Secret Server 11.9.000006 Release Notes

Release Date: On-premises: August 4, 2025

Component Versions

Distributed Engine and Advanced Session-Recording Agent: 8.4.59.0

Protocol Handler: 6.0.3.39

If your protocol handler version is 6.0.3.26 or lower, you must manually upgrade to a higher version. Automatic upgrades will not work for versions 6.0.3.26 or below. However, if your protocol handler version is 6.0.3.27 or higher, the automatic upgrade will function properly.

Important Technical Change for Secret Server 11.8 and Later

Please carefully review this section prior to upgrading.
Applies to Secret Server On-Premises only.

Overview

Prior to the 11.8 on-premises release, Secret Server On-Premises was delivered in a "dynamically-compiled" state. In this configuration, components of the website, particularly .aspx files, were compiled by IIS upon receiving the initial request.

Starting with the 11.8 release, the application is pre-compiled, which significantly enhances and accelerates application startup because it eliminates dynamic compilation.

As a result, some customers may experience startup issues. Please review the two items below prior to upgrading:

  • Pre-compiled applications cannot run in IIS if there is an "App_Code" folder present. Therefore, the version 11.8 upgrade renames this folder automatically on start-up to avoid issues. Please note:

    • In some cases the application pool may not have the permissions to rename the "App_Code" folder, resulting in start-up issues, specifically, the Web page does not load.

    • If the application pool does not have the permissions, you must rename the "App_Code" folder or give the account running the application pool "modify" permissions to the application folder.

    • When finished, perform an iisreset to restart Secret Server.

  • If you have manually modified any .aspx files, you will not be able to do so anymore, as those files are compiled already. Do not upgrade until you have verified you do not need the modifications going forward.

Support Articles

Please see the following technical articles for instructions:

New Features

Multi-Cloud Security and Integration

  • AWS Secrets Manager Integration extends our distributed vaulting initiative beyond Azure, providing seamless integration with Amazon's AWS Secrets Manager. Administrators can centrally vault, manage, update, and rotate credentials in AWS Secrets Manager, further addressing secret sprawl challenges across multi-cloud environments. It enables centralized, seamless management of all secrets without sacrificing latency or developer or business agility while managing Non-Human Identities (NHIs) and Artificial Identities (AIs) with maintained security and governance.
  • External vault automatic lists for Azure Key Vault and AWS Secrets Manager simplifies the vault linking process by automatically presenting available vaults, reducing configuration complexity and potential errors during setup.

Platform Upgrade Center (PIC) Enhancements

Soon to be renamed Platform Upgrade Center.
  • Automated, secure Platform access transforms the previously manual two-step process into an automated workflow when Platform environmental conditions allow, reducing upgrade complexity and potential errors.
  • Enhanced Platform Upgrade Center (PIC) with Entra ID Support streamlines the upgrade process for organizations using Microsoft Entra ID. The PIC now features automated upgrade steps and application account integration capabilities, making it easier for customers to use the full power of the Delinea Platform. This unblocks a key capability, ensuring customers who federated with Entra ID in Secret Server can seamlessly upgrade to the Delinea Platform via the PIC.
  • Enhanced pre-checks and validation provide better error messaging and validation throughout the upgrade process, including username validation against Platform regular expression rules and improved group membership handling.
  • Application account support enables seamless integration of application accounts to the Delinea Platform through the PIC, expanding the scope of automated upgrade capabilities.

Performance and Scalability

  • API performance optimization addresses excessive launcher session polling that was generating over 120 million monthly API calls, significantly reducing server load and infrastructure costs while maintaining functionality.
  • Secret search performance improvements deliver a 66% improvement in secret search speed compared to previous versions.
  • Bulk operations performance enhancement significantly improves reliability and performance for large-scale secret operations. Enhanced secret imports and bulk operations now split large requests into smaller chunks, preventing failures due to message-size limits and boosting performance by up to 20% for operations involving tens of thousands of secrets.

