Skip to content

Commit 7f513cf

Browse files
Password Secure: Release 26.3.100 (#552)
* Add upcoming version * Removed references to Safari extension * Updated links to the most recent Safari extension of old versions * Moved Password Secure to Identity category Co-authored-by: PSR-SSM <sascha.martens@netwrix.com> * Add new versioning scheme explanation * Fixed Vale linter warning * Fix linting warnings as well as title and description * Implemented final version number * Added adv security note to master key mode usage * Most recent version is now labeled as 'Current' * Slightly adjustments to the 'Managing users' topic Co-authored-by: PSR-SSM <sascha.martens@netwrix.com> * Fix wrong links * Fix links again --------- Co-authored-by: PSR-SSM <sascha.martens@netwrix.com>
1 parent 75a3abd commit 7f513cf

323 files changed

Lines changed: 14522 additions & 126 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.github/ISSUE_TEMPLATE/contend_add.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ body:
4747
- Password Secure 9.1
4848
- Password Secure 9.2
4949
- Password Secure 9.3
50+
- Password Secure 26.3
5051
- PingCastle
5152
- Platform Governance for NetSuite
5253
- Platform Governance Flashlight for NetSuite

.github/ISSUE_TEMPLATE/content_fix.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ body:
6464
- Password Secure 9.1
6565
- Password Secure 9.2
6666
- Password Secure 9.3
67+
- Password Secure 26.3
6768
- PingCastle
6869
- Platform Governance for NetSuite
6970
- Platform Governance Flashlight for NetSuite

docs/passwordsecure/9.1/configuration/advancedview/mainmenufc/extras/image_manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ All logos and icons are managed in the image management. They can then be linked
1212
corresponding data records. The images are then displayed in the Basic view as well as in the list
1313
view of the client.
1414

15-
![Icon/logos in NPS](/images/passwordsecure/9.1/configuration/advanced_view/mainmenu/extras/image_management/installation_with_parameters_106-en.webp)
15+
![Icon/logos in NPWS](/images/passwordsecure/9.1/configuration/advanced_view/mainmenu/extras/image_management/installation_with_parameters_106-en.webp)
1616

1717
## Relevant rights
1818

docs/passwordsecure/9.1/configuration/basicview/start_and_login_basic_view.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ There are 2 possibilities here:
2626

2727
1. username like the local user (e.g. administrator)
2828

29-
2. domain and username (e.g. nps\administrator)
29+
2. domain and username (e.g. npws\administrator)
3030

3131
![image4](/images/passwordsecure/9.1/configuration/basic_view/start_and_login/image4.webp)
3232

docs/passwordsecure/9.1/configuration/sdkapi/migration_guide.md

Lines changed: 33 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,60 +1,53 @@
11
---
2-
title: "migration_guide"
3-
description: "migration_guide"
2+
title: "Migration guide"
3+
description: "Migration guide"
44
sidebar_position: 10
55
---
66

7-
## Migration Guide: Breaking Changes - API Login
7+
## Breaking Changes - API Login
88

9-
Overview: We've enhanced the login authentication process to offer a more dynamic and secure
9+
Overview: The login authentication process was enhanced to offer a more dynamic and secure
1010
experience. This update introduces a new method of authentication, effective for servers from
1111
version 8.12 onward.
1212

13-
:::warning
14-
Important Update: Starting from server version 9.0, the previous login method will no
15-
longer be functional. Users must adopt the new authentication approach provided in our API to
13+
**CAUTION:** Important Update: Starting from server version 9.0, the previous login method will no
14+
longer be functional. Users must adopt the new authentication approach provided in the API to
1615
continue accessing the services.
17-
:::
1816

17+
#### Why the change was done
1918

20-
#### Why was this change done?
21-
22-
Since version 8.12, our server and clients are supporting authentication methods other than
23-
passwords. Therefore, we have introduced a two-step authentication in our server and our clients.
24-
After entering the username, the server is asked for the main factor for the authentication.With the
25-
release of version 8.12, our server and client applications have expanded their support for
19+
Since version 8.12, the Password Secure server and clients are supporting authentication methods other than
20+
passwords. Therefore, a two-step authentication was introduced in the server and the clients.
21+
After entering the username, the server asks for the main factor for the authentication. With the
22+
release of version 8.12, the server and client applications have expanded their support for
2623
authentication methods beyond traditional passwords. Consequently, to enhance security, a two-step
27-
authentication process has been introduced within both our server and client environments. This
24+
authentication process has been introduced within both the server and client environments. This
2825
process entails the user inputting their username, followed by a request to the server for the
29-
primary authentication factor. Notably, this change was not initially implemented in our APIs.
26+
primary authentication factor. Notably, this change wasn't initially implemented in the APIs.
3027

