Python scripts for Secret Server
I just wanted to share with you some cool scripts in Python that I have been working on. I don’t think they are perfect, but as I am not seeing anything similar to that on the internet I decided to share with you.
Secret Server as the company states in their website.
Secret Server is a clear pick for Privileged Account Management. Competitive pricing, rapid deployment, and short time to value. supporting a variety of complex and specialized enterprise use cases
Secret Server is really helpfull for sharing credentials among teams, checking-in and out from secrets, automatic rotation of passwords, etc..
Web Service or REST API
Honestly? For me, whatever.
Secret Server exposes two endpoints, one WebService and one REST API. Internally I have usage in both cases, but I am slowly moving all of them to REST API’s. Why? Simplicity and standardization.
The scripts that I will share with you are all based in the REST API.
Windows Authentication Enabled?
When you have an On-Premises instance of Secret Server, you have the possibility to enable Windows Authentication on it. For PowerShell it helps a lot having Windows Authentication enabled, so you don’t need to manage any credentials and just make sure that the user executing the scripts has enough permissions on the tool.
You will notice that the URL changes when you have or not Windows Authentication enabled, so pay attention on that.
In this repository, all the examples are using the REST API that has Windows Authentication enabled by default.
Well, not taking too long, below you will find the link to the GitHub repository where I am sharing all the scripts.
You will find the steps to setup the scripts from the Python side. Of course, you still need a Secret Server instance to yourself.
Posted on January 16, 2019, in Dicas, Python, Scripts, Secret Server and tagged python scripts for secret server, python secret server integration, python secret server rest api, Secret Server, secret server windows authentication. Bookmark the permalink. Leave a comment.