Security and Compliance

  • Security enhancements for auditing creates separate controls for password view, secret view, and comment-required auditing. This allows customers in higher security environments to audit password view events in real-time while managing business productivity by less aggressively requiring comments.
  • Session management improvements include better RDP proxy session tracking, automatic session closure when checkout expires, and enhanced keystroke recording capabilities for SSH-tunneled connections. These improvements provide better visibility and control over privileged sessions.

User Experience and Management

  • Personal folder duplicate secret management provides granular control over duplicate secret names by allowing duplicates in separate personal folders while maintaining restrictions elsewhere. This enhancement uses an improved enumeration-based configuration system that eliminates conflicting Boolean settings.
  • Request forced checkout enhancement builds upon the 11.8 feature with improved UI display and better handling of secrets in pending status, providing administrators with more control over secret access during incident response scenarios.
  • Increased Windows password changer flexibility offers increased configurability for authentication methods and their order, with enhanced server message block (SMB) fallback options that provide more granular control over heartbeat and password change operations.

Licensing and Availability

Extended resilient secrets availability to Secret Server Professional resolves licensing issues that previously blocked this feature. Customers with a Secret Server Professional license can now access the resilient secrets pages without encountering license-required error messages.

Improvements

ID Release Notes
524382 Improved: Updated UI for configuration export to highlight that only CSV and XML formats are supported.
527531 Improved: Users can now use regular expression to identify Sudo password prompts from UNIX in languages other than English.
550918 Improved: Updated the GCP service account to HB with a privilege account, when provided.
551474 Improved: The Referrer-Policy has been added as "no-referrer." The Permissions-Policy has been updated with a more restrictive set of permissions.
557027 Improved: A user with only "list" permissions for a given secret will no longer see a launcher button in the secret grid/list. A user with only "list" permissions on a secret will now be able to favorite that secret.
561827 Improved: Changed the handling of the domain field in RDP proxy credentials to avoid unnecessary Kerberos TGT DNS lookups.
595575 Improved: Migration Step 2, Secure Platform Access, was updated from a set of instructions for the user to an automated process, if the Platform environment allows it.
604531 Improved: Added advanced setting to pause RPC and heartbeat to help enable multi-day migrations.
604871 Improved: Plugin created to allow changing and resetting of QuantumLock passwords from Platform.
605155 Improved: Added application account migration to the Platform Upgrade Center.
608421 Improved: Group names now show their domain names when viewed on the Platform Group Synchronization page.
609118 Improved: Optimized the Inbox - Secret Access Requests query for better performance. Added clearer error messages for failures when approving or denying secret access requests.
612530 Improved: SSH-tunneled connections that are not encrypted, such as Telnet, can have keystrokes recorded based on a new setting on the custom launcher.
612647 Improved: Added a new informational card to the PIC. This card appears after unified mode is complete and provides helpful details along with links to related topics.
615870 Improved: Increased reliability when specifying the Platform Redirect URL.
617040 Improved: Secret search performance by merging two operations into one.
619399 Improved: Added an option on the Windows service discovery scanner to use the pre-Windows 2000 user logon name for discovered Windows services.
619452 Improved: Secret Server user audit logs from Platform are now more verbose.
620268 Improved: The api/v1/secret-extensions/web-secret-templates endpoint now returns templates that contain URL list fields as well as URL fields.
620615 Improved: Added a field to Active Directory account secrets that shows expiration date for that account's password in Active Directory, if available.
621245 Improved: Extended the OpenLDAP configuration to allow for optional exclusion of the paging control.
621586 Improved: Updated pipeline behavior for viewing secrets. Pipelines will always run no matter how frequently a secret is viewed.
