Secret Server - Secret Access Approval Procedure

Overview

Some secrets inside Delinea Secret Server may require the completion of an access approval request before the secret details can be viewed. When an access request is made, an automated message will be sent to the list of approvers for that secret to review. The request will contain information to identify who is accessing the secret, for how long, and for what reason.

Ultimately, the request approver can determine if the request should be approved and the duration of approved access. Approvers will be responsible for providing adequate justification for their decision, indicating if required information is missing or invalid in the denial response.

 

Requirements

Approval for access will be determined by the validity of the content in each field. As such, the following information is required for an access approval to be granted:

  • Access to security or system management tools must be requested by an IT support technician only.
  • Duration for an access request must be within a reasonable time frame. No requests will be approved for a duration longer than 24 hours.
  • Comments on an access request are required and must contain a ticket number and an explanation of why the request is being made.
  • A computer name must also be present in either the ticket or the request comments.

 

Questions & Feedback

If there is any uncertainty around an access request, please feel free to contact the Delinea Administrators (John Ross, Phil Redfern, Quinn Harouff, Riley Prideaux, and Ryan Rumbaugh) and we can discuss the requests and any concerns as necessary.

Print Article

Related Articles (3)

This article explains the basics of creating, editing, and sharing secrets within Secret Server.
Folders in Secret Server allow you to organize your secrets into logical groups and control access through permissions assigned to the folders. This article gives an overview of how shared folders are created and used.
For shared folders within Secret Server, permissions are delegated between two user roles. Team User and Team Administrator. This guide will detail the permissions and responsibilities that are associated with each role.

Related Services / Offerings (2)

Palo Alto Cortex XDR is more advanced than a traditional antivirus solution. Cortex is an extended detection and response app that uses real-time detection to respond to malware and other sophisticated attacks while preventing malicious software from running on devices.
Privileged Access Management (PAM) is a security solution that helps organizations manage and monitor privileged user access to critical systems and sensitive data. It helps prevent unauthorized access and reduce the risk of insider threats.