Automate Rotation and Reduce the Risk with Credential Management

BeyondTrust Password Safe stores, rotates, and controls access to privileged credentials to protect sensitive assets and meet compliance requirements. Use Password Safe's credential management tools to:

Use Access Policies for Advanced Credential Management

In Password Safe, Access Policies associate groups of users with groups of accounts. Access Policies define when, where, and how access is granted, and determines approval requirements.

Inject credentials into applications within an SSH or RDP session. Managed Accounts include configuration that indicates whether credentials have been rotated. This feature allows for bulk password changes as determined by policy. This granularity level in access and password change propagation makes Password Safe a robust, flexible, and scalable solution for organizations of all sizes

Secure Application Credentials

Password Safe automatically eliminates hard-coded or embedded application credentials, simplifying management for IT and better securing the organization from exploitation of those credentials. Password Safe credential management features:

  • Remove of hard-coded passwords from applications and scripts.
  • Provide an extensible REST interface that supports many languages, including C/C++, Perl .NET, and Java.
  • Ensure that passwords can be automatically reset upon release.
  • Enforce extensive security controls to lockdown access to authorized applications.

Simplify SSH Key Management

Traditional methods of SSH key management are labor-intensive, with many organizations improperly rotating or sharing keys. This leads to a loss in accountability over systems, which could lead to those systems being vulnerable to exploits.

Password Safe adds security and simplifies the management of SSH keys by:

  • Storing private keys like any other privileged credential.
  • Rotating SSH keys according to a defined schedule.
  • Allowing designated ‘secondary’ accounts and SSH keys to be grouped to a ‘primary’ account to manage rotation interval, complexity and duration of SSH keys.
  • Enforcing granular access control and workflow.
  • Alerting when keys are released.
  • Automatically logging users onto Unix & Linux systems through the proxy with no user exposure.
  • Recording every privileged session with full playback and key usage auditing.
  • Offering failover to a managed password for complete redundancy.
  • Allowing SSH sessions to be established via existing desktop tools without having to initiate with a web interface.
  • Simplifies the management of SSH keys for better accountability and security over Unix & Linux systems.