Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


Sarge last won the day on July 5

Sarge had the most liked content!

About Sarge

  • Rank
    Senior Member

Recent Profile Visitors

960 profile views
  1. Sarge

    Secure the Notes Field

    Agreed. Notes being encrypted makes searching more difficult.
  2. Sarge

    Upgrade Process

    Ah beautiful, didn't know that existed Thanks!
  3. Sarge

    Upgrade Process

    Hi Guys, Whats the process for upgrading Passwordstate, when there are 2 * Application Servers, 2 * Self Destruct Servers, 2 * Reset portals & 1 * Gateway server? What needs to be upgraded first? 2 * Database Servers One per datacenter, Active/Cold with automatic failover. 2 * Application Servers One per datacenter, presented through load balancers to distribute traffic evenly and provide Active/Active HA services. 2 * Self Destruct Servers One per datacenter, presented through load balancers, all traffic routed to node 1, only routed to node 2 if node 1 is offline. Providing active/cold services. 2 * Reset portals. One per datacenter, presented through load balancers to distribute traffic evenly and provide Active/Active HA services. 1 * Gateway Server In primary datacenter
  4. Sarge

    Self Destruct in High Availability

    No, the self-destruct message data is stored in a SQLLite database on the Self-Destruct web server, Passwordstate web server pushes data to it. If you round robin to two nodes (or more), one of them will get the data (say, self-destruct server1) , while the one the user hits to access the data (self-destruct server2) won't have it. All self-destruct data needs to go to a single node, hence why an Active/Cold setup works.
  5. Sarge

    Self Destruct in High Availability

    Sort of, if you have the load balancers capable of doing it. Self Destruct uses its own SQL-Lite database where it stores the shared messages/credentials pushed to it by the main Passwordstate website. We have our Self Destruct web sites installed on the same web nodes as Passwordstate, bound to a seperate IP address. Our load balancers then direct all traffic for the self destruct HA URL to node 1 unless that node is offline. This way the self destruct messages are always available until the node is offline. It's HA in an Active/Cold configuration. In a disaster we still maintain our Self Destruct capabilities - we just have to re-create self destruct messages since the load balancers will instead be redirecting self destruct traffic to node 2. SQL-Lite supports replication, so hopefully in a future build there is Active/Active support for self destruct. The same Active/Cold setup can be achieved with the browser based gateway, and in theory the reset portal - but I'm still working on the reset portal HA.
  6. This request seems akin to a "CREATOR OWNER" equivalent setting, where the user creating the list can control it - which can already be achieved with the following administrative setting "When a new Shared Password List is created, apply the following permission to the user who created the list:"
  7. Sarge

    Security Admin access to Hosts Folders

    Access can be gained via Administration > Password Folders.
  8. Agreed. I think this goes right down to the password resets as well. Install WSL on Server 2016/2019 and use the native tools for running the scripts rather than modules (IE: Posh-SSH etc)
  9. Sarge

    Offline Access

  10. Sarge

    Duo - auto-push notifications

    Same for the Google Auth 2FA. The Microsoft Authenticator app supports push notifications, just needs to be implemented on Passwordstate end.
  11. Check that this is actually occurring. For the "Passwordstate" and "Passwordstate-Gateway" service. Majority of the time I do an IPU the service for Passwordstate doesn't actually stop, so I manually stop it and carry on with the upgrade - I've not performed an upgrade since having the gateway in place, so can't confirm if it occurs with the Passwordstate-Gateway service as well.
  12. Sarge

    New Team Lead (Admin rights needed)

    That would depend on how Passwordstate has been configured in your environment. If all password list permissions are linked to a password list template then it would be as simple as adjusting the permissions on the password list template to include your user group (and/or user account). You can also navigate to Administration > Password Lists. From here you can use the drop down menu next to each password list to view, and assign permissions (Assuming permissions aren't linked to a password list template). Whoever configured the application may also have granted the first account created during the OOBE access to all passwords.
  13. Ideally yes. It should be an option at setup - If you plan to run in HA, would you rather status 200 and dynamic pages, or 503 and static pages? If the user chooses 503 and static pages, then your setup installer would configure the attached. If the user chooses 200 and dynamic pages, then leave it as it currently is. How this could be retrofitted to existing installs I'm not sure.