Home
Finding Your Secret Server Login URL and Accessing the PAM Vault Securely
Accessing Secret Server requires a specific URL unique to your organization. Unlike common SaaS platforms with a global sign-in page, Secret Server is an enterprise-grade Privileged Access Management (PAM) solution, often hosted on-premises or within a dedicated private cloud instance. If you are searching for a general login portal, you will not find one; instead, you must use the web address provided by your internal IT or security department.
Why There Is No Global Secret Server Login Page
The architecture of Delinea Secret Server is built around the concept of a "Fortress." Because it stores the most sensitive credentials of an organization—such as domain admin passwords, root keys, and API tokens—exposing a single, global login point would create a massive security risk.
Most companies deploy Secret Server behind a firewall or within a specific sub-domain (e.g., https://secrets.yourcompany.com). This isolation ensures that the login gateway is subject to the organization’s specific network security policies, including IP whitelisting and Geo-fencing. Therefore, the first step to a successful login is identifying the correct gateway address.
Where to Find Your Organization's Secret Server URL
If you are a new user or have lost your access link, there are three primary places to look for your login URL.
Search Your Onboarding Documentation
When your account was first provisioned, you likely received an automated "Welcome to Secret Server" email or a notification from your organization's ticketing system. Search your inbox for keywords like "Delinea," "Thycotic," or "Secret Server." This email usually contains the direct link to the web interface.
Check the Internal IT Portal or SSO Dashboard
Most modern enterprises use Identity Providers (IdP) like Okta, Azure AD (Entra ID), or Ping Identity. If your organization uses Single Sign-On (SSO), the Secret Server icon should be visible in your company’s application portal. Clicking this icon will typically handle both the URL navigation and the initial authentication in one step.
Ask the IT Help Desk or System Administrator
If the above methods fail, do not attempt to find a password reset or login link on a public search engine. This is a common vector for phishing attacks. Instead, contact your internal IT Help Desk. They can confirm the exact URL and verify if your account is active in the specific "User Group" required for access.
Choosing the Correct Authentication Method
Once you reach the correct login page, you will usually be presented with a dropdown menu or multiple buttons for different authentication providers. Choosing the right one is critical for a successful session.
Logging in with Active Directory or SSO
For the vast majority of business users, this is the default method.
- Select the Domain: On the login screen, look for a "Domain" dropdown. Select your corporate domain (e.g.,
CORPorPRODUCTION). - Enter Credentials: Use your standard Windows or work email password.
- SSO Redirection: If your admin has enforced SAML/OpenID Connect, you may be redirected to your company’s branded login page (like Microsoft or Okta).
Using Local Secret Server Accounts
Local accounts are typically reserved for "Break Glass" scenarios or for external vendors who do not have an identity in the company's main directory.
- Select 'Local': In the domain dropdown, choose "Local."
- Username/Password: These are managed directly within Secret Server and are not synced with your other work accounts.
- Password Changes: If it is your first time logging in with a local account, Secret Server will immediately prompt you to change your temporary password to a complex one.
Navigating the Multi-Factor Authentication (MFA) Experience
After entering your username and password, you will encounter the secondary security layer. Based on our experience with various PAM deployments, the MFA step is where most users experience delays.
Push Notifications (Duo and Microsoft Authenticator)
If your organization uses Duo, you will see a popup asking you to "Send Me a Push." In our testing, there is often a 2 to 5-second delay between clicking the button and the notification appearing on your mobile device. Ensure your phone has a stable internet connection. If the push does not arrive, check if your phone's "Do Not Disturb" mode is silencing the alert.
Hardware Tokens and TOTP Codes
For high-security environments, you might be required to use a YubiKey or a time-based one-time password (TOTP) from an app like Google Authenticator. Ensure you have the device ready before starting the login process, as Secret Server sessions often have a short timeout window for entering these codes.
Troubleshooting Common Secret Server Login Errors
Login failures in Secret Server can be frustrating, but they usually stem from a few predictable issues.
The "Access Denied" or "Page Cannot Be Displayed" Error
If the login page fails to load entirely, the most likely culprit is your network connection.
- VPN Requirement: Most on-premises Secret Server instances are only accessible if you are connected to the company VPN. Ensure your VPN client is active and "Tunneling" is working correctly.
- IP Restrictions: Some organizations restrict access to specific office IP ranges. If you are working from a coffee shop or a home network without a VPN, the server will drop your connection for security reasons.
"Invalid Username or Password"
If you are certain your password is correct, check the Domain field again. A common mistake is trying to log in with an Active Directory username while the "Domain" is still set to "Local."
