Subscribe
  • Home
  • /
  • Enterprise Solutions
  • /
  • ThycoticCentrify enhances DevOps security with certificate-based authentication, configurable time-to-live f...

ThycoticCentrify enhances DevOps security with certificate-based authentication, configurable time-to-live for all cloud platforms


Johannesburg, 13 Oct 2021

ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today announced enhancements to its PAM solution for DevOps, Thycotic DevOps Secrets Vault. The latest version offers certificate-based authentication and the ability to configure time-to-live (TTL) for secrets, leading to even tighter DevOps security and easier management.

“With the latest enhancements to Thycotic DevOps Secrets Vault, we’re continuing our commitment to deliver usable security solutions,” said Richard Wang, Director of Product Management at ThycoticCentrify. “Today’s organisations require a DevOps solution that’s as agile as their development while satisfying the needs of IT and security teams.”

Certificate-based authentication designed for privileged machines

Thycotic’s DevOps Secrets Vault addresses all scenarios in a DevOps flow where secrets are exchanged between machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration and robotic process automation (RPA). In sync with the high-speed workflow, DevOps Secrets Vault creates digital authentication credentials that grant privileged access to systems and data.

With the latest release, organisations can use certificate-based authentication for enhanced security and easier management. Unlike authentication solutions designed for people (such as biometrics and one-time passwords), certificate-based authentication can be used for machines – non-human privileged users such as systems, devices and the growing internet of things (IOT) – to identify a machine before granting access to a resource, network or application. Certificates are stored locally and securely, which alleviates the headache of managing passwords and distributing, replacing and revoking tokens.

Time-to-live eliminates standing secrets for all cloud platforms

In a DevOps workflow, resources are created quickly and must expire automatically to meet compliance requirements and avoid the risk of standing privilege. When cloud platform administrators, developers, applications, or databases need to access a target, DevOps Secrets Vault generates just-in-time, dynamic secrets.

DevOps Secrets Vault has long supported automatically expiring secrets for AWS and Azure, and now extends this capability to Google Cloud Platform. Now, no matter which environment organisations choose, they can set a predetermined time for secrets to expire automatically.

“Security and identity teams are working in lockstep with DevOps to meet the requirements of these high-speed processes,” said Wang. “They require a powerful solution that delivers immediate value while serving the needs of agile innovation.”

Combined with Thycotic Secret Server, the industry-leading vault for digital credentials, DevOps Secrets Vault provides security and IT teams full visibility and control over secrets management throughout an organisation. Specifically, DevOps Secrets Vault replaces the need for hardcoded credentials used in the DevOps process and CI/CD toolchains.

To learn more about DevOps Secrets Vault, visit https://thycotic.com/products/devops-secrets-vault-password-management/

Share

ThycoticCentrify

ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify’s industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations’ data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.