0% Complete

User Access Report
in Secret Server

Master one of Secret Server's most powerful governance tools. This interactive guide will walk you through everything you need to know โ€” from what the report does to how it supports audit, compliance, and security operations.

7 Core Features
~40 Minutes to Complete
6 Quiz Questions
๐Ÿ’ก
Who should take this training?

This guide is designed for Secret Server administrators, security analysts, IT auditors, and compliance officers who manage or oversee privileged access within their organisation.

Learning Objectives

By the end of this module, you will be able to:

01
Define the User Access Report

Explain what the report is, what data it surfaces, and how it fits into the broader PAM framework in Secret Server.

02
Identify key features and fields

Navigate the report's columns, filters, and export options with confidence.

03
Apply it to real-world scenarios

Use the report to support audit requests, access reviews, and security investigations.

04
Generate and export the report

Walk through the end-to-end process of running, filtering, and sharing a User Access Report.

What Is the User Access Report?

The User Access Report in Secret Server is a built-in governance and audit report that provides a consolidated, on-demand view of which users have access to which secrets โ€” and exactly what level of access they hold.

It answers the most critical questions in privileged access managementPAM: A security discipline focused on controlling, monitoring, and auditing access to privileged credentials and systems.:

๐Ÿ”
The Core Questions This Report Answers

"Who can access what โ€” and what can they do with it?"   These are the two fundamental questions of any access control audit. The User Access Report surfaces both in a single exportable view.

Context Within Secret Server

Secret Server stores and manages privileged credentials โ€” passwords, SSH keys, API tokens, certificates โ€” called Secrets. Access to these Secrets is controlled through a layered permission model involving:

EntityDescriptionScope
Users Individual accounts in Secret Server, local or synced via AD Global
Groups Collections of users; permissions can be assigned at group level Global
Folders Hierarchical containers for organising Secrets Folder-level
Secrets Individual privileged credentials or items Secret-level

The User Access Report aggregates all of these layers into a single, readable view โ€” showing the effective access each user has, regardless of whether that access was granted directly or inherited through group membership or folder permissions.

Where to Find It

The report is accessed via the Reports module in Secret Server:

Reports  โ†’  User Access Report

(Admin view)  Admin  โ†’  Reports  โ†’  Security Hardening & Compliance
โœ…
No Additional Licensing Required

The User Access Report is a standard built-in feature available to all Secret Server editions โ€” no additional modules or licensing are needed to access it.

Report Permissions

To run the User Access Report, a user must have the "View Reports" role permission in Secret Server. Typically this is available to:

๐Ÿ‘‘
Administrators

Full access by default. Can run the report across all users, groups, folders, and secrets.

๐Ÿ”
Auditors / Compliance Roles

Delegated "View Reports" permission allows read-only access to all reporting functionality.

๐Ÿ‘ฅ
Security Analysts

Can be granted access for ad-hoc investigations and periodic access reviews.

๐Ÿšซ
Standard Users

Do not have access to the report by default. Access must be explicitly granted via role assignment.

Key Features

The User Access Report is rich with features designed for both day-to-day operational use and formal compliance audits. Here is a comprehensive breakdown.

1. Effective Access Visibility

Unlike raw permission tables, the User Access Report surfaces effective access โ€” taking into account direct permissions, group memberships, folder inheritance, and workflow approvalsWorkflow approvals in Secret Server allow access to be gated behind an approval process, adding an extra layer of control for sensitive secrets.. What you see is what the user can actually do.

โœจ
Why Effective Access Matters

A user may not have direct access to a secret, but they may be a member of a group that does. Effective access reporting reveals this โ€” a critical distinction for compliance.

2. Report Columns & Data Fields

The report displays a structured set of columns that can be filtered and sorted:

ColumnDescriptionUse For
User NameThe Secret Server usernameUser identification
Display NameFull name of the userReadability in exports
DomainAD domain or "Local"Source system identification
Secret NameName of the credential/secretAsset identification
Folder PathFull folder hierarchy to the secretScope / context
Permission TypeView, Edit, Owner, or ApproverAccess level audit
Inherited ViaHow access was granted (direct/group/folder)Access tracing
ActiveWhether the user account is enabledDormant account detection

3. Flexible Filtering

Administrators can narrow the report scope using multiple filter dimensions simultaneously:

๐Ÿ‘ค
By User or Group

Run the report for a specific user or all members of a selected group. Ideal for user-specific access reviews.

๐Ÿ“
By Folder

Scope the report to a specific folder or folder tree, showing all users who can access secrets within that scope.

