Jump to content

Sarge

Members
  • Posts

    200
  • Joined

  • Last visited

  • Days Won

    8

Posts posted by Sarge

    • It would be fantastic to be able to customise what fields are included in the reports that can be scheduled.
      • For example a Password List used to store SSL certificates with a number of custom fields; currently the report only shows the title and expiry date as we don't use any of the other default fields - we'd love to be able to select which fields to show on the report (exclude empty fields and include custom fields).
    • If they could be scheduled from the administration area as well rather than in a specific users context that would be great as well so all administrators can see/modify the reports easily.
    • If the wording of the report email could be customised in the same manner other email templates are. 
    • Ability to allow users to run reports without giving them the reporting security administrator role. (We have separate accounts for security administrator roles).
  1. These errors "It appears the user's session in IIS has been prematurely ended, causing the following error" also occur during the Out of Box setup wizard as you click "Next" to apply the "System Settings" if you've got the STIG for Windows Server 2019 applied.

    We're still trying to find exactly what setting within the STIG is causing the issue. @support is there any guidance you can provide of what is occurring after clicking Next on the System Settings setup wizard screen? 

  2. A couple of suggestions: 

     

    1) Require users to select a password list template

    Use case: Your organisation requires all Password Lists created to require "provide a reason" (or some other setting) additionally, you have multiple templates users can use because naturally, they aren't one size fits all.

    A UAP can enforce users to use one specific template for settings and one specific template for permissions; however this doesn't work when users have multiple templates to choose from. There is nothing to stop users from not selecting a template to use for settings/permissions - thus bypassing the organisations requirement of all password lists configured to "require a reason".

     

    Perhaps an additional UAP setting "Users must choose a template they have permission to when creating a Shared Password List" and "Users must choose a template when creating a Private Password List".

    Setting D3 should still work as expected with the above suggestion.

     

    2) Categories for Password List Templates: When copying settings from a template, only allow users to select a template marked as "Private Password List Template". Currently users can select any template they have access to, to copy settings from (Shared or Private). Thus the drop down for template selection can be needlessly cluttered. Current best solution for this is making sure templates are named appropriately.

     

    3) Additionally, an option to prevent users using self-destruct messages on Private Password Lists, and exporting their passwords. 

  3.  # PowerShell Request
      $PasswordstateUrl = 'https://passwordstate/api/passwords/<PasswordID>'
      Invoke-Restmethod -Method GET -Uri $PasswordstateUrl -Header @{ "APIKey" = "<apikey>" }

     

    By default this will return all data associated with the password record. 

    You can do this instead to select only the password.


     

    $GetPassword = Invoke-Restmethod -Method GET -Uri $PasswordstateUrl -Header @{ "APIKey" = "<apikey>" }
    
    $Password = $GetPassword.Password.ToString()

     

  4. Hi Support,

     

    Thanks for implementing this feature. 

    I've noticed a potential bug when testing it. I set the Web Site Allowed IP Ranges to *.*.*.* and hit save, the application stopped the entry from being saved as it should but an auditing event was still recorded for the attempted save. 


    It would also be great in a future build if the previous value and new value can be captured in the auditing data.

  5. Limited use cases this one, but in some circumstances, there are requirements to have passwords synchronised across hosts for a specific user.
    We can achieve this through a custom script, but it'd be a lot easier if it was possible to associate multiple hosts with the same password item - so when it comes time for Password Resets & Validation the one password is used on multiple hosts/validated.

  6. On 8/21/2018 at 7:25 AM, texxx said:

    Be nice if Passwordstate would allow me to set an option in the Duo configuration to automatically send a push request as soon as I get to the Duo step of the login. I’d also want to be able cancel the auto-push and be able to select a different auth method (text, phone call, passcode) in case push notifications are down.

    Same for the Google Auth 2FA. 

    The Microsoft Authenticator app supports push notifications, just needs to be implemented on Passwordstate end.

  7. 9 minutes ago, support said:

    We've also thought about this in the past, but not sure technically how we would achieve this - if you look at all the possible settings alone under the System Settings screen, there would be 100's if not 1000's of changes that would need to be somehow tracked, and reported. Hopefully one day we can come up with a solution for this.

    No worries.
    I'm probably showing my ignorance but I'd have thought it'd be a kin to showing the difference of a database value for the system setting prior to change and then after the change; while prepending the users unique identifier.

  8. It would be nice to have an audit log for all additions or modifications made via the application administration section; including what setting was changed to what.

    Example:

    "User XX changed XX setting from XX to XX".
    "User XX added Active Directory security group XX from the domain XX"

    "User XX granted Active Directory security group XX modify rights to the template XX"
     

    In a multi-administrator environment being able to know these changes and revert them if required would be hugely beneficial; especially when many modifications are made but may not be captured in the work notes the user maintains.

  9. 10 minutes ago, Alexey said:

    Question: Do I need to manually make sure that I have encryption keys and web.config file stored elsewhere (have backups of them) or the automatic backup procedure does that for me?

     

    Technically no, web.config and the database contain half of the encryption keys - put the halves together and you can decrypt the content of the database.

    The ZIP contains everything in /inetpub/passwordstate

    The Bak, as you pointed out, is the database. So with these two things you have everything you need.

     

    We rotate then export our encryption keys every third upgrade and send them off site in a vault to be stored - but this isn't required.
    We also ship our passwordstate generated backups to a different physical server at a different site, as well as sending to tapes which get stored at an offsite vault.

    At anyone one time we have some 365 copies we can restore from (on tapes, one for each day), and then 30 copies on the passwordstate server we can restore from, as well as those same ones on the second physical server in the second site.

×
×
  • Create New...