SECRET SERVER
PASSWORD VAULT
A complete end-to-end reference for deploying, configuring, and operating Delinea Secret Server â from template design through dependency automation.
ARCHITECTURE OVERVIEW
Understanding Secret Server's core data model before configuration begins
Secrets
Atomic unit of the vault. A secret holds one set of credentials (username, password, key) plus metadata, governed by a template.
Templates
Blueprints that define the fields a secret contains. Templates are versioned and control launchers, heartbeat scripts, and RPC behavior.
Folders
Hierarchical containers that organize secrets. Permissions assigned at folder level cascade to all children via inheritance.
Policies
Secret Policies define groups of settings (checkout, heartbeat, expiry) and apply uniformly across folders or individual secrets.
Remote Password Changing
RPC engine rotates credentials on the remote target after a Secret is updated. Requires a privileged account or discovery source.
Dependencies
Registered external services (Windows Services, IIS pools, scheduled tasks) that consume a vaulted credential and must be updated on rotation.
SECRET TEMPLATES
Creating and customizing field definitions, launchers, and RPC commands
Secret Templates define the shape of every secret in the vault. Getting templates right early prevents painful migrations later. Secret Server ships with 30+ built-in templates; create custom ones for internal systems that deviate from standard patterns.
Navigate to Admin â Secret Templates
Access the template management console from the Admin menu. Requires the Administer Secret Templates role permission.
Define Template Fields
Add fields for each data element: username, password, host, port, notes. Mark the password field for RPC and heartbeat.
| Field Name | Field Type | Required | Hide On View | Notes |
|---|---|---|---|---|
| Username | Text | Yes | No | Maps to RPC username variable |
| Password | Password | Yes | Yes | Enable for RPC + Heartbeat |
| Server / Host | Text | Yes | No | Used by launchers and RPC |
| Port | Text | Optional | No | Override default if non-standard |
| Notes | Notes | No | No | Free-form operational context |
Configure the Password Changer (RPC)
Assign a built-in or custom password changer to automate credential rotation on the remote target after a rotation event.
Attach a Launcher
Launchers open an RDP, SSH, or web session using vaulted credentials without exposing the password to the user.
RDP Launcher
Maps $machine, $username, $password to an mstsc session via the Secret Server Connect As user.
SSH Launcher
Opens PuTTY or built-in web terminal. Supports both password and private key authentication from the secret.
Web Password Filler
Browser extension injects credentials into web login forms. Requires mapping field names to form element selectors.
Version and Publish the Template
Save the template. Existing secrets using it retain field values; added fields default to empty. Test with a sandbox secret before production rollout.
FOLDERS & PERMISSIONS
Organizing secrets into a hierarchy with role-based access inheritance
Folder permissions in Secret Server follow an additive inheritance model. Child folders inherit permissions from parents, and explicit permissions on a child folder supplement (not replace) inherited ones unless you break inheritance deliberately.
| Permission Level | View Secret | Edit Fields | View Password | Own Secret | Typical Role |
|---|---|---|---|---|---|
| List | Name only | â | â | â | Auditors |
| View | All fields | â | Masked | â | Help Desk |
| View + Copy | All fields | â | Full | â | Dev Teams |
| Edit | All fields | â | Full | â | SysAdmins |
| Owner | All fields | â | Full | â (delete, share) | Secret Owners |
Plan the Folder Taxonomy
Design the folder tree to mirror your org structure or service categories before creating folders. Refactoring later is costly.
Create Folders and Set Inheritance Mode
Create folders via Admin â Folders. By default, child folders inherit parent permissions. Break inheritance only when an explicit permission override is needed.
Assign Groups, Not Individual Users
Always assign permissions to AD groups or Secret Server roles â never to individual user accounts. This prevents access orphaning when staff change roles.
Assign a Default Secret Policy to the Folder
Set a Secret Policy at the folder level so all newly created secrets automatically inherit heartbeat, checkout, and expiry settings.
PASSWORD COMPLEXITY
Configuring generation rules and enforcement policies for credential rotation
Secret Server uses Password Requirements â named rulesets applied per template field â to govern what is generated and accepted. Complexity rules apply at both manual entry and RPC rotation time.
Create a Password Requirement
Admin â Password Requirements â Create New. Name it descriptively (e.g., AD-Domain-Accounts-High-Security).
Assign the Requirement to a Template Field
In the Secret Template editor, open the Password field and set the Password Requirements dropdown to your named ruleset.
