Secret Server

IBM Security Secret Server helps you keep privileged accounts safe with a secure encrypted vault to store and rotate your sensitive accounts. Discovering and vaulting privileged accounts helps you understand how many privileged accounts you have, and exactly who has access to your key systems through real-time session monitoring, recording and key logging. IBM Secret Server will also help you maintain compliance through full audit reports on vault activity.

Products:

  • IBM Security Secret Server

Secret Server Courses:

Secret Server UNIX Protection

This video series provides details on Secret Server UNIX protection. This includes:

  • an introduction to SuperUser Privilege Management (SUPM)
  • how to create a Secret by using a UNIX account to create an SSH key rotation template
  • how to rotate the SSH keys on a Secret
  •  how to do SSH key rotations using a Privileged account
Duration: 12 minutes

Introduction to the Secret Server Dashboard

This course introduces you to the Secret Server Dashboard. The topics covered in this course include:

  • Dashboard types, including
    • basic and advanced dashboards
    • user permissions which allow access to one or both types of dashboards
  • Secret Server widgets which are the basis of functionality for Secret Server's dashboard
  • Dashboard tabs and searching for Secrets, including
    • browse tab
    • tabs containing widgets
    • search widget
    • advanced search for filtering by Secret template and status
    • bulk operations on multiple Secrets

Duration: 15 minutes

Secret Server Dashboard tabs and searching

This course covers the Secret Server Dashboard tabs and searching for Secrets. In this video, you will learn about the following functions:
  • browse tab
  • tabs containing widgets
  • search widgets
  • advanced search for filtering by Secret template and status
  • bulk operations on multiple Secrets
Duration: 4 minutes

Secret Server Remote Password Changing - Open Mic
NEW

This video explains the purpose of the Remote Password Changing feature in IBM Secret Server, and shows how to enable and configure Remote Password Changing with a live demonstration. Topics included in this video are:

  • What is Remote Password Changing?
  • How does Remote Password Changing work?
  • How do you enable Remote Password Changing?
  • Troubleshooting tips
  • Q&A
Duration: 25 minutes


Secret Server Dashboard widgets

This course details the Secret Server widgets which are the basis of functionality for Secret Server's dashboard. In this video, you will learn about the different widget options:

  • create
  • expired
  • favorite
  • out-of-sync
  • recent
  • report
Duration: 4 minutes

Secret Server Discovery and importing Secrets - Open Mic
NEW

Learn how IBM Security Secret Server performs discovery from Active Directory, UNIX/Linux and VMWare ESX environments, and how to import those accounts into Secret Server. The topics covered include:

  • How does Discovery work?
        - Active Directory Discovery
        - Unix Discovery
        - VMWare ESX Discovery

  • Why use Discovery?
  • Importing secrets found during Discovery
  • Troubleshooting tips
  • Q&A
Duration: 28 minutes

Secret Server Dashboard types

This course introduces you to the Secret Server dashboard types including

  • basic and advanced dashboards,
  • user permissions which allow access to one or both types of dashboards
Duration: 2 minutes

Secret Server folders

This course explains what is an IBM Secret Server folder, as well as, how you can create folders and sub-folders.

Duration: 7 minutes

Installing Secret Server and Privilege Manager

This video details how to plan for and complete the installations for Secret Server and Privilege Manager.

Duration: 26 minutes

SAML Authentication for IBM Security Secret Server with IBM Cloud Identity

In this video demonstration, you will learn how to:

  • configure SAML (Security Assertion Markup Language) in IBM Security Secret Server (ISSS)
  • configure Secret Server application in Cloud Identity
  • register SAML identity provider
  • troubleshoot the configuration
Duration: 13 minutes

SAML Authentication for IBM Security Secret Server with IBM Security Access Manager

In this demonstration, learn how to:

Configure SAML in IBM Security Secret Server (ISSS)
  • Enable SAML authentication
  • Configure SAML service provider
Configure SAML in IBM Security Access Manager (ISAM)
  • Configure reverse proxy - Configure a SAML 2.0 identity provider federation
  • Download the federation's metadata XML
  • Add a partner to the federation 
  • Add the federation to the reverse proxy
Add the identity provider to Secret Server's SAML configuration
  • Import the identity provider's metadata XML
Troubleshoot

Duration: 20 minutes

Secret Server Secrets

The Secret Server Secrets course provides details on the following topics:
  • what is a Secret
  • how do you create a Secret within Secret Server
Duration: 7 minutes

Secret Server Launchers

Secret Server launchers open a connection to a remote computer or device or logs into a website using the secret’s credentials directly from the webpage. A demonstration of this feature is also provided.