624262 Improved: A validation error is now provided when a user attempts to orphan a quantumlock group by removing the only user assigned to the group.
626043 Improved: When an RDS session connector session is begun, the RDP file that is downloaded by the user can now be signed using a password-protected pkcs#12 certificate with a private key. This prevents the negative user experience of yellow security warning when opening an RDP file coming from Delinea.
626246 Improved: Support for keystroke-only recording in session connector.
628761 Improved: Added "request force checkout" feature.
631811 Improved: When clicking the All Secret Templates option inside of a user's secrets tab, you are now redirected to the Secret Templates settings page that lists all of the secret templates.
632693 Improved: A user with only the "List" permission on a secret no longer gets an "access denied" redirect upon clicking the launcher icon. They now see a descriptive error message instead.
632768 Improved: Added a banner to Azure AD secrets warns of Microsoft's pending retirement of a PowerShell module underpinnings the password changer for those secrets.
633084 Improved: Updated some Japanese translations.
634668 Improved: Updated Secret Server to use the new shared clipboard service. Updated shared clipboard service to use fallback when in non-secure contexts. Removed clipboard plugin use from clipboard service.
637109 Improved: Text for event pipelines secret email updated to indicate you can send the email to any role, not just owners.
637403 Improved: Directory services now enforces a maximum number of results for Active Directory group searches, reducing query times for customers with large group structures.
638247 Improved: Users with view-only permissions on a folder can now see which policy is applied on a folder.
638771 Improved: The Group Member grid now properly takes up the full height available instead of leaving a gap on large screens.
638911 Improved: Removed legacy CustomLauncherEdit/View.aspx pages.
638915 Improved: Legacy SimpleHome.aspx page was removed.
638928 Improved: Removed legacy secret access-request .aspx pages.
639164 Improved: The legacy license .aspx pages have been removed.
639773 Improved: Added a new report for active users and all users for secrets.
640087 Improved: Added option to allow duplicate secret names in separate personal folders.
640202 Improved: Performance when there are a great number of folders for the following : modifying folders. modifying user display names, or changing the personal folder root name (if personal folders are enabled).
640487 Improved: Added more configurability to the Windows password changer for the method and method order.
640554 Improved: LimitedMode no longer limits AD sync, creating and editing secrets, importing secrets, and web service use.
640556 Improved: UI banner now notifies admins of systems exceeding license limits.
640688 Improved: Scan Template Detail page: an unused scan template can now be deleted. Required Fields now change according to scan type selection.
640783 Improved: $SECRETID and $[x]$SECRETID are now available for scripting
641022 Improved: Folder-detail performance.
641879 Improved: The DR replica now handles events where the DR feature deletes folder(s) assigned to "automatic export" by disabling automatic export.
642042 Improved: Added a PIC pre-check error when a username in Secret Server does not match the regular expression rules defined in Platform.
642213 Improved: Check out, check out extended, and check in Syslog events now contain the UTC times of check out and check in.
642250 Improved: Platform Integration can no longer be disabled when unified mode is enabled and all users are sourced from Platform. This prevents users from locking themselves out of their instance. In the event that Platform Integration can be disabled, a dialog warns the user of the consequences.
643200 Improved: Added a data link between the SDK client account and onboarding rule so when an SDK onboarding rule is deleted all SDK client accounts created from that rule get their access revoked.
643381 Improved: Added a configuration setting under user experience to set the duration for the password mask to begin hiding input again.
643721 Improved: Secret access requests can now be published to the Delinea Platform for other services such as the intelligent authorization agent.
643739 Improved: Users can now use the Platform Upgrade Center to migrate Entra ID domains to Platform.
643793 Improved: The groups precheck in the PIC only warns of group membership and role changes
643866 Improved: Added a tab on the User Management page titled OAuth Expiration that lets users delete previously issued OAuth tokens.
