Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Delinea Secret Server Features

What are the features of Delinea Secret Server?

Administration

  • Approval Workflows
  • Centralized Management

Reporting

  • Reporting

Top Rated Delinea Secret Server Alternatives

Filter for Features

Functionality

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.

Not enough data

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors.

Not enough data

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers

Not enough data

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Audit trail

Creates audit trail of secrets lifecycle

Not enough data

Cental dashboard

Has a centralized dashboard for users to interact with

Not enough data

Universal approach

Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform

Not enough data

Monitoring

Audit Logging

Provides audit logs for compliance reasons.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Administration

Policy, User, and Role Management

Creates access requirements and standards and establishes user, roles, and access rights.

Not enough data

Approval Workflows

As reported in 10 Delinea Secret Server reviews. Allows administrators to approve or reject access changes to using defined workflows.
80%
(Based on 10 reviews)

Automated Provisioning

Automates provisioning and deprovisioning to reduce the amount of administrative manual work.

Not enough data

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

As reported in 10 Delinea Secret Server reviews. Manages identity information from on-premise and cloud applications.
87%
(Based on 10 reviews)

Self-Service Access Requests

Automatically allows access if users meet policy requirements.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.

Not enough data

Reporting

Includes reporting functionality. This feature was mentioned in 10 Delinea Secret Server reviews.
87%
(Based on 10 reviews)