Verification
There is no direct way to view or inspect cached secrets in Delinea Credentials Cache. To verify that Credentials Cache is functioning correctly, you must enable logging in the appsettings.json configuration file and review the generated log files. This verification approach applies to both Windows and Linux, as Delinea Credentials Cache is implemented as a cross-platform solution.
Verify IIS Site Is Running
Use the following procedure to validate that Delinea Credentials Cache is running correctly when hosted in IIS.
-
Open IIS Manager.
-
Confirm Default Web Site status is Started.
-
Confirm the application pool used by the Credentials Cache application is Started:
-
In IIS Manager, select Application Pools.
-
Locate the pool used by the Credentials Cache application and confirm Status is Started.
-
-
Under Sites > Default Web Site, click the Credentials Cache application (for example, Delinea Cred Cache).
-
Click Browse. The Swagger UI should load and the page should open without errors.
Verifying Delinea Credentials Cache in Apache Tomcat
To ensure that your application configured in Apache Tomcat uses Delinea Credentials Cache, you need to check the logs. The procedure below provides an example of verifying that a Student JPA application configured in Apache Tomcat uses Delinea Credentials Cache.
-
Open the Command Prompt window and navigate to the folder containing the
utility.jarfile. -
Run the
SetUpUtility.jarfile to set the Delinea JDBC Proxy Driver. -
Enter the details of Secret Server, the username of the Secret Server application account, and the password of the application account.
-
Enter the path of the application's lib folder.
-
Specify whether to use Delinea Credentials Cache:
-
On your computer, open the Delinea Credentials Cache folder.
-
In the folder, open the
appsettings.jsonfile and setCredentialCacheExpirationMinutes(the cache expiration period) to 10. -
On your computer, open the folder where Apache Tomcat is configured.
-
Open the
DelineaDriver.propertiesfile. -
Check that the
useDelineaCache=yparameter is set in theDelineaDriver.propertiesfile. -
Open the application configured in Apache Tomcat.
-
Enter the value for the
bookparameter orstudentparameter. -
Check in the Apache Tomcat logs that the connection is made through Delinea Credentials Cache.
Verifying Delinea Credentials Cache in WebSphere
-
In WebSphere, set up the Student JPA application and provide the example settings shown in the screenshot below in the
persistent.xmlfile. -
Open the
DelineaDriver.propertiesfile. -
Check that the
useDelineaCache=yparameter is set in theDelineaDriver.propertiesfile. -
Open the Student JPA application configured in WebSphere.
-
Enter the value for the
bookorstudentparameter. -
Check in the WebSphere logs that the connection is made through Delinea Credentials Cache.
Verifying Delinea Credentials Cache with MID Server Integrations
When using a MID Server (such as a ServiceNow MID Server) with Delinea Platform or Secret Server, credentials can be retrieved through the Delinea Credential Cache.
To verify that the Credential Cache is functioning correctly in a MID Server integration:
-
Confirm that the MID Server is configured with a Delinea Credential Resolver (for either Secret Server or Delinea Platform).
-
Confirm that the MID Server is configured with Delinea credential cache. Follow this link to see how to enable Delinea Credential Cache.
-
In your integration platform, run a test credential retrieval or connection test.
-
If the connection is successful and no direct credential prompt occurs, the MID Server is retrieving credentials from the configured cache.
-
-
In Secret Server or the Delinea Platform, review the wrapper.log file of the MID Server to confirm that the MID Server host has requested credentials through the cache.
-
If the credential request does not appear in the wrapper.log file logs, review the MID Server configuration to ensure caching is enabled.
Verifying Event Pipeline-Based Secret Updates
After implementing Event Pipeline-based secret updates, you can verify that the integration is working correctly using the following methods.
Verifying Event Pipeline Execution in Windows
Method 1: Check Event Pipeline Activity
-
Log in to Secret Server or Delinea Platform.
-
Navigate to Admin > Settings > Event Pipelines.
-
Click the Activity tab.
-
Verify the following details for your pipeline execution:
-
Run ID: Unique identifier for the pipeline execution
-
Status: Should display "Success" for successful executions
-
Triggered by: Shows which user or event triggered the pipeline
-
Timestamp: Confirms the execution time matches your password change
-
If the status shows "Success" and the timestamp is recent, the Event Pipeline is functioning correctly.
Method 2: Check Distributed Engine Logs
For detailed verification, review the log files on the Distributed Engine where Credentials Cache is installed.
-
Navigate to the Distributed Engine server.
-
Go to the log path configured in the
appsettings.jsonfile (typically the path specified in theLogPathparameter). -
Open the most recent log file.
-
Look for the following success indicators:
-
"Successfully retrieved the credential for [SecretID]" -
"Updating cache" -
"Saving credential cache to file"
-
These log entries confirm that the Credentials Cache successfully received and processed the secret update from the Event Pipeline.
Note: If you don't see these log entries, verify that EnableLogging is set to true in your appsettings.json file.
Verifying Event Pipeline Execution in Linux
For Linux environments where Credentials Cache is deployed:
Method 1: Check Event Pipeline Activity
Follow the same steps as described in the Windows verification section to check the Event Pipeline activity in Secret Server or Delinea Platform.
Method 2: Check Apache Tomcat Logs
-
Navigate to the log directory for your Apache Tomcat installation:
-
For Red Hat Enterprise Linux:
/var/log/httpd/ -
For Ubuntu Linux:
/var/log/apache2/
-
-
Check the following log files for Credentials Cache activity:
sudo tail -f /var/log/apache2/error.logOr for Red Hat:
sudo tail -f /var/log/httpd/error_log -
Look for entries related to credential cache updates and secret synchronization.
-
For application-specific logs, check the Credentials Cache service logs in the directory where you published the application.
Note: The specific log verification steps for Linux environments may vary depending on your Apache Tomcat configuration and the location where Credentials Cache was published.



