BeyondTrust Vault Technical Whitepaper
Service desk technicians are often required to use administrative credentials with elevated privileges to resolve support issues. Although compromised privileged account credentials are a common target for hackers, credential management best practices are often secondary to the need to resolve issues quickly. With the pressure to provide support as quickly and efficiently as possible, many service desk teams share and store credentials in plain text for convenience. BeyondTrust Vault for Remote Support mitigates that risk in your service desk by enabling secure credential management without sacrificing convenience and business productivity.
BeyondTrust Vault fits seamlessly with service desk workflow because it is integrated directly with the Remote Support solution. Technicians do not have to learn to use another tool or even exit BeyondTrust to retrieve passwords. With just one click in the BeyondTrust representative console, users can simply select the correct credential from the dropdown and log directly into a remote system - without ever having to know or even see the actual password.
In this document, we will cover the following topics:
- Vault Configuration: Enable the user permissions needed to start using BeyondTrust Vault.
- Credentials Discovery: Find and track privileged accounts commonly used by your service desk.
- Credential Rotation: Rotate passwords, manually or automatically, after each use.
- Check In and Check Out: Retrieve credentials for use outside of a BeyondTrust session.
- Credential Injection: Inject credentials into a remote system directly from the BeyondTrust representative console.
- Reporting: View and track credential activity, including the use of shared credentials.
For more information, please see BeyondTrust Vault for Remote Support.