-
Posts
5,076 -
Joined
-
Last visited
-
Days Won
317
Reputation Activity
-
support got a reaction from Maurice in Active/Passive in combination with AppServer
Hello Maurice,
If you want High Availability for database connectivity for your App Server, we recommend using either Basic or Always On Availability groups in SQL Server. Then you can point your App Server, to the SQL Listener, just like you would with the core product.
If you do not have Basic or Always On Availability groups, you would need to modify the database connection string for your App Server, and manually change it to your other SQL Database Server - since you do not have any automatic failover for SQL Server.
We hope this helps.
Regards
Click Studios
-
support reacted to Red in Password Reset Script for Fortigates with VDOMs enabled
Hi,
The default script "Reset Fortigate Password" to reset passwords on Fortigate firewalls will fail when virtual domains (VDOMs) are enabled on the device. This is due to the wrong starting environment when connected to the firewall. In this case, one can copy the existing powershell script and replace the lines
if ($PrivilegedAccountUserName -ne '') { $ResetCommands = "config system admin`redit $UserName`rset password $NewPassword`rend`rexit`r" } else { $ResetCommands = "config system admin`redit $UserName`rset password $NewPassword $OldPassword`rend`rexit`r" }
with
if ($PrivilegedAccountUserName -ne '') { $ResetCommands = "config global`rconfig system admin`redit $UserName`rset password $NewPassword`rend`rexit`r" } else { $ResetCommands = "config global`rconfig system admin`redit $UserName`rset password $NewPassword $OldPassword`rend`rexit`r" }
The new commands start with "config global" to change into the global context of the Fortigate. From that point onward, the commands are the same.
Regards,
Red
-
support got a reaction from kingalano in additional field other than username and password
Hi Kingalano,
We have this feature coming soon - in about 2 weeks time
We will support the standard Username and Password fields, plus up to 10 other fields using our Generic Fields on Password Lists, and also OTP form filling as well.
Regards
Click Studios
-
support got a reaction from Phil Cardone in Support for Modern Authentication to help sending emails from Office 365
Links provided to Click Studios from the customer who requested this can be seen below. Microsoft will be dropping support for Basic Authentication late 2022, which is what the current email settings use in Passwordstate:
The full article about the deprecation of basic authentication by Microsoft: Deprecation of Basic authentication in Exchange Online | Microsoft Docs.
They recommend to switch over to OAuth 2.0 authentication or Microsoft Graph API for alle messaging protocols used with Exchange Online Authenticate an IMAP, POP or SMTP connection using OAuth | Microsoft Docs.
Microsoft regards something as basic authentication whenever the authentication credentials are saved on the server/client from which the authentication takes place.
More links on modern authentication:”
Announcing OAuth 2.0 support for IMAP and SMTP AUTH protocols in Exchange Online - Microsoft Tech Community
New resources for moving to Modern Authentication - Microsoft Lifecycle | Microsoft Docs
-
support got a reaction from colombeen in Additional Password List Support in API
A customer has requested the following functionality:
"Would be great to be able to manage\modify and delete password lists via API.". Specifically fields and settings on Password Lists.
Regards
Click Studios
-
support reacted to Beau P. in Revealing a password is slow
So the user is reporting that revealing passwords is fast now after the upgrade. I guess I misunderstood their issue. They are now saying that opening an individual password entry (not a list) to edit it is what was taking 12 seconds. I had them only show 20 entries on the list and it cut the time down to about 5 seconds. I had them check on a list with fewer than 10 entries and it took about 2.5 seconds to pull up the edit screen.
They say the times are reasonable for them now.
-
support got a reaction from Goossens in List Permissions in API
We would like to be able to extract a list of individual password permissions via API. Right now, we can only add/update/delete, but not get the current permissions.
This would be a great help in our work to automate permissions handling via active directory for thousands of service accounts and similar if we were able to also get any current permissions.