31-
To align our systems with enhanced security standards, we have undertaken the implementation of the
32-
new PBKDF2 hashing iteration count. As part of this transition, we have made the strategic decision
33-
to discontinue the use of the old authentication endpoint. Subsequently, we have diligently
34-
integrated the new authentication mechanism into our APIs to ensure a consistent and secure user
35-
experience.
28+
To align the systems with enhanced security standards, the implementation of the new PBKDF2 hashing
29+
iteration count was done. As part of this transition, the strategic decision
30+
to discontinue the use of the old authentication endpoint was made. Subsequently, the new authentication
31+
mechanism was integrated into the APIs to ensure a consistent and secure user experience.
3632

3733
Transition details:
3834

3935
- **Old Method Deprecation**: The previous login method is deprecated and no longer operational with
4036
servers of version 9.0.
41-
- **New Authentication Requirement:** To access our services, users must switch to the updated
42-
authentication method in our APIs, compatible with servers from version 8.12 onward. Versions
37+
- **New Authentication Requirement:** To access Password Secure services, users must switch to the updated
38+
authentication method in the APIs, compatible with servers from version 8.12 onward. Versions
4339
older than 8.12 are no longer operational with the API. If you're using such an old version,
44-
please use the old API.
40+
use the old API.
4541

46-
:::warning
47-
Action Required: Ensure that your server version is 8.12 or later to implement the new
48-
authentication method and seamlessly access our services. Update your integration with the API to
42+
**CAUTION:** Action Required: Ensure that your server version is 8.12 or later to implement the new
43+
authentication method and access the services. Update your integration with the API to
4944
incorporate the revised login interface and maintain uninterrupted service access.
50-
:::
51-
5245

5346
Below are code examples for the previous and updated authentication methods.
5447

5548
#### C#
5649

57-
**Previous authentication method (deprecated)**
50+
Previous authentication method (deprecated)
5851

5952
```
6053
var database = "your-database";
@@ -75,7 +68,7 @@ while (mfaRequest != null) {
7568
}
7669
```
7770

78-
**New authentication method (required for version 9.0 onwards)**
71+
New authentication method (required for version 9.0 onwards)
7972

8073
```
8174
var database = "your-database";
@@ -97,7 +90,7 @@ while (!authenticationFlow.IsAuthenticated) {
9790

9891
#### JavaScript
9992

100-
**Previous authentication method (deprecated)**
93+
Previous authentication method (deprecated)
10194

10295
```
10396
const database = 'your-database'
@@ -113,7 +106,7 @@ while (mfaRequest) {
113106
}
114107
```
115108

116-
**New authentication method (required for version 9.0 onwards)**
109+
New authentication method (required for version 9.0 onwards)
117110

118111
```
119112
const database = 'your-database'
@@ -135,11 +128,11 @@ while (!psrApi.authenticationManagerV2.isAuthenticated) {
135128

136129
The API object is created as always: by passing the server address to the constructor.
137130

138-
After that, the implementation differs slightly between C# and JavaScript. For C#, we’re getting the
139-
authentication flow via **psrApi.AuthenticationManagerV2.StartNewAuthentication("your-database",
131+
After that, the implementation differs slightly between C# and JavaScript. For C#, the authentication flow
132+
can be accessed via **psrApi.AuthenticationManagerV2.StartNewAuthentication("your-database",
140133
"your-username");**. On the resulting instance, the asynchronous method **StartLogin()** needs to be
141-
called and awaited. Using the JavaScript API, we can directly call and await the
142-
**psrApi.authenticationManagerV2.startLogin('your-database', 'your-username)** method.
134+
called and awaited. Using the JavaScript API, the **psrApi.authenticationManagerV2.startLogin('your-database', 'your-username)**
135+
method can be called directly.
143136

