Secret Server Configuration

Depending on the credential type that you are validating make sure you are using the appropriate secret template as per the table bellow:

Credential Type Template Name Template Type Note
Active Directory Account Active Directory Account Built-in Used for domain authentication.
JDBC JDBC Credential Built-in Used for database connections.
SSH Unix Account (SSH) Built-in Default SSH password-based login template.
SSH PrivateKey SSH Key Built-in May appear separately or within Unix Account.
Windows Windows Account Built-in Available by default in most configurations.
JMS* JMS Credential Custom For Java Messaging Service access.
SNMPv3* SNMPv3 Custom

Requires custom template with SLUGs.

This credential type is not available in Secret Server on the Delinea Platform.

SNMP Community* SNMP Credential Custom Must create custom template manually.
VMware* VMware Credential Custom Credentials used to authenticate and manage VMware's virtualization software running on physical servers

*Delinea includes both default templates (e.g., Windows, MySQL, SSH) and custom templates for specialized use cases). To learn more about secret templates, go here Built-in Secret Templates.

*For SNMP V3, you must create a custom template with the following fields and SLUG mappings:

Field Slug
Username Username
Authentication protocol authentication-protocol
Authentication Key authentication-key
Privacy protocol privacy-protocol
Privacy key privacy-key

Creating a Service Account in Secret Server

  1. Create a Service / Application Account user in Secret Server.

  2. Create a Role in Secret Server with View Secret and View Launcher Password permissions.

Creating a Secret in Secret Server

  1. Create a secret in the Delinea Secret Server. Make note of the SecretID which is shown in the URL as this is needed when setting up the credential in ServiceNow.. The following is an example of a Windows Credential.

  2. Add the Service / Application Account user in the Sharing section of the secret.