Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by support

  1. Hello thoward, This information is in our manuals for version 8, but possibly not for version 7 - which is the forum you've responded to. We have this documentated in the Security Administrators manual, under the section Backups and Upgrades. Regards Click Studios
  2. Hello, We're sorry, but you cannot create any Discovery Jobs via our API(s) - this is only available in the UI. Regards Click Studios
  3. Hello Raymix, Yes, we have support for returning passwords as a hash. If you go to the Web API Documentation menu under the Help Menu, you will see the section below which explains what's required here. We hope this helps. Regards Click Studios
  4. Hi Everyone, Today we have release build 8900, which includes 10 new updates, and 6 bug fixes. Full changelog can be found here - https://www.clickstudios.com.au/passwordstate-changelog.aspx. Regards Click Studios
  5. Thanks - and you can also export your Password Lists from this screen to csv, at that export also invcludes the password count. Regards Click Studios
  6. Hello Emad, If you go to the screen Administration -> Password Lists, there is a 'Passwords' column here that you can sort on. I hope this helps. Regards Click Studios
  7. Hi damcoole, Yes, if you have cloned our script, then you will be fine for furture upgrades Since this appears to be a workgroup computer, can you have a look at section '12 Account Discovery and Password Resets between Non-Trusted Active Directory Domains, or against Workgroup Computers' - in the following document - https://www.clickstudios.com.au/downloads/version8/Password_Discovery_Reset_and_Validation_Requirements.pdf We would recommend rebooting after making this change. Regards Click Studios
  8. Hello i2Paq, Could you please share a screenshot of the Host record so we can see the additional paramaters, and can you please translate that error for us? Regards Click Studios
  9. Hello damcole, This should not be required, as I did not need to do this in our environment. If we ever update this script, it will overwrite the change you made, so can you please answer the following questions to see if we can figure this out: What Build Number of Passwordstate are you using? Could you possibly let me know what the error is in the recent activity, when your Password Reset fails? I wonder if you could also change the Host name of win10vm in passwordstate to a IP Address instead ? Regards Click Studios
  10. Hi Damcoole, I've had a look at this today, and I've set up the same sort of environment you have but was able to get it working ok with the need to prepend the .\ to the username on the Privileged Accounts screen. I was able to link the privileged account to its own password record as well, and I even used that account to reset not only itself, but also another user on the same machine several times. Could you possibly let me know what the error is in the recent activity, when your Password Reset fails? I wonder if you could also change the Host name of win10vm in passwordstate to a IP Address instead? You shouldn't need to do this but I'm wondering if Passwordstate is having an issue resolving the win10vm host name for any reason? Regards, Support
  11. Hi Jack, As a Security Administrator, you can go to the screen Administration -> User Accounts, edit the user's account, and clear their Yubikey settings. When they next attempt to authenticate, it will prompt them to create new Yubikey settings. We hope this helps. Regards Click Studios
  12. Hi Greg, If you create a new Password List based off the SSL Certificates template, this allows you to store information about your certificate with an expiry date that you can set. You can also upload the certificate as an attachment to your password record if you like: Now if you set up a scheduled report based on the "What Passwords Are Expiring Soon" report, you will be alerted in advance on a number of days of your choice. Regards, Support
  13. Purpose: Your company may have some very sensitive passwords that you want to be alerted of when they have been used. This forum post will show you how to set up a scheduled report for this, so you will be alerted within 5 minutes of the password being accessed. Password Record Example: See screenshot below for a password record we have set up, but in particular, look for the value in the Description field Setting up the Report: What we'll do now is set up a Scheduled Report, which runs once every 5 minutes. This report will not send off an email if the password has not been viewed, so you will only get an email when needed. You can change the schedule to any time you like, if you don't need to know the password has been viewed within 5 minutes First create a new Scheduled report: When creating the report, give it a Title and a Description if you wish, but importantly make sure you CC in a user or a mailbox of your choice. The report will be sent to yourself but it will also CC in this mailbox. Also ensure you tick the option to not send the report if no results are produced, and choose the report type as "Custom Auditing Report": Now on the Schedule tab, select the report to generate once every 5 minutes And then on the Auditing Settings tab, select the Password List where the password is located, the Activity Type as Password Viewed, query the previous 5 minutes of auditing activity, and finally put in the unique value you set in the Description field on the Password record. That's it! Save the Report, and you'll now be alerted if the password gets viewed within 5 minutes. Regards, Support
  14. Hi Steve, We do not intentionally try and confuse people. We will work in this feature if the community deems it important enough. Regards Click Studios
  15. Thanks Steve. For anyone else reading this request, please refer to the examples API calls for where the API Key can be specified, and we will endevour to be more specific in our documentation. Also, removing API Keys from the querystrings may be problematic, as it will break calls for customers using this method - which is why we provide options if required. Regards Click Studios
