Credential Manager
What is Delinea Credential Manager?
Delinea Credential Manager is a browser extension and configuration interface integrated into Secret Server, allowing administrators and IT users to securely store, manage, and launch credentials across applications and systems.
Secret Templates
Define and manage 83+ credential templates for different service types — from Active Directory to cloud platforms.
Launchers
Configure 15+ launchers including Chrome, PowerShell, and IBM iSeries to access secrets directly from the vault.
Secret Policies
Enforce security policies like check-out workflows and session recording across groups of secrets.
Password Requirements
Build custom character sets and password rules — including mainframe, SAP, and standard alphanumeric patterns.
Audit Logs
Track every template change, user action, and launcher modification with full timestamped records.
Session Recording
Record and archive sessions with configurable retention periods and access controls.
Credential Manager — User Experience Panel
Once inside, you'll see options to enable inline popups, configure prompt-to-save and prompt-to-update behavior, manage autofill settings, configure accessible secret templates, and access launcher and session recording settings.
What are Secret Templates?
Templates are blueprints that determine what fields a secret contains (e.g., username, password, URL), which launchers it supports, and what password policies apply. Every secret in the vault is based on a template.
Built-in Template Examples
| Template Name | Category | Total Secrets | Status |
|---|---|---|---|
| Active Directory Account | Directory Services | 11 | Enabled |
| Amazon IAM Key | Cloud — AWS | 1 | Enabled |
| Azure AD Account | Cloud — Azure | — | Enabled |
| Web Password | Web Applications | — | Enabled |
| Credit Card | Financial | — | Enabled |
| PostgreSQL Account | Databases | — | Enabled |
Managing Templates — Step by Step
Built-in Password Requirement Sets
Delinea ships with a default alphanumeric requirement and supports custom requirement sets for specialized systems. IT environments with SAP, mainframe, or custom legacy systems require dedicated requirement profiles.
| Requirement Name | Character Basis | Use Case |
|---|---|---|
| Default | Alphanumeric + Symbols | General web & system passwords |
| Mainframe Password Requirement | Custom character set | IBM mainframe systems |
| SAP Password Requirement | SAP Character Set + SAP Symbol Set | SAP R/3 & S/4HANA environments |
| Notframe | Custom | Non-mainframe legacy systems |
Creating a Password Requirement
Default Character Sets
| Set Name | Description | Includes | Status |
|---|---|---|---|
| Default | Standard alphanumeric + symbols | a-z, A-Z, 0-9, symbols | Enabled |
| Lower Case | Lowercase letters only | a-z | Enabled |
| Upper Case | Uppercase letters only | A-Z | Enabled |
| Numeric | Digits only | 0-9 | Enabled |
| Symbol | Special characters | !@#$%^&*… | Enabled |
| Upper Case Alphanumeric | Upper + digits | A-Z, 0-9 | Enabled |
| SAP Character Set | SAP-compatible characters | SAP-allowed alpha/numeric | Enabled |
| SAP Symbol Set | SAP-compatible symbols | SAP-allowed special chars | Enabled |
Creating a Custom Character Set
Navigate to Templates Settings → Character Sets and click Create New Set. Provide a name, description, and define the exact characters allowed. Custom sets are immediately available for use in Password Requirements.
Available Launchers
Creating a New Launcher
C:\Windows\System32\mstsc.exe for RDP), specify Arguments using Secret field tokens, and optionally set a Working Directory.Launcher Global Settings
Navigate to Settings → Launcher Settings to configure system-wide launcher behavior: enable auto-updates, manage Protocol Handler updates, enable web launcher mapping downloads/uploads, and configure secret check-in/check-out behavior when sessions end.
Existing Secret Policies
The system comes with pre-configured policies that address common security requirements. Each policy can be enabled or disabled and customized to match organizational needs.
| Policy Name | Key Features | Status |
|---|---|---|
| Check Out and Adv | Requires secret check-out before use; advanced access controls | Enabled |
| Session Recording | Enforces session recording for all launched connections | Enabled |
| Test | Testing/sandbox policy configuration | Enabled |
Creating a New Secret Policy
What the Audit Log Captures
Every meaningful action in Delinea is logged: template edits, launcher additions/removals, launcher mapping changes, user logins, secret views, and policy changes — all tied to a specific user and IP address.
Sample Audit Log Entries
| Date / Time (UTC) | User | Action | Template | Notes |
|---|---|---|---|---|
| 2024-11-14 09:32:41 | ziedgormazi | EDIT | PostgreSQL account | Launcher mapping edited |
| 2024-11-14 09:28:15 | ziedgormazi | EDIT | pgadmin | Launcher added |
| 2024-11-13 16:45:02 | clouadmin | EDIT | Active Directory Account | Launcher removed |
⚠ User Management & Permissions
The Session Recording section links to User Management and Permission Management — where you can assign roles, enable/disable accounts, and manage access groups. Always ensure only authorized personnel have playback access to session recordings, as they may contain sensitive authentication data.
⚠ Use with Extreme Caution
Unlimited Admin Mode should only be activated for legitimate break-glass scenarios — system recovery, incident response, or critical configuration tasks. Every activation is logged with a mandatory note and is visible in the audit trail.
Activating Unlimited Admin Mode
Audit Log — Admin Mode History
| Date (UTC) | User | Action | Note |
|---|---|---|---|
| 2024-11-05 14:22 | clouadmin | ENABLED | Administrator work |
| 2024-11-05 14:45 | clouadmin | DISABLED | Task completed |
| 2024-10-28 09:11 | clouadmin | ENABLED | Test |