๐Ÿ”‘
By Secret

Run the report against a specific secret to see every user who has access โ€” at any permission level.

๐Ÿท๏ธ
By Permission Level

Filter to show only users with "Owner" access, "View only", or any specific combination of permissions.

4. Permission Level Breakdown

Secret Server uses a four-tier permission model for secrets. The report clearly identifies which tier each user holds:

PermissionCan View Password?Can Edit Secret?Can Manage Permissions?
Viewโœ… YesโŒ NoโŒ No
Editโœ… Yesโœ… YesโŒ No
Ownerโœ… Yesโœ… Yesโœ… Yes
Approverโœ… Context-dependentโŒ NoโŒ No

5. Export & Share

Results can be exported in multiple formats for use in ticketing, audit submissions, or stakeholder reporting:

๐Ÿ“„   CSV Export
โ–ผ
Exports all visible rows and columns to a comma-separated values file. Ideal for further analysis in Excel, Python, or import into GRC/ITSM tools such as ServiceNow or Jira.
๐Ÿ–จ๏ธ   PDF Export
โ–ผ
Generates a formatted PDF document of the report, including applied filters, report run date/time, and full tabular data. Suitable for formal audit submissions and evidence packages.
๐Ÿ“Š   Excel Export
โ–ผ
Produces a native .xlsx file retaining column formatting. Useful when recipients need to apply their own sorting, filtering, or pivot table analysis.
๐Ÿ•   Scheduled Email Delivery
โ–ผ
Administrators can schedule the report to run automatically on a recurring basis (daily, weekly, monthly) and deliver results via email. This supports continuous monitoring without manual effort.

6. Integration with Secret Server Audit Logs

The User Access Report is complemented by Secret Server's comprehensive audit trail. Each time the report is generated, this action is logged โ€” providing meta-audit capability (audit of who ran the audit report, and when).

Business Benefits

The User Access Report is not just a technical report โ€” it delivers measurable business value across security, compliance, and operational efficiency dimensions.

Compliance & Regulatory Support

Many regulatory frameworks mandate that organisations be able to demonstrate who has access to what at any point in time. The User Access Report directly supports compliance with:

๐Ÿ“œ
SOX (Sarbanes-Oxley)

Demonstrates segregation of duties and least-privilege access for financial systems. Essential for IT General Controls (ITGC) audits.

๐Ÿฅ
HIPAA

Provides evidence that access to systems storing Protected Health Information (PHI) is appropriately restricted and monitored.

๐Ÿ’ณ
PCI DSS

Supports Requirement 7 (restrict access to cardholder data) and Requirement 8 (identify and authenticate access) with documented access records.

๐ŸŒ
ISO 27001 / GDPR

Supports access control and data protection objectives by demonstrating enforcement of least-privilege principles across the organisation.

Operational Security Benefits

๐Ÿ”’
Least-Privilege Enforcement

Regularly running the User Access Report helps teams identify and remediate over-privileged accounts โ€” users who have access to more than their role requires. This reduces the attack surface significantly.

๐Ÿ‘๏ธ
Dormant Account Detection

The "Active" field flags disabled or inactive accounts that still hold secret permissions. These dormant accounts are prime targets for attackers and should be remediated promptly.

๐Ÿšจ
Insider Threat Detection

Unexpected access โ€” particularly Owner-level permissions on sensitive secrets โ€” can be an early indicator of insider threat activity or account compromise. The report enables rapid detection.

๐Ÿ”„
Joiners / Movers / Leavers Process

When an employee changes role or leaves the organisation, the report confirms whether their Secret Server access has been fully revoked or appropriately updated โ€” preventing stale access from persisting.

Time & Cost Efficiency

Before purpose-built PAM reporting, access reviews often required manual scripting, database queries, or multi-team collaboration to assemble. The User Access Report:

โšก
Reduces Access Review Time by Up to 80%

What previously required hours of manual data gathering can be accomplished in minutes. A complete access snapshot across thousands of secrets can be exported and reviewed in a single session โ€” significantly reducing audit preparation costs.

๐Ÿ“…
Supporting Periodic Access Reviews (PAR)

Most compliance frameworks require periodic (typically quarterly or annual) access certifications. Scheduled delivery of the User Access Report automates the data-collection step of this process, enabling reviewers to focus on decision-making rather than information gathering.

How to Run the Report

Follow these steps to generate a User Access Report in Secret Server. The process is the same whether you are running it on-premises or via the Delinea cloud platform.

โš ๏ธ
Prerequisites

Ensure you are logged in to Secret Server with an account that holds the "View Reports" role permission. If you cannot access the Reports menu, contact your Secret Server administrator.