  16. Hi Steve, We have no validation for this in the API, and this is by design - we naturally assume customers would not add the same Security Group in more than once, like many other calls in the API. If you need any changes to the API, can we please ask you log a feature request for this. Thanks very muchh. Regards Click Studios
  17. Hi Paul, By default, the entire Passwordstate folder should have Modify NTFS permissions for the NETWORK SERVICE account - this is what we set it to during the install. If you have modified the Application Pools in IIS at all, to use a Managed Service Account, then this account would need access. Regards Click Studios
  18. Hello Paul, It sounds like the encryption key has not been written corrctly to a file, possible due to NTFS permission issues. Can you take the encryption key you see in the screenshot below, and add/edit it in the file C:\inetpub\Passwordstate\selfdestruct\web.config in the "key" section within AppSettings - does this help? Regards Click Studios
  19. Hi Everyone, Today we have release build 8884, which includes 3 new updates, and 5 bug fixes. Full changelog can be found here - https://www.clickstudios.com.au/passwordstate-changelog.aspx. Regards Click Studios
  20. Hi Steve, Just letting you know we've released build 8884, which fixes the issue identified above, and please follow one of the recommended upgrade methods outlined in the following document - https://www.clickstudios.com.au/downloads/version8/Upgrade_Instructions.pdf Thanks again for working with us in resolving this issue - we appreciate it. Regards Click Studios
  21. Hi Steve, Thanks for finding this, and we did not consider blanking the Hosts API Key during our testing. When adding a host, we have a check for a blank key, but we need to add the same check for GET and DELETE. We'll do that for the next release, and also double check all other method calls as well. Thanks for your patience whilst we tried to figure this out. Regards Click Studios
  22. Sometimes, deleting a Password list is made by mistake and once it is gone from the system, there's no way to restore it without restoring a backed up version of your database. If you find yourself in this position, there are two way to get that password list back, both require you to have a backup of your Passwordstate SQL database. 1. Restore a copy of your database to your production server using the restore process on page 255 of this document: https://www.clickstudios.com.au/downloads/version8/Passwordstate_User_Manual.pdf (Warning: This will remove any data and activity in Passwordstate since the date of your last database backup) 2. Restore a copy of your database to a test server, and then manually export the Password List contents from that test server to a csv, and import it back into your Production server. Below is a process on how to do this: Install another copy of Passwordstate on a test server: https://www.clickstudios.com.au/documentation/move-new-web-server.aspx Restore the most recent backup of your Passwordstate database to another SQL server if you have one, otherwise you might need to install SQL Express on your new test server and restore it there: https://www.clickstudios.com.au/documentation/move-new-database-server.aspx Log in to this new website. You will need to enter your Emergency Password as a once off process, which you can get out of your production system (Administration -> Emergency Access) Export the passwords from your Password List to a CSV file. This is performed under the “List Administrator Actions” menu on the Password List, and you should select “All Passwords Report”. (If you are trying to recover another user's Private Password List, please ask them to log in and perform this process) Back in your Production system, import their passwords back in: https://www.youtube.com/watch?v=BeNhem9NFCw If you have any questions about this, please contact Click Studios on support@clickstudios.com.au Regards, Support.
  23. Hi Steve, Can you email at our support address, and we'll organise a remote session if that's ok. Regards, Support
  24. Hi Steve, We've found another editor which doesn't do caching, Passwordstate:) If you go to Administration -> Powershell Scripts -> Validation Scripts, and then add in a new 'blank' script and save it. Now click on the new script to open it up, and paste your code in there, and save it once again. Next use the actions menu of that new script to "Test Script Manually" and upon first execution with the API key set correctly, you will get results as expected. Then clear the results. If you then change the APIKey variable to be $null and rerun the script without shutting the Window down at all, you will get an appropriate error. Can you try this and confirm if you see the same behavior? We've seen Powershell caching variable data previously, and the only way was to close the session and reopen it. Not even clear-variable removed the value from memory. I have also read on forums that it's not ISE or the Powershell console that is the issue, but it's the engine which caches the variable data. Only a tool like Powershell Studio or Passwordstate 100% clear that data each time you run the script. I'm sure there's other tools out there but these are two that we know of, and it's the main reason why we stopped developing in ISE. If you could let us know the results of your tests it would be much appreciated, we don't want other user thinking there is an issue with our API. Regards, Support.
  25. Hi Steve, We demonstrated the caching in the video I.e. change the api key to null, and it still returned results, until we restarted ISE. This is a known issue in ISE, and other editors like Visual Studio code, so please try PowerShell Studio, and let us know if that helps? Regards Click Studios
  • Create New...