Jump to content

support

Administrators
  • Content Count

    3243
  • Joined

  • Last visited

  • Days Won

    179

support last won the day on February 4

support had the most liked content!

About support

  • Rank
    Administrator

Contact Methods

  • Google Plus Account
    103119288349402106036

Profile Information

  • Gender
    Not Telling

Recent Profile Visitors

5762 profile views
  1. support

    Error in application Log.

    Hello Joakim, Can you check three things for us: On the screen Administration -> System Settings -> Miscellaneous tab, is your Base URL field here correct for your Passwordstate URL? On this System Settings screen, if you click the 'Save' button, can you report the actual error it comes back with And in IIS, if you look at the Passwordstate web site (expand the site in the tree), is the 'SelfDestruct' folder configured as an 'Application' in IIS - this should have a different icon from most other folders? Thanks Click Studios
  2. support

    AN ERROR HAS OCCURRED

    Hello, Could you please follow those on screen instructions and let us know the outcome? Thanks Click Studios
  3. support

    Account 'S-1-5-18' was found

    Thank Mi Ke, We will try to reproduce this this week, and will report back here if we can. Appreciate the information you provided. Regards, Support
  4. support

    Error Console Errors Due to Anti-Virus Software

    Thanks for letting the community know
  5. support

    Hide unapproved Authentication Options

    Coming in the next build
  6. support

    HTTP Security Headers

    Hi Guys, We've added the mentioned security headers in build 8600. Regards Click Studios
  7. support

    Proposal for new API endpoint

    Okay thanks
  8. support

    Proposal for new API endpoint

    Hello, Have you tested our new version of the Self Destruct Message feature, where the site can be deployed separately to your main Passwordstate web site? And this deployed site does not need any access back to your Passwordstate API at all? We don't have any features in our API right now to send Self Destruct Messages, but it may be something we look into in the future. Thanks Click Studios
  9. support

    Account 'S-1-5-18' was found

    Hi Mike, Sorry it's not fixed. It is quite difficult for us to test this sort of fix, when we cannot reproduce the issue ourselves. This returns 'System' for us every time, and we're not sure how to replicate what you are seeing - would you have any ideas what we need to do to this scheduled task to replicate it? Thanks Click Studios
  10. support

    Account 'S-1-5-18' was found

    Hi Mike, We're not sure why your scheduled tasks are reporting n/a like this - we've never seen this before. Can you try the attached script again - we've added this in as an exclusion as well. Get-Dependencies.ps1 Regards Click Studios
  11. Hello IdlOr, We're really sorry, but Passwordstate is only designed to work with Active Directory store, and not the other two directories you've mentioned. Regards Click Studios
  12. support

    Account 'S-1-5-18' was found

    Hi Mi Ke, We are very sorry, we did actually forget to follow this up. I've taken a look at this today and here's some information to consider: In our discovery job, we are excluding the discovery of "System" as per screenshot below, but we cannot understand why on your systems this isn't working: We found out that the Profile of the System Account has the unique profile registry key as S-1-5-18 So we've now added this to our exclusions in the Account Dependency Script, tested this and it seems to be working: For this to work for you, can you please do the following on your Passswordstate web server? 1. On your Passwordstate web server, download this file: Get-Dependencies.ps1 2. Place it in C:\inetpub\Passwordstate\setup\scripts, and overwrite the existing file 3. In Passwordstate, go to Administration -> Powershell Scripts -> Account Discovery Scripts and restore the default Windows Account Dependency script from the Actions Menu: Now try your Discovery Dependency again, does this fix the issue? If it does, we'll include this new script in the next build of Passwordstate we release. Regards, Support
  13. Hello, Passwordstate should work fine with TLS 1.0 and 1.1 disabled – we’ve tested this ourselves, and other customers have disabled these protocols as well. Could you please try the following, on both your Web and Database Servers: 1. Using the following IIS Crypto Tool, click on the ‘Best Practices’ button, then close the application - https://www.nartac.com/Products/IISCrypto/ 2. Follow the instructions again for changing the registry keys, as IIS Crypto may have updated them. You can refer to this document for that https://support.microsoft.com/en-au/help/3135244/tls-1-2-support-for-microsoft-sql-server, in the section ‘Frequently Asked Questions’ 3. Now reboot both servers Hopefully this should resolve it for you. Regards Click Studios
  14. Hi Daniel, Thanks for your request. For your Basic Level request, that is possible right now. But for your Complex Level, we will be honest here in saying this is not a feature we will be working on - technically we're not sure how we could even achieve that, and the Agent is not designed to allow traffic through it, only to push/pull traffic from your Passwordstate API. Regards Click Studios
  15. support

    copy-paste in hosts

    Hi everyone, You can copy text in the clipboard to a remote session from your local PC, and from the remote session back to your local PC, but the same cannot be done for files. Files can only go one way, which is from local PC to the Remote Session. If Spark are ever able to include this feature, we will implement it in our software and notify all users in this thread, plus in our changelog. Regards, Support
×