644419 Improved: Added Automatic listing when adding an external vault link to Azure Key Vault added.
644548 Improved: DR button order swapped and grid fixed to have more uniform styling on the status chips.
644589 Improved: Now, during provisioning, we retry validation of Secret Server credentials. If upon retry validation still fails, it notifies the orchestrator that provisioning has failed.
644596 Improved: Performance of session monitor search when HasKeystrokes is enabled.
644755 Improved: Converted the update status endpoint to use a PATCH to prevent unnecessary value changes.
644783 Improved: Consistency of the PIC UI steps.
644847 Improved: A banner now reminds admins when their usage license is exceeded.
644887 Improved: Added QuantumLock actions to the user profile.
645147 Improved: When a user lacks access to a session recording, they see a more informative error page.
646302 Improved: The legacy bookmark pages are now disabled by default. They can be re-enabled from settings > user experience > Disable legacy bookmark pages. These pages will be completely removed in an upcoming release.
646932 Improved: Updated design for adding widgets to the desktop.
647178 Improved: Attempting to create an Active Directory discovery source when discovery is disabled now informs you that discovery is disabled and needs to be enabled.
647190 Improved: Admins now receive a reminder in the UI when license usage has exceeded licensing limits.
647689 Improved: HSM process: When enabling and disabling the HSM or rotating the HSM key a backup of the encryption.config is created. To prevent a bad state where the database has updated and the encryption.config was not, the database changes are rolled back to the prior state. Also, when rotating the HSM key with PKCS11, if selecting the current DLL, the system will prevent changing the token label and user pin. Since the PKCS11 library already has an open session and cannot close, this prevents potentially saving the wrong information.
647936 Improved: Added capability to select from multiple settings with distinct behaviors to set how duplicate secret names are handled in the Permission Options section.
648752 Improved: Performance of resilient secrets excluding all data related to QuantumLocked secrets.
649210 Improved: Protocol handler parameter checking when using install options was extended to address CVE-2024-12908.
649708 Improved: Resilient Secrets now falls under "Professional" licensing without need of an add on.
649863 Improved: Updated workflow and secret approvals to use the template arguments for the ticket system.
649955 Improved: Reduced the likelihood of an incorrect query returning too many results.
650476 Improved: Increased flexibility for the Windows Password Heartbeat. The Enable SMB Fallback option, previously on the remote heartbeat configuration options, has been replaced with options directly under the advanced settings under Windows Password Changer. This allows you to toggle RPC and SMB heartbeat attempts and determine the order. Previous Enable SMB Heartbeat configuration has been translated to the new settings. The new options for flexibility do require DE version 8.4.56.0.
650658 Improved: Legacy bookmarklet pages were removed.
650720 Improved: The legacy session recording search and viewing pages were removed.
650755 Improved: Several legacy message pages, such as a read only mode description, have been removed and replaced with newer versions.
650853 Improved: Reduced CPU use within the website and background worker.
651149 Improved: Added text to the Unified step of the Platform Upgrade Center.
651315 Improved: Removed the HSM legacy .aspx pages.
651333 Improved: Password type audit grid updated to angular.
652518 Improved: Added more prechecks in the PIC for a user with a domain whose AD Guid or UPN is NULL in Secret Server.
653208 Improved: Drop down options added for email configuration.
653299 Improved: The secret view that opens in the right panel has been cleaned up to make the copy icons more visible and keyboard access has been enhanced.
653422 Improved: Added a throttle: "Max Number of Passwords That Can be Changed at One Time setting for Entra ID password changer."
653719 Improved: Adjusted MDI partner API URLs to match the new URL.
655545 Improved: Platform is now running on angular 20.
659980 Improved: Legacy discovery .aspx pages were removed.
661443 Improved: Manage Directory Groups button was removed from the Groups page. It just linked to directory services, which is easily accessed in the left navigation panel.
661831 Improved: The legacy discovery .aspx pages have been removed.