Configure Expiry and Rotation Schedules
Secret Policies include an Auto Change Schedule that triggers RPC on a cadence (e.g., every 90 days) independently of heartbeat results.
HEARTBEAT MONITORING
Detecting credential drift by continuously validating vaulted passwords against their targets
Heartbeat sends an authentication probe to the remote target on a schedule. If the vaulted credential no longer authenticates, the secret is marked Failed and alerts are raised â before an operator encounters a lockout or failed service.
Scheduler fires heartbeat probe
Secret Server engine contacts the Distributed Engine (or internal engine) assigned to the secret's site.
Engine attempts authentication
Uses the vaulted username + password against the target (WMI, SSH, SQL login, LDAP bind, API auth, etc.).
Result recorded
Success â heartbeat timestamp updated. Failure â secret flagged with "Heartbeat Failed" status; event logged to Syslog/SIEM.
Alert / Auto-remediation fires
Email/Slack notifications sent. Optionally trigger an RPC attempt to re-sync the vaulted credential with the target.
Enable Heartbeat on the Secret Policy
Admin â Secret Policies â [Policy] â Heartbeat tab. Enable and set the interval.
Assign the Correct Site / Distributed Engine
Heartbeat traffic must originate from a network segment that can reach the target. Assign the correct Site on the secret's General tab.
Monitor Heartbeat Status Dashboard
Reports â Secrets â Heartbeat Failures shows all failing secrets in real time. Pin this to the SS dashboard for operations staff.
Success
Credential authenticated. Last heartbeat timestamp updated. No action needed.
Failed
Auth rejected. Credential may have been changed out-of-band. Investigate immediately â service accounts may be locked.
Pending / Unknown
First run not yet completed, or engine offline. Check engine health and site assignment.
Configure Alert Notifications
Admin â Configuration â Email â set SMTP. Then add notification rules in the Secret Policy or via Event Subscriptions.
CHECK-IN / CHECK-OUT
Enforcing single-use access, approval workflows, and session isolation
Check-Out enforces that only one user at a time can access a secret. When combined with Change on Check-In, the password is rotated automatically after every use, ensuring no credential reuse between sessions.
Exclusive Check-Out
Once checked out, no other user can access the secret until it is checked in or the interval expires. Eliminates shared session risk.
Interval Enforcement
Set a maximum check-out duration. Secret auto-returns after the interval. Prevents indefinite holds by forgetful users.
Change on Check-In
Rotates the password immediately upon check-in, making the previously-used credential invalid. Enables one-time-use semantics.
Approval Workflow
Require one or more approvers before access is granted. Integrates with ServiceNow change tickets for PAM compliance.
Enable Check-Out in the Secret Policy
Navigate to Admin â Secret Policies â [Policy] â Check-Out tab. Toggle on and set the interval and change-on-check-in behavior.
Configure Approval Workflow (Optional)
Require 1 or 2 approvers before the check-out is granted. Approvers receive email with approve/deny links.
Test the Check-Out Flow
Log in as a non-admin test user, navigate to the secret, and verify the Check-Out button appears. Attempt to access from a second session to confirm exclusivity.
Implement Break-Glass Procedure
Administrators need emergency access during a vault outage or approval system failure. Create a dedicated break-glass procedure and isolated folder.
SECRET DEPENDENCIES
Managing Windows services, IIS app pools, and scheduled tasks that consume vaulted credentials
When a credential is rotated, any external process running under that credential must be updated simultaneously or it will fail to authenticate. Dependencies automate this propagation â stopping, re-credentialing, and restarting dependent services as part of the rotation workflow.
Windows Services
Services running under a domain service account that is vaulted. Auto-updated via SC.exe or WMI after password rotation.
IIS Application Pools
App pools running under a custom identity. Secret Server updates the pool identity via WMI/PowerShell and recycles the pool.
Scheduled Tasks
Task Scheduler jobs run-as a service account. SS uses schtasks.exe or PowerShell to update the credential on the task after rotation.
Custom PowerShell Dependencies
For proprietary services, connection strings in config files, or any custom integration â use the PowerShell dependency type with full scripting control.
Dependency Ordering and Testing
Set execution order â services should stop before the password changes, and restart after. Test each dependency individually before enabling auto-rotation in production.
VALIDATION QUIZ
Confirm understanding of key concepts before operating the vault in production
Use this checklist to confirm your vault setup is production-ready before go-live.