A comprehensive guide to identifying, managing, and securing human and non-human accounts using Secret Server and CID Discovery.
| Characteristic | Human Accounts | Non-Human Accounts |
|---|---|---|
| Authentication Type | Interactive login (MFA, SSO) | Automated, key-based, or token-based |
| Rotation Cadence | User-driven or policy-enforced | Fully automated via Secret Server |
| Ownership | Named individual | Application, process, or team |
| Risk Profile | Insider threat, phishing, shared creds | Hard-coded creds, token theft, orphaned |
| Discovery Method | Active Directory, LDAP scans | Process scanning, API enumeration, CID |
| Lifecycle Management | HR system integrated | Application lifecycle dependent |
| Secret Server Support | ✓ Full discovery & vault | ✓ Full discovery & rotation |
| CID Discovery | ✓ Identity correlation | ✓ Deep NHI enumeration |
| Scenario | Secret Server Discovery | CID Discovery |
|---|---|---|
| On-prem AD accounts | ✓ Primary tool | Supplemental |
| Windows service accounts | ✓ Primary tool | Not applicable |
| Azure AD service principals | Limited | ✓ Primary tool |
| AWS IAM roles & users | Limited | ✓ Primary tool |
| Hybrid identity correlation | On-prem side | ✓ Full correlation |
| SaaS application accounts | Via launchers | ✓ Native support |
| API key discovery | Limited | ✓ Primary tool |
| Password rotation | ✓ Full automation | ✓ Cloud-native rotation |
Check each item as you complete it. Progress is tracked locally in your session.