1.5.8+ or later (auto-upgrade capable)
Each site has at least one healthy engine
Engine capabilities (workloads) verified per site requirements
Add Engine Capabilities Where Required
Engine Management โ†’ Site โ†’ Engines โ†’ Capabilities
OPTIONAL
โ–ถ

Platform Engines can be extended with additional capabilities (workload packages) for features like PCS, PRA, CiD, or Continuous Identity Discovery. Add capabilities to existing engines without reinstalling the engine base service.

  • 01Navigate to Engine Management โ†’ [Site Name] โ†’ Engines tab.
  • 02Select the engine you wish to extend.
  • 03Click the Capabilities tab, then Add Capabilities.
  • 04Select the desired capability (e.g. PCS, PRA) and click Add.
  • 05Confirm the new capability appears in the capabilities table.
Required engine capabilities identified for each site
Capabilities added to engines that require them
Capability availability confirmed via Engine Management UI
โ—ˆ Phase 04 โ€” Post-Upgrade Validation
๐Ÿ”
Module E ยท Post-Upgrade

Secrets Export & Import from External Systems

If migrating secrets from a different vault (CyberArk, HashiCorp, Thycotic Secret Server on-prem, BeyondTrust, etc.) into the Platform's Secret Server, use the built-in export/import pipeline. This is separate from the Platform Upgrade Center โ€” it applies to importing third-party vault data into your new Platform tenant.

โ—ˆ Post-Upgrade ยท External System Migration
Pre-Import Cleanup & Template Preparation
Target Platform SS instance ยท Template readiness
REQUIRED
โ–ถ

Before importing secrets from an external vault, ensure the destination Platform Secret Server has all required Secret Templates in place, the folder structure is created, and permissions are assigned. Importing secrets before their template exists causes import failures.

โšกImport order matters: Secret Templates โ†’ Folder Structure โ†’ Folder Permissions โ†’ Secrets. Violating this order causes orphaned secrets, template mismatches, or inaccessible data.
All required Secret Templates created or imported on Platform SS
Target folder hierarchy created with correct parent/child structure
Folder permissions assigned to Platform groups (not individual users)
Export from Source Vault
Source system โ†’ encrypted export file
CRITICAL
โ–ถ

Export secrets from the source vault using that vault's supported export format. For Secret Server (on-prem source), use the built-in Admin โ†’ Export / Import โ†’ XML export with a passphrase. For third-party vaults, use their API or CSV export capability and map field names to SS Template fields.

  • 01For SS on-prem source: Admin โ†’ Export / Import โ†’ select root folder โ†’ XML format โ†’ set passphrase.
  • 02For CyberArk / HashiCorp / BeyondTrust: use their export API or admin CLI; export to CSV with field headers matching target SS template fields.
  • 03Record the pre-export secret count from the source system.
  • 04Store the export file in an encrypted external location โ€” never on the source or target server.
  • 05Store the export passphrase separately from the export file.
โš Export files contain live credential values in encrypted form. Treat them as highly sensitive. Encrypt at rest and in transit. Delete export files from intermediate systems immediately after successful import validation.
Export completed from source vault โ€” file size non-zero
Source secret count recorded pre-export
Export passphrase stored separately from the export file
Export file stored in encrypted external location
Import into Platform Secret Server & Reconcile
Admin โ†’ Export / Import โ†’ Import ยท Count validation
CRITICAL
โ–ถ

Use Admin โ†’ Export / Import โ†’ Import in Platform Secret Server to import the file using the passphrase. After import, run a reconciliation check comparing secret counts and spot-checking a random sample.

  • 01Navigate to Admin โ†’ Export / Import in Platform Secret Server.
  • 02Select Import, upload the export file, and enter the passphrase.
  • 03Review the import preview โ€” confirm folder mapping and template matching.
  • 04Execute the import and monitor the progress log for errors.
  • 05Compare total imported secret count against pre-export count from source.
  • 06Spot-check 10โ€“15 randomly selected secrets: verify field values, template, folder, permissions, and heartbeat status.
Import completed with no critical errors in import log
Post-import secret count matches pre-export count from source
Random sample of 10โ€“15 secrets verified (values, template, permissions)
Heartbeat enabled and showing green on imported secrets
Export file deleted from intermediate servers
โœ…
Module F ยท Post-Upgrade

Function Testing

Execute a structured smoke test across all core Platform and Secret Server functions from the new delinea.app URL. Do not close the change record until every category below passes.