In this course, the following topics are covered:

  • What are Launchers?
  • Launcher Types
    • Remote Desktop, PuTTY, Web, Custom
  • Session Management
  • SSH Proxy
    • SSH Command Menus
  • Troubleshooting tips
Duration: 31 minutes

Secret Server local groups

In this video, you will learn about Secret Server local groups.

Local groups are managed and created solely in Secret Server.

Duration: 4 minutes

Best practices for Secret policy

This video provides the best practices for a Secret policy. 

A Secret policy is a set of security and remote password changing settings that are normally applied to a Secret on the Security and Remote Password Changing tabs.

Duration: 2 minutes

Secret Server SSH Key Dependencies

Objective

Learn how to add and use SSH Key Dependencies in Secret Server

Time

6:33 minutes

Secret Server local users

In this video, you will learn about Secret Server local users.

Local Secret Server accounts are non-domain user accounts that are created and managed soley in Secret Server.

Duration: 4 minutes

Secret Server Roles and Permissions

In this course, you will learn about the Secret Server roles and permissions, as well as, local users and groups.

Topics covered include:

  • create a customer role
  • analyze default roles
  • identify role assignments
  • create a local user
  • assigning role permissions and roles attributed to the local group

Duration: 12 minutes

Introducing IBM Security Secret Server

This video provides an overview of the IBM Security Secret Server. The following topics are covered in this video:
  • Secret Server Overview which includes information on Secrets, Launchers, Session Monitoring, SSH Command Menus, and Discovery
  • Installation
  • Configuration which includes information on Active Directory Authentication, Discovery, Secret Templates, Launchers, Remote Password Changers and Distributed Engine
  • Troubleshooting for topics such as Secret Server, Launchers, Remote Password Changers and Distributed Engines

Time: 27 minutes

Secret Server Alerting and SIEM

Objectives

  • Understand Secret Server's alerting options and SIEM integration
  • Know how Secret Server can alert you about different kinds of actions taking place in the tool
  • Know how to integrate your SIEM or log management tool within Secret Server to have better visibility of activity within the tool


Time:

15 minutes

Secret Server Auditing, Reporting and Troubleshooting

Objectives

This course for auditing and reporting and auditing/reporting troubleshooting will show you how to:

  • Understand the Secret Server auditing and reporting capabilities
  • Access a user and secret audit
  • Access the reporting function and know which reports are the most useful to you
  • Set up a schedule to provide reports to appropriate users
  • Understand how to access an updated report
  • Know how to customize the reporting screen
  • Know how to access the Security Hardening and User Audit reports
  • Understand how to access logs and what logs are available
  • Know common techniques used to troubleshoot Secret Server's audit and reporting capabilities

Time:
45 minutes

Secret Server Service Account Management and Dependencies

Course Objectives

  • Understand how to use Secret Server's capabilities to automate management of service accounts
  • Learn how to manage service accounts in your environment
  • Know what dependencies are stored in the secret
  • Learn how to add dependencies to secrets
  • Know things to consider when managing secret dependencies


Time:

45 minutes

Secret Server Discovery and Troubleshooting

Learn about standard and extensible discovery capabilities, including common techniques for troubleshooting secret server discovery.

Secret Server Session Recording and Troubleshooting

Learn about Secret Server session recording and monitoring capabilities, and common techniques used to troubleshoot recording.

IBM Security Secret Server: Security Hardening

In this course, you learn the best practices for securing your IBM Security Secret Server instance.  Practices include: assigning roles, two-factor authentication, and securing encryption keys.

Secret Server System Requirements

This video details the system requirements for Secret Server installations. Recommended system requirements are discussed for:

  • Basic deployments
  • Advanced deployments

You will also be provided with additional information on system requirements for servers used for Secret Server.

Time: 3 minutes

IBM Security Secret Server: Secret Troubleshooting

Secrets are individually named sets of sensitive information created from Secret templates. 

In this series of videos, you will learn about troubleshooting key areas, such as templates, plugins, inactive Secrets, searching Secrets, and unlimited administration mode.

Two-Factor Authentication

Learn about two-factor authentication in Secret Server.

Secret Server Roles and Role Permissions

This video walks you through Secret Server's roles and permissions. Each Secret Server user must be assigned a role. Secret Server's method for regulating permission to system access is role-based security.

