Business Users vs IT Users
What is a Business User?
A Business User refers to someone who is not an IT user. These users generally utilize Secret Server to securely store credentials needed for accessing departmental websites, applications, and personal accounts within a highly secure enterprise vault. Business Users can:
Business users can:
- Access secrets: They can create, update, and delete their own secrets within Secret Server. For example, a user signing up for an online service can use our password generator to create a strong password, store that password in Secret Server, and later use Web Password Filler to access it when logging on.
- Request and approve access to secrets: Non-privileged secrets may need approval workflows. Business users can request access to these secrets and can approve access for others. For example, if access to an organization's social media accounts required authorization from a member of the marketing team, a business user could request access to the secret, and another business user could then approve access.
- Share secrets with other users: Business users can share non-privileged secrets with other users of Secret Server, either IT or business users.
- Access secrets using our mobile app: Business users can use the Delinea mobile application to access and manage their secrets.
- Use Web Password Filler: Business users can use our Web Password Filter (WPF) for accessing websites and auto-filling credentials from their secrets.
- View audits of their secrets: Business users can use auditing to see who accessed their shared secrets.
Administrators can restrict template visibility for Business Users. By default, all users have access to all templates, but business users typically need access to the following templates:
-
Bank Account
-
Combination Lock
-
Contact
-
Credit Card
-
Healthcare
-
Password
-
PIN
-
Security Alarm Code
-
Social Security Number
-
Web Password (Non-IT-related)
What is an IT User?
An IT User is an individual with a user account within the system who is part of the IT team and has access to manage sensitive information like passwords, API keys, and other credentials stored within Secret Server, allowing them to securely access and manage privileged accounts for various systems across the organization, typically with specific permissions based on their role within IT.
The table below shows available actions to Business Users and IT Users:
Action | Business User | IT User |
---|---|---|
Approve access to secrets | • | • |
Configure password rotation | • | |
Configure security features for a secret | • | |
Create, delete, modify folders and add secrets to any folder | • | |
Create and delete personal folders | • | • |
Create, update, and delete personal secrets | • | • |
Create and manage Integrations, workflows, pipelines, discovery, sites, distributed engines, HA/DR, and more | • | |
Launch secrets they have access to | • | • |
Request access to secrets | • | • |
Share secrets | • | • |
Use any administrative functions of Secret Server | • | |
Use any launcher including RAS (Platform) | • | |
Use Connection Manager to launch RDP or SSH sessions | • | |
Use the Delinea mobile app for access to secrets | • | • |
Use the Secret Server SDK or API | • | |
Use Web Password Filler | For Non-IT-related tasks, websites or portals | For any tasks |
Use Web templates in Secret Server | For Non-IT-related tasks, websites or portals | For any tasks |
Utilize any templates including custom templates | • | |
View secret audits for their own secrets | • | • |
View user audits for their own secrets | • | • |