Fixed Issues

ID Release Notes
527950 Fixed: Cloud customers using PBA would see an erroneous error message indicating that the PBA site was not ready.
556437 Fixed: A user without "force check in" permissions is no longer be offered a check out button in the inline view or checkout page. This was for a secret that was in a failed RPC state and not currently checked out to any other user. Instead, the user sees an error making them aware of the RPC failure. An admin or user that does have those permissions is still shown a check out button as they need to be able to see the secret even in a failed state to fix it.
557815 Fixed: The Test Slack configuration button on the Slack Integration page did not work correctly when the form was not in edit mode.
562377 Fixed: Accounts that did not have local logon privileges could not be used to run application pool dependencies.
563476 Fixed: Sessions were not automatically closed when the secret checkout expires.
569459 Fixed: On the SAML Identity Providers page, we display the date and expiration status of the identity-provider-configured certificate. We can also log if an expired certificate is used for a login in the SAML log. We added an explanation of why expired certificates continue to work to the Identity Providers page.
572558 Fixed: The "api/v1/one-time-password-code" call throwing a 500 error.
578291 Fixed: Session recording search times out.
578885 Fixed: Enhanced secret imports and bulk operations, enabling large requests to be split into smaller chunks, to prevent failures due to message-size limits. This change improves reliability for bulk operations with tens of thousands of secrets and boosts performance by up to 20%.
588963 Fixed: The "IsDeleted" field for Active Directory groups was not processed when syncing through a distributed engine.
596179 Fixed: Known issues around adding fields. Cancel button now works correctly.
612930 Fixed: Issue where users could select HSM settings without the Administer HSM permission.
616850 Fixed: Resolved issues where debug log messages could be read as errors when displaying group members in directory services.
618947 Fixed: The password type for a secret template is no longer removed when both RPC and heartbeat are turned off.
619161 Fixed: Email PIN code loop with federated login. Resolved issue where browsers using SAML authentication with email-based MFA would send a new PIN email every 5 minutes due to automatic page refresh. Added audit logging for PIN requests to improve troubleshooting capabilities.
624185 Fixed: Automatic user management would not reenable users on login.
627425 Fixed: Maximum file size allowed decimal values in Security File Restriction page.
627910 Fixed: Missing Add Member button on the Teams page.
628730 Fixed: If using Integrated Windows Authentication with web services, there could be a failure from an unrelated SSH Proxy Terminal SSH key Unix authentication method if set to "Password or Public Key."
630656 Fixed: Legacy password changers were disabled in new installs and could not be modified
634234 Fixed: Event pipeline "increment/decrement variable" task had issues accepting string values in an event pipeline.
635932 Fixed: When adding associated secrets in a bulk operation, the remove link would not always show for a secret you just added.
638045 Fixed: Approval settings for non-secret policies.
638256 Fixed: An inaccurate error message for session recordings when launch is not detected.
638964 Fixed: RDP proxy session tracking. Resolved an issue where RDP proxy sessions that were opened using proxy credentials (not protocol handler) were not being marked as launched, causing them to be missing from session search results.
639151 Fixed: Resolved issue with PostgreSQL password-change functionality.
640392 Fixed: DR replication data loss when the replica encounters save errors. Resolved issue where running "new data since last replication" could result in permanent data loss if the replica encountered errors during save, causing subsequent replications to skip the failed data entirely. Fixed replication state tracking to ensure failed items are retried in future partial replications.
640808 Fixed: Request Force Checkout button is now displayed while the secret is in a pending status and the "request force checkout" feature is enabled
640978 Fixed: The bulk secret field update now works when MFA is enabled on any secret that is selected.
641375 Fixed: Adding and removing fields did not work correctly if none of the new or existing fields were edited.
641376 Fixed: Export CSV on reports and the auto export storage download now work in Platform.
641566 Fixed: The dates of tbPlatformIntegrationStep were either not being set or being reset in certain scenarios. This has been fixed for all of the steps except the Unification step that will be fixed in a separate card.
641630 Fixed: Secret audits did not correctly link to the new session recording UI.
642223 Fixed: A total count issue when searching subfolders and secrets and then checking and unchecking items.