โ—ˆ Post-Upgrade Validation
Authentication โ€” All Configured Methods
Local ยท AD/Connector ยท SAML/SSO ยท MFA
CRITICAL
โ–ถ

Test every configured authentication path from the Platform URL using test accounts representing each method. Include MFA challenge scenarios.

Local (cloudadmin) login on Platform URL โ€” successful
AD domain user login via AD Connector โ€” successful, secrets visible
SAML/SSO login flow (IdP โ†’ Platform redirect) โ€” successful
MFA challenge (TOTP / Duo) โ€” passes correctly
Failed login lockout policy โ€” triggers correctly
Secret Retrieval, Heartbeat & Remote Password Change
Multiple template types ยท RPC pipeline validation
CRITICAL
โ–ถ

Retrieve secrets from at least three template types and run forced heartbeat checks. Trigger a test Remote Password Change on a non-critical account to confirm the full RPC pipeline through the Platform engine is operational.

Windows AD secret โ€” retrieved, heartbeat green
Unix / SSH secret โ€” retrieved, heartbeat green
Database (SQL/Oracle) secret โ€” retrieved, heartbeat green
Remote Password Change triggered and completed successfully
Secret checkout / check-in workflow tested end-to-end
Privileged Session Launch (PRA)
RDP ยท SSH ยท Session recording playback
REQUIRED
โ–ถ
RDP session launched from Platform โ€” connected successfully
SSH session launched โ€” connected successfully
Session recording captured and playback verified in Platform UI
Session metadata (user, timestamp, duration) visible in audit log
Historical pre-upgrade recordings still accessible
Discovery & Platform Engine Workload Test
Manual discovery scan ยท Background task processing
REQUIRED
โ–ถ
Manual discovery scan triggered on a known OU โ€” completed without errors
Discovered accounts visible in Secret Server Discovery results
Platform background task processing normal (Admin โ†’ Background Tasks)
AD group sync reflected correctly in Platform groups
๐Ÿฉบ
Module G ยท Post-Upgrade

Integration Health for Delinea Platform

Verify every integration is operational on the Platform. This includes the REST API, SIEM / event pipelines, ticketing systems, and the Delinea Marketplace integrations now available natively on the Platform.

โ—ˆ Post-Upgrade Validation
REST API & SDK Integration Health
New Platform URL ยท OAuth token ยท Secret retrieval API
CRITICAL
โ–ถ

Every system calling the Secret Server API must have its base URL updated from secretservercloud.com to delinea.app. Test OAuth token acquisition and a representative API call on the new endpoint.

# Platform API base URL New base URL: https://<tenant>.delinea.app/SecretServer/api/v1 OAuth token: https://<tenant>.delinea.app/SecretServer/oauth2/token # Quick health check curl -I https://<tenant>.delinea.app/SecretServer/version.json # Expected: HTTP/2 200
All CI/CD pipelines updated to new URL and first run successful
PowerShell / Python / .NET SDK scripts updated and tested
OAuth token acquisition working on new Platform URL
Secret retrieval API returning correct schema
SIEM / Event Pipeline Verification
Syslog ยท Splunk ยท Sentinel ยท QRadar event flow
REQUIRED
โ–ถ

Trigger auditable events (login, secret view, failed login) and confirm they arrive at the SIEM with correct format. Note: Platform event source identifiers may differ from SSC โ€” update SIEM parser rules if needed.

Test events confirmed arriving at Syslog / SIEM destination
Event source hostname/identifier updated in SIEM parser (if changed)
Upgrade event gap documented in SIEM for migration window time range
SOC team notified that normal event flow has resumed
Ticketing & Marketplace Integrations
ServiceNow ยท Jira ยท Delinea Marketplace integrations
OPTIONAL
โ–ถ

Validate ticketing-based access request workflows and explore the Delinea Marketplace โ€” the Platform introduces native integrations for PRA, ITP, Continuous Identity Discovery, and third-party tools not available in SSC.

Test access request submitted โ†’ ticket auto-created in ITSM platform
Approval workflow completed and secret access granted
Delinea Marketplace reviewed for new integration opportunities
Change record closed โ€” CMDB updated with new Platform version and URL
Post-implementation review (PIR) conducted โ€” lessons learned captured
โœ“All validations passing? Your upgrade from Secret Server Cloud to the Delinea Platform is complete. Welcome to the next generation Delinea Platform โ€” now accessible for PRA, PCS, ITP, CiD, and more.