Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

FlexDeploy provides out of box integration with Thycotic Secret Server to retrieve secrets. 

Thycotic Secret Server Setup

  • Make sure Thycotic has web services enabled

FlexDeploy Setup

You must first create a Credential Store in FlexDeploy by clicking the Create Store button on Administration - Security - Credentials page. The credential store represents an instance of a specific type of credential store provider. If you have more than one Thycotic Secret Server, you will create an equal number of Credential Stores in FlexDeploy.

Here are the configurations necessary for this store.

Property NameNotesExample
Thycotic URLURL of Thycotic Secret Serverthycotic.mycompany.com
Thycotic UsernameUsername of service account to access Thycotic Secret Serveras per your server configurations
Thycotic PasswordPassword of service account to access Thycotic Secret Serveras per your server configurations

Now you are ready to create an individual credential to be retrieved from the Secret Server

You can create or edit credentials from the Credentials page or from where the specific credential is used.

Azure Key Vault Credential requires input as described below.

Input NameNotes
Secret ID

The ID of the secret.  On Thycotic Secret server, this is the unique value for a secret.

It is in the URL when you browse to that secret on the Thycotic web application

Here is what the create and edit credential form looks like.

You can change credential inputs (Secret ID) at any point. FlexDeploy will use these inputs with credential store properties to retrieve individual credentials for use during Workflow Execution.

  • No labels