Bomgar Vault Features

Secure Password Storage

Quickly place privileged account passwords behind a secure wall ensuring restricted access while logging activity along the way. Eliminate tracking passwords on sticky notes or in spreadsheets, and losing credentials when an employee leaves.

Credential Rotation and Randomization

Bomgar Vault rotates credentials based on its configuration, as well as when the Vault detects plain text passwords have been exposed. Use specific password policies for each platform to ensure the highest password complexity per platform, not the lowest common denominator.

Credential Scanning

Quickly find credentials in your environment. Retrieve the password age, determine if it is enabled, and if it is privileged. Import existing credentials into the vault at once to quickly generate a list of accounts needing management.

Service Account Management

Maintain business continuity by achieving optimal system uptime for service accounts. Restart and reset business critical service accounts without worry.

Seamless Credential Injection™ Feature

When integrated with Bomgar Privileged Access or Bomgar Remote Support, users can directly inject credentials into end servers and systems with just one click. Since the user never sees the plain text credentials, they can’t compromise them, greatly increasing security. Improve productivity by allowing administrator accounts to access systems with just the click of a button- no more wasted time finding or tracking down credentials.

Vault API

Keep “password sprawl” in check by centralizing the storage of all privileged credentials. Store the credentials for any system or security tool in your environment in Bomgar Vault, and retrieve them securely and on demand using the API.

App to App Credential Security

Remove hard coded passwords from applications and scripts to securely manage application to application credentials that do not require human intervention.

Streamlined Management and Elevation Approvals

Use email alerts and approvals to keep responsible parties informed of credential use and gain insight into the health of privileged credentials. Approval for highly sensitive credentials adds another layer of protection before credentials can be used.

Remote Credential Rotation

Secure systems regardless of domain trust and connectivity. Rotate credentials remotely on an Internet connected network with no VPN connectivity.

Password Check-in/Checkout

Gain insight as to who is accessing shared account passwords and when. Check out a password before use and automatically run a password rotation after the password is checked back in.

Reset and Retrieval Notification

Be notified when users reset or retrieve lost or forgotten passwords.

SSH Key Management

Securely store, rotate and control access to SSH keys to prevent unauthorized access to privileged account.

Break Glass

Grant emergency access to a person who does not have access privileges when necessary.