Step-by-Step Walkthrough

1
Navigate to Reports

From the main navigation bar, select Reports. In older UI versions, this may be under Admin โ†’ Reports.

2
Locate the User Access Report

In the Reports library, navigate to the Security or Access category. Select "User Access Report" from the list.

3
Apply Filters (Optional)

Use the filter panel to scope the report. You can filter by User, Group, Folder, Secret, or Permission Level. Leave all filters blank to return all data across the entire system.

4
Run the Report

Click the "Run Report" button. Depending on the size of your Secret Server environment, results may take a few seconds to load. Large environments with thousands of secrets may take up to 30โ€“60 seconds.

5
Review Results

Review the on-screen results table. Sort by any column by clicking the column header. Use the search box above the table to apply an additional keyword filter on the visible results.

6
Export the Report

Click the "Export" button and select your preferred format: CSV   PDF   Excel. The exported file will include the applied filters and a timestamp in the filename.

7
Schedule for Recurring Delivery (Optional)

Click "Schedule" to set up automatic report runs. Configure the frequency (daily, weekly, monthly), recipients (email addresses), and format. Scheduled reports run automatically without any manual intervention.

Tips for Effective Reporting

๐ŸŽฏ   Scope your report โ€” don't always run everything
โ–ผ
In large environments, an unfiltered report can return tens of thousands of rows. Apply meaningful filters (by folder or group) to keep the report actionable and focused on what you actually need to review.
๐Ÿ“…   Run it before and after access changes
โ–ผ
Capture a snapshot of the report before making bulk permission changes (e.g., onboarding a new team or restructuring folders). Run it again after to confirm the changes landed as expected. This creates an evidence trail of the change.
๐Ÿ”—   Combine with the Secret Activity Report
โ–ผ
The User Access Report shows who can access a secret. Pair it with the Secret Activity Report to see who actually did access it โ€” combining intent-of-access data with actual usage data for a complete picture.
๐Ÿ“‚   Archive exported reports for audit trails
โ–ผ
Save timestamped exports to a secure, access-controlled storage location (e.g., a SharePoint library or SIEM). Auditors often request historical snapshots spanning multiple months or years โ€” having these pre-archived saves significant time during audit fieldwork.

Real-World Scenarios

The User Access Report is versatile. Here are the most common real-world scenarios in which security and compliance teams use it โ€” along with the recommended approach for each.

Scenario A

๐Ÿ” Annual SOX IT General Controls Audit

An external auditor requests evidence that access to financial system credentials (e.g., database passwords for ERP systems) is restricted to authorised individuals only, with no shared or excessive permissions.


Approach: Filter the User Access Report by the folder containing financial system secrets. Export to PDF. Review for any accounts with Owner permissions who are not on the approved access list. Present the export as audit evidence. Schedule quarterly delivery for ongoing compliance.

Scenario B

๐Ÿšช Employee Offboarding Verification

A senior system administrator has left the company. The IT team has disabled their Active Directory account, but you need to confirm their Secret Server access has also been fully revoked.


Approach: Filter the User Access Report by the departing user's username. If any secrets still appear in the results, investigate how access persists (direct permission vs. group membership) and remediate accordingly. The "Inherited Via" column will indicate the exact source of any residual access.

Scenario C

๐Ÿ“‹ Quarterly Access Certification

Department heads are required to certify every quarter that their team members have appropriate access to privileged credentials. The process was previously manual and error-prone.


Approach: Schedule the User Access Report to run monthly and deliver group-scoped exports to each department head. Structure the email distribution by group, so each manager receives only the data relevant to their team. Managers review and sign off or request remediation.

Scenario D

๐Ÿ” Security Incident Investigation

A security alert has fired on a production server. The incident response team needs to quickly determine which users had access to the server's privileged credentials at the time of the incident.


Approach: Filter the User Access Report by the specific secret (e.g., the server's local admin password). The report will immediately return the full list of users with access, their permission level, and how they obtained that access. Cross-reference with the audit log to determine who actually used the credential.

Scenario E

โš ๏ธ Dormant Account Cleanup

A periodic security review has flagged that some user accounts in Secret Server may belong to former contractors or unused service accounts, posing an unnecessary risk.


Approach: Run the User Access Report with the "Active = No" filter (if available) or export the full report and filter the "Active" column in Excel. Identify all secrets held by inactive accounts and work with the access owner to either remove permissions or formally document the exception.