Time: 5 minutes

Secret Server Disaster Recovery and High Availability

Learn about Secret Server disaster recovery and high availability.

Secret Server API and Scripting

Learn about Secret Server available API's

Advanced Session Recording

Learn how to configure advanced session recording in Secret Server.

Secret Server - Setting up Active Directory - Open Mic

Setting up Active Directory is one of the first steps that should be taken in the enterprise environment after IBM Security Secret Server (ISSS) installation.

The presentation explains Active Directory integration, why it is needed, requirements, and how to set it up.

This video provides three sections:

  • Details on Active Directory integration
  • Demonstration
  • Q and A

Time: 17 minutes

Multi-Tier Access Workflow

Learn about multi-tier workflow.

IBM Security Secret Server: Secrets and Secret Templates

Secrets are individually named sets of sensitive information created from Secret templates.  In this course, you will learn how to create and customize Secrets in IBM Security Secret Server.


IBM Security Secret Server Dashboard and Folders

In this course, you learn how to use and customize Secret Server's Dashboard, and also learn how to create and use Secret Server folders.


IBM Security Secret Server: Basic Configurations Troubleshooting

In this course, you learn about common methods used to troubleshoot basic configurations, such as troubleshooting Active Directory sync, integrated Windows authentication,  and user access and permissions.  You will also walk through using logs and diagnostics.


Secret Server Distributed Engine and Troubleshooting

Learn about Secret Server
distributed engine and common techniques used to troubleshoot distributed engine.
Distributed engine is a way to provide limitless scaling for enterprise environments.

Secret Server Remote Password Changing

Objectives:

  • Understand the purpose of the password changing feature
  • Know how to enable and configure password changes
  • Understand specific password changing steps necessary for certain platforms, such as web platforms
Time: 22 minutes

Secret Server Upgrades

Objectives

  • Provide an overview of the Secret Server upgrade process
  • Understand the necessary prerequisites for performing an upgrade
  • Know what steps are involved when performing an upgrade
  • Know hot to troubleshoot issues when performing an upgrade

Time to Complete: 20 minutes

Secret Server User Interface

Learn about new Secret Server v10.6.1 User Interface.



IBM Security Secret Server: Basic Configurations

Learn how to configure IBM Security Secret Server groups, roles, permissions, user management, user preferences, and Admin settings.

Secret Server Installation On-Premise

Objectives

  • Know the Secret Server installation prerequisites
  • Learn where to download .NET framework 4.5.1 for installation
  • Understand how to install Internet Information Services (IIS)
  • Understand how to install SQL Server Express and know the recommended SQL versions
  • Know the required steps for the Secret Server MSI installer
  • Learn how to install a Secret Server license

LIV1100X Secret Server Best Practices and Workflow

Objectives

  • Learn how to determine who needs access, what permissions to apply and how to organize sensitive data using best practices in Secret Server
  • Learn about the Secret Server's workflow features and what they do
  • Understand the workflow capabilities, options and why features are used together
  • Know how to create a one time password using the check out feature which forces accountability on secrets by granting exclusive access to a single user
  • Set up the doublelock feature to secure your sensitive data
  • Use the request for access feature to require that a user is granted approval to access a password or Secret for a specified amount of time
  • Learn how to integrate your ticketing system with Secret Servder

Secret Server Teams

In IBM Security Secret Server, administrators can create groups called teams to restrict what users can see.

NOTE: This course is using IBM Security Secret Server v10.6.1.

Secret Server Launchers and Troubleshooting

Learn about Secret Server launcher capabilities and common techniques used to troubleshoot launchers.
Launchers provide direct access and authentication into remote machines.

Privilege Manager: Configuring with Secret Server

Objectives

  • Learn how to integrate Privilege Manager with Secret Server
  • Use Secret Server as Privilege Manager's storage container for credentials
  • Understand how the REST API is used for communication with Privilege Manager from Secret Server

Time

6 minutes

Secret Server Privilege Manager Policies
NEW

This webinar provides a high-level overview of Privilege Manager policies. The topics covered include:

  • What are Privilege Manager Policies? What defines a Policy?
  • The Privilege Manager Policies Setup Process
  • Policies Types - Privilege Manager Application Dashboard
  • Policy Configuration 
       – How to Create a New Blacklist Policy
       – Enabling the Policy on the target machine
       – How to Create a Filter
       – Applying the Filter to a Policy
  • Elevating Privileges
        – How to create a Policy that requires User Justification to run an Application
        – Viewing the Application Justification Report
  • Policies Best Practices
Duration: 25 minutes