643226 Fixed: Password changes now trigger an external key-vault push for the linked secret.
643304 Fixed: The status of the Customize branding step in the PIC no longer resets from "skipped" to "ready to start" when the page is refreshed.
643492 Fixed: Discovery but where EntraID users or roles would not display properly in "Network TreeView" under the root EntraID tenant node.
643677 Fixed: AFT token validation errors now return an error code instead of a 500 status code with no body.
643715 Fixed: An issue with the "maximum login failures" shortcut leading to the wrong configuration area.
643815 Fixed: TOTP codes from the favorite dashboard in Platform now work.
643841 Fixed: An error with the opt-in step of the PIC if the user refreshed the page once the opt-in process had begun.
643869 Fixed: Save button was enabled when modifying file attachments before any change was made.
644593 Fixed: Corrected workflow email links for Platform to point to Platform URLs not SSC URLs.
644921 Fixed: Discovery source ID was not being read correctly for Entra ID Members, which led to problems viewing and importing accounts.
645106 Fixed: Issue that could sometimes prevent validation of the Platform URL from the Secret Server configuration page.
645923 Fixed: The "ThycoticSystem" internal user now has the display name "Delinea System."
646732 Fixed: Issue where Entra ID discovery would cause errors when field names in the Privileged Secret template were changed.
646957 Fixed: Periodic error when retrieving favicons.
647271 Fixed: Active Directory invites did not get created in Secret Server
647291 Fixed: A new version install could cache old en.json localization files. Language files now include cache-busting tags.
647351 Fixed: Locked users in Platform were not disabled in Secret Server.
647639 Fixed: An issue that could block OIDC authentication.
647691 Fixed: Account scan template was not display after saving on the Scan Template Detail page.
647852 Fixed: A localization issue on the Discovery Rules List page.
648239 Fixed: Template selection issue on discovery rules.
648534 Fixed: Long secret names did not wrap properly when shown as credentials for a discovery scanner.
648665 Fixed: The Validate Connectivity button was not visible when configured to use processing location as the website.
648769 Fixed: 404 error when loading the application load. To prevent this, custom language resources are only loaded if the files exist.
648844 Fixed: The CSV report download button did not work in Platform.
648998 Fixed: The Preview panel, once closed, would not reappear until opened again.
649098 Fixed: Anti-forgery token logic caused pages to refresh in some circumstances.
649167 Fixed: Secrets did not show inherit permissions properly when searching in the grid. Folders now show the inherits permissions column when shown in the grid.
649273 Fixed. The date range filter could be removed from the discovery computer scan results tab.
651907 Fixed: Resolved an upgrade failure to 11.7.25-11.8.1 for on-premises Windows customers using a non-en-us locale.
651955 Fixed: A fresh on-prem install got stuck at the Create Initial User page.
652482 Fixed: Scan template names were not populated in a dropdown on the PasswordChangerEditScanItemTemplateEdit.aspx page.
652648 Fixed: The Edit button is now visible but disabled on non-editable scan templates.
652697 Fixed: in the PIC for the Secure Access step where polling was not occurring in certain situations after the button was pressed leaving the step stuck in the In Progress state.
652855 Fix: Tunneled RDP proxy data could be stored in the database erroneously under certain conditions. This data is encrypted by the RDP protocol and therefore is not useable as keystroke data and should not be stored.
653644 Fixed: Secret policy launcher tab clipped the far right side of the form selects.
654670 Fixed: Secret share no longer adds groups to the Platform Allowed group list when adding from external groups.
655397 Fixed: On-premises edge case where if the web role had a cached valid license the disaster recovery process was allowed to begin but the background worker could not see a valid license and would do nothing. Now a log is generated.
655439 Fixed: Bug where the SAML Metadata Download XML button did not work.
659912 Fixed: The script editor (report, scripts) would sometimes show an error with the text "canceled."
660018 Fixed: A WRONGTYPE issue caused by calling redis.GetList on a "List<string>" type object. Caching once again applies for this value.

Known Issues

  • After upgrading to version 11.8, users might see "Language Resource Not Found (admin.external-secrets)" on the Secrets tab. This was caused by old language files that were cached and not updated for the new menu item. The solution to this issue is to:

    • Clear their cache for the Secret Server URL or for their entire browser.

    • Incognito can also be used if the cache can't be cleared.

    • A "hard refresh" (CTRL + Shift + R) that bypasses the cache does not fix this issue

    Refer to the following support article for more information.