Perhaps, it could be included as part of the data that's returned by the 'Retrieving a password' function, as a nested array. If we use the example in your API documentation, it could look something like this (See bold text at bottom):
GET 'https://passwordstate/winapi/passwords/46411'
# Response
HTTP/1.1 200
[
{
"PasswordID": 46411,
"Title": "forum4",
"Domain": "",
"HostName": "",
"UserName": "login2",
"Description": "My login to forum4",
"GenericField1": "loginasa",
"GenericField2": "",
"GenericField3": "",
"GenericField4": "",
"GenericField5": "",
"GenericField6": "",
"GenericField7": "",
"GenericField8": "",
"GenericField9": "",
"GenericField10": "",
"GenericFieldInfo": [
{
"GenericFieldID": "GenericField1",
"DisplayName": "Pin Number",
"Value": "0000"
},
{
"GenericFieldID": "GenericField2",
"DisplayName": "Surname",
"Value": "Reznor"
}
],
"AccountTypeID": 0,
"Notes": "",
"URL": "http://www.microsoft.com",
"Password": "ZHn#3+A^yc",
"ExpiryDate": "23/08/2012",
"AllowExport": true,
"AccountType": "",
"OTP": "",
"Permissions": [
{
"UserID": "domain\\User1",
"Permission": "M"
},
{
"UserID": "domain\\User2",
"Permission": "V"
}
]
}
]
-
support got a reaction from BuckSwish in Is there a way to mask the generated password when updating expired password
Hi BuckSwish,
Unfortunately we do not have a feature for hiding the value of the password like that, but you're welcome to log a feature request for this, so we can inevstigate if it's possible i.e. hide the Copy button, and see if the Apply button works when password is masked.
Regards
Click Studios
-
support got a reaction from BuckSwish in Extension Password Doesn't use ID for input
Hello,
I was using the Chrome browser, and below is a screenshot of it form filling - using the settings above.
Regards
Click Studios
-
support got a reaction from BuckSwish in Extension Password Doesn't use ID for input
Hello,
We also look at the Name tag on Input elements, so if you configure your password record like below, it should form fill - it does for us.
Regards
Click Studios
-
support got a reaction from Joerg Lang in Support for Modern Authentication to help sending emails from Office 365
Links provided to Click Studios from the customer who requested this can be seen below. Microsoft will be dropping support for Basic Authentication late 2022, which is what the current email settings use in Passwordstate:
The full article about the deprecation of basic authentication by Microsoft: Deprecation of Basic authentication in Exchange Online | Microsoft Docs.
They recommend to switch over to OAuth 2.0 authentication or Microsoft Graph API for alle messaging protocols used with Exchange Online Authenticate an IMAP, POP or SMTP connection using OAuth | Microsoft Docs.
Microsoft regards something as basic authentication whenever the authentication credentials are saved on the server/client from which the authentication takes place.
More links on modern authentication:”
Announcing OAuth 2.0 support for IMAP and SMTP AUTH protocols in Exchange Online - Microsoft Tech Community
New resources for moving to Modern Authentication - Microsoft Lifecycle | Microsoft Docs
-
support got a reaction from ZOOM in Separate Copy or Email Permalink into two options
It would be great to split „copy or email permalink“ into 2 options. Copy permalink will be much better to have directly in drop down on password item to copy permalink on „one click“ instead of opening new window, copying it and than closing window.
-
support got a reaction from Kris in Migrate v8 (built 8180) from old to new server
Hi Kris,
Yes sorry, your instructions above are excellent. You also need to ensure you have an active maintenance contract with your software before upgrading, unless you are using the free 5 user version.
Regards
Click Studios
-
support got a reaction from Kris in Migrate v8 (built 8180) from old to new server
Hi Kris,
As long as you have .NET Framework 4.5 installed on your Server 2008 machine, you can upgrade to build 8995. If you prefer, you can build a new server with build 8995 on it, and perform your move - you will then be prompted to upgrade your database. This might be less risk for you, as you can restore your DB over and over again if needed, and leave your productions system alone whilst you test the migration.
Regards
Click Studios
-
support got a reaction from Philipp in Recycle Bin Options
Hello all- just letting you know we've released build 9400 today, with this feature enabled.
You need to go to the screen Administration -> System Settings -> Passwords Options tab, and enable the feature though.