๐Ÿ’ก
Pro Tip: Automate Recurring Scenarios

Scenarios A and C are excellent candidates for scheduled report delivery. Set them up once and let Secret Server handle the data collection automatically โ€” freeing your team to focus on reviewing and acting on the results.

Knowledge Check

Test your understanding of the User Access Report. Answer all six questions โ€” you'll receive immediate feedback after each answer. Results are tracked for your completion certificate.

Question 1 of 6
What does the "Effective Access" view in the User Access Report show?
A Only permissions granted directly to the individual user account
B The combined access a user holds, including permissions from groups and folder inheritance
C A list of secrets the user has recently accessed in the audit log
D Only the secrets where the user holds Owner-level permission
โœ… Correct! Effective access combines direct permissions, group memberships, and folder inheritance โ€” giving a true picture of what a user can actually access.
โŒ Not quite. Effective access goes beyond direct permissions โ€” it also includes permissions inherited through group membership and folder hierarchy.
Question 2 of 6
Which permission level allows a user to manage permissions on a secret (i.e., grant access to other users)?
A View
B Edit
C Owner
D Approver
โœ… Correct! Only the Owner permission level allows a user to manage permissions on a secret and grant access to others.
โŒ Not quite. The Owner permission is the one that grants permission management rights. View and Edit allow viewing/editing the credential, and Approver manages approval workflows.
Question 3 of 6
What Secret Server role permission is required to run the User Access Report?
A Administer Users
B View Reports
C Administer Secret Policy
D View Deleted Secrets
โœ… Correct! The "View Reports" role permission grants access to run any built-in report, including the User Access Report.
โŒ Not quite. The "View Reports" permission is the one required. The other options relate to different areas of Secret Server administration.
Question 4 of 6
A security analyst wants to verify that all access to a specific highly sensitive secret has been revoked after a security incident. Which filter should they apply?
A Filter by User Group = "Security Team"
B Filter by Permission Level = "Owner"
C Filter by the specific Secret name
D Filter by Domain = "Local"
โœ… Correct! Filtering by the specific Secret will return every user who currently has access to that credential, regardless of how they obtained it โ€” the right approach for post-incident verification.
โŒ Not quite. To see all access to a specific credential, you should filter by the Secret name. This returns every user with any level of access to that particular secret.
Question 5 of 6
Which of the following is NOT a benefit of scheduling the User Access Report for automatic delivery?
A It reduces manual effort in access review processes
B It supports continuous monitoring without human intervention
C It automatically revokes access for users who appear in the report
D It ensures stakeholders receive regular access snapshots for review
โœ… Correct! Scheduled reports deliver data โ€” they do not take action. Revoking access requires a human decision followed by manual (or automated workflow) remediation. The report is a visibility tool, not an enforcement tool.
โŒ Not quite. The User Access Report is a visibility and reporting tool only โ€” it does not automatically revoke or change any permissions. Access remediation requires separate action by an administrator.
Question 6 of 6
The "Inherited Via" column in the User Access Report is most useful for which of the following tasks?
A Identifying which users have logged into Secret Server most recently
B Tracing whether a user's access came from a direct permission, group membership, or folder inheritance
C Showing which secrets have been checked out under a dual-control workflow
D Determining when a user's account was last modified in Active Directory
โœ… Correct! The "Inherited Via" column is critical for tracing the source of access โ€” essential when remediating unexpected permissions, since you need to know whether to remove the user from a group, adjust a folder permission, or remove a direct assignment.
โŒ Not quite. "Inherited Via" shows the access source โ€” direct, group, or folder. This is essential for remediating unwanted access: you must understand how access was granted before you can correctly remove it.
๐Ÿ†

Training Complete!

You've completed the Secret Server User Access Report training. You now have the knowledge to leverage this powerful report for security, compliance, and operational efficiency.

Certificate of Completion
Secret Server โ€” User Access Report
Interactive Training Guide
โ€”
Quiz Score
Completed on

What You've Learned

๐Ÿ“‹
Report Purpose

Understand what the User Access Report is and how it fits into the PAM governance framework.

โš™๏ธ
Key Features

Navigate effective access data, permission levels, filters, and export options with confidence.

๐Ÿ†
Business Value

Apply the report to compliance frameworks (SOX, PCI, HIPAA) and security operations.

๐Ÿ—‚๏ธ
Practical Scenarios

Tackle real-world use cases including audits, offboarding verification, and incident response.

Recommended Next Steps

๐Ÿš€
Continue Your Secret Server Learning Journey

Explore related training modules: Secret Activity Reports, Role-Based Access Control in Secret Server, Configuring Approval Workflows, and Active Directory Synchronisation to deepen your PAM expertise.