Account Lockouts
Secret Server often has a strict lockout policy (e.g., 5 failed attempts). Once locked, even the correct password will not work. In this case, you must wait for the lockout duration to expire (usually 15-30 minutes) or contact an administrator to manually unlock your profile in the "User Management" section of the dashboard.
Accessing Secret Server via SSH Terminal
For DevOps engineers and System Administrators, logging into a web UI is not always efficient. Secret Server allows for direct login via an SSH terminal if the "SSH Proxy" feature is enabled.
To log in via the terminal, use the following syntax in your command line tool (like PuTTY or Terminal):
ssh <username>@<secret_server_ip_or_hostname> -p 22
Upon connection, you will be prompted for your password. If MFA is enabled, the terminal will display a challenge message (e.g., "Enter Duo Code"). Once authenticated, you can run commands to search for secrets or launch proxy sessions directly:
search <keyword>: Finds matching secrets.cat <secret_id>: Displays the details of a specific secret (if permissions allow).launch <secret_id>: Starts a proxied session to the target resource without ever seeing the password.
Using the Web Password Filler (WPF) for Faster Access
The Web Password Filler is a browser extension (Chrome, Edge, Firefox) that streamlines the login process for websites you manage through Secret Server.
- Log in to the Extension: Click the extension icon in your browser. You will need to provide your organization’s Secret Server URL.
- Authenticate: The extension will open a small window for your standard AD or Local login.
- Automatic Injection: Once the extension is logged in, it will detect when you are on a login page that matches a "Secret" in your vault and offer to autofill the credentials. This is often faster than logging into the main dashboard and copying/pasting passwords.
Login Procedures for System Administrators
If you are the person setting up a new instance of Secret Server, your first login is slightly different.
- The Installer Finish Line: After the installation process completes, you will be prompted to create a "Local Administrator" account. This is your primary "Root" access.
- Installing License Keys: Immediately after your first login, navigate to
Admin | Licenses. You must install three keys: the Edition key, the Support key, and the User key. Without these, the server will limit your functionality. - Configuring the Dashboard: Administrators should immediately set up "Unlimited Administration Mode" (Break Glass) and assign it to a trusted group to ensure the system remains accessible even if the primary directory service fails.
Summary of Secure Login Practices
Accessing your organization's Secret Server is more than just entering a password; it is the gateway to your company's most sensitive data.
- Always verify the URL: Ensure the domain matches your organization's official infrastructure.
- Use SSO whenever possible: It reduces the risk of credential theft and ensures your session is tied to your corporate identity.
- Be patient with MFA: Security checks take a few seconds but are vital for preventing unauthorized vault access.
- Never share credentials: Even IT support will never ask for your Secret Server password.
By understanding the specific URL requirements and authentication paths, you can ensure a seamless and secure experience when managing your privileged accounts.
Conclusion
Successfully logging into Secret Server depends entirely on using the correct organization-specific URL and the appropriate authentication domain. Whether you are a business user accessing a web password through a browser extension or an admin managing SSH proxies via a terminal, the process is designed to be rigorous yet accessible. If you find yourself locked out or unable to reach the page, your internal IT Help Desk is your only authorized point of contact for recovery.
FAQ
What should I do if I forget my Secret Server login URL? Check your company's internal portal, bookmarks, or the onboarding email you received. If those are unavailable, contact your IT Help Desk. There is no public directory of Secret Server URLs for security reasons.
Can I use my personal Gmail or Yahoo account to log in? No. Secret Server is an enterprise tool. You must use either a local account created by your administrator or your official corporate Active Directory/SSO identity.
Why does Secret Server keep logging me out? Administrators typically set "Session Timeouts" for security. If the system detects inactivity for a set period (usually 20-60 minutes), it will automatically terminate your session to protect the vault.
Does Secret Server support FIDO2 or YubiKeys for login? Yes, Secret Server supports various hardware-based MFA methods, including FIDO2 and YubiKeys, though these must be configured and enabled by your system administrator first.
How do I log in if the main website is down? If your organization has "Distributed Engines" or a High Availability (HA) setup, there may be a secondary URL. If the entire system is down, administrators may need to use "Unlimited Administration Mode" or a physical backup of the vault.
-
Topic: Accessing Your Systemhttps://docs.delinea.com/online-help/secret-server-11-6-x/security-hardening/common-criteria-hardening-guide/accessing-your-system/index.htm
-
Topic: Business User Guidehttps://docs.delinea.com/online-help/secret-server-11-7-x/guides-tutorials/end-user-guide/index.htm
-
Topic: SSH Terminal Administrationhttps://docs.delinea.com/online-help/secret-server-11-6-x/networking/ssh-terminal/index.htm