Regards
Click Studios
-
support got a reaction from Andrew G in Passwordstate Browser Extension Issue
Hi Andrew,
You must have one or more Password Lists configured in Passwordstate, that has the URL field selected for use. Please edit the properties of your Password Lists to select this field.
Regards
Click Studios
-
support got a reaction from Dave K. in Support for Modern Authentication to help sending emails from Office 365
Links provided to Click Studios from the customer who requested this can be seen below. Microsoft will be dropping support for Basic Authentication late 2022, which is what the current email settings use in Passwordstate:
The full article about the deprecation of basic authentication by Microsoft: Deprecation of Basic authentication in Exchange Online | Microsoft Docs.
They recommend to switch over to OAuth 2.0 authentication or Microsoft Graph API for alle messaging protocols used with Exchange Online Authenticate an IMAP, POP or SMTP connection using OAuth | Microsoft Docs.
Microsoft regards something as basic authentication whenever the authentication credentials are saved on the server/client from which the authentication takes place.
More links on modern authentication:”
Announcing OAuth 2.0 support for IMAP and SMTP AUTH protocols in Exchange Online - Microsoft Tech Community
New resources for moving to Modern Authentication - Microsoft Lifecycle | Microsoft Docs
-
support got a reaction from VincentB in Allow user to select folder to place a newly created folder structure into, instead of Passwords Home.
By default, a newly created folder clone will go into the root of home. This request will give the user an option to choose an existing folder to place the cloned folder into.
-
support got a reaction from Robk in Request to purge Recycle Bin data after xxx time
Hello Robk - just letting you know we've released build 9400 today, with this feature enabled.
You need to go to the screen Administration -> System Settings -> Passwords Options tab, and enable the feature though.
Regards
Click Studios
-
support got a reaction from Tom Bosley in Log4Shell vulnerability (CVE-2021-44228)
We've also added a little more detail to the social media posts today - https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/
Regards
Click Studios
-
support got a reaction from BuckSwish in Need to Share Password List but not allow the shared users to see passwords
Hello BuckSwish.
If you edit the properties of the Password List, the setting you see below should help with this.
Regards
Click Studios
-
support got a reaction from SZU in Track Self Destruct Messages Failed Logins via IP Address
We've had a request for the following for the Self Destruct Message web site:
Add auditing for failed PassPhrase login attempts Track failed Passphrase login attempts by IP, and lock the user out when they reach the Brute Force login threshhold. The Admin would then need to unblock this IP Address, just like in the main UI.
These changes would provide an additional layer of security, on top of:
Brute Force Lockouts via Session tracking Guessing the URL of the Self Destruct Message web site Guessing the randomly generated 32 character Self Destruct ID, needed to view the message
Regards
Click Studios
-
support got a reaction from Magnus in Track Self Destruct Messages Failed Logins via IP Address
We've had a request for the following for the Self Destruct Message web site:
Add auditing for failed PassPhrase login attempts Track failed Passphrase login attempts by IP, and lock the user out when they reach the Brute Force login threshhold. The Admin would then need to unblock this IP Address, just like in the main UI.
These changes would provide an additional layer of security, on top of:
Brute Force Lockouts via Session tracking Guessing the URL of the Self Destruct Message web site Guessing the randomly generated 32 character Self Destruct ID, needed to view the message
Regards
Click Studios
-
support got a reaction from Mika in Track Self Destruct Messages Failed Logins via IP Address
We've had a request for the following for the Self Destruct Message web site:
Add auditing for failed PassPhrase login attempts Track failed Passphrase login attempts by IP, and lock the user out when they reach the Brute Force login threshhold. The Admin would then need to unblock this IP Address, just like in the main UI.
These changes would provide an additional layer of security, on top of:
Brute Force Lockouts via Session tracking Guessing the URL of the Self Destruct Message web site Guessing the randomly generated 32 character Self Destruct ID, needed to view the message
Regards
Click Studios
-
support got a reaction from Flash in Deactivating "Disable Inheritance" does not set correct permissions
Hello,
We can confirm that turning off the 'Disable Inherittance' setting on a Password List, does not change permissions on the Password List at all. You then need to modify permissions on upper-level folders, if you want to modify permissions on the Lists nested beneath it.
We hope this claeifies.
Regards
Click Studios