144137
After this, you must call the **GetNextRequirement()** method. The result contains the requirements
145138
the user has to fill in. It usually contains a “Fields“ list, where the “Value” needs to be set. The
@@ -156,7 +149,7 @@ in the fields, and send the requirement via **authenticate** method.
156149
As soon as the authentication is completed, the **psrApi.authenticationManagerV2.isAuthenticated**
157150
property is set to true.
158151

159-
For any queries or assistance in transitioning to the new authentication method, please refer to our
160-
updated documentation or reach out to our support team.
152+
For any queries or assistance in transitioning to the new authentication method, refer to the
153+
updated documentation or reach out to the support team.
161154

162-
Thank you for your cooperation as we continue to improve security and usability within our API.
155+
Thank you for your cooperation in continuing improving security and usability within the API.

docs/passwordsecure/9.1/configuration/servermanger/certificates/nps_server_encryption_certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sidebar_position: 60
99
With the update to the version 8.16.0 the Netwrix Password Secure Server Encryption Certificate will
1010
be added automatically.
1111

12-
![NPS Server Encryption](/images/passwordsecure/9.1/configuration/server_manager/certificates/nps-server-encryption_1014x771.webp)
12+
![NPWS Server Encryption](/images/passwordsecure/9.1/configuration/server_manager/certificates/nps-server-encryption_1014x771.webp)
1313

1414
This certificate is important if you will activate an offline license. In future there will be more
1515
features for which this certificate is relevant.

docs/passwordsecure/9.1/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ this challenge in private settings. In a large corporate environment, adequately
1313

1414
## Scalability
1515

16-
The scalability of Netwrix Password Secure (NPS) makes it suitable for use in SMEs, large
16+
The scalability of Netwrix Password Secure (NPWS) makes it suitable for use in SMEs, large
1717
companies, and global corporations. The flexibility required for this task is the driving factor
1818
behind the development to meet the ever-changing requirements of modern and safety-conscious
19-
companies. NPS is a software solution for companies that want to effectively manage
19+
companies. It's is a software solution for companies that want to effectively manage
2020
security-relevant data such as passwords, documents, or certificates at a very high encryption
2121
level.

docs/passwordsecure/9.1/installation/installationbrowseraddon/safari.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sidebar_position: 40
99
## Installing the add-on
1010

1111
The Safari Add-on can be downloaded from the following link:
12-
[Add-on Safari](https://download.passwordsafe.de/v9/Netwrix_Password_Secure-9.0.3.dmg).
12+
[Add-on Safari](https://download.passwordsafe.de/v9/Netwrix_Password_Secure-9.1.3.dmg).
1313

1414
To install it, simply double-click on the downloaded file. A window will open where you then only
1515
need to drag and drop the Netwrix Password Secure logo onto the applications.

docs/passwordsecure/9.2/configuration/basicview/start_and_login_basic_view.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ There are 2 possibilities here:
2626

2727
1. username like the local user (e.g. administrator)
2828

29-
2. domain and username (e.g. nps\administrator)
29+
2. domain and username (e.g. npws\administrator)
3030

3131
![image4](/images/passwordsecure/9.2/configuration/basic_view/start_and_login/image4.webp)
3232

docs/passwordsecure/9.2/configuration/sdkapi/migration_guide.md

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,47 +1,46 @@
11
---
2-
title: "migration_guide"
3-
description: "migration_guide"
2+
title: "Migration guide"
3+
description: "Migration guide"
44
sidebar_position: 10
55
---
66

7-
## Migration Guide: Breaking Changes - API Login
7+
## Breaking Changes - API Login
88

9-
Overview: We've enhanced the login authentication process to offer a more dynamic and secure
9+
Overview: The login authentication process was enhanced to offer a more dynamic and secure
1010
experience. This update introduces a new method of authentication, effective for servers from
1111
version 8.12 onward.
1212

1313
**CAUTION:** Important Update: Starting from server version 9.0, the previous login method will no
14-
longer be functional. Users must adopt the new authentication approach provided in our API to
14+
longer be functional. Users must adopt the new authentication approach provided in the API to
1515
continue accessing the services.
1616

17-
#### Why was this change done?
17+
#### Why the change was done
1818

19-
Since version 8.12, our server and clients are supporting authentication methods other than
20-
passwords. Therefore, we have introduced a two-step authentication in our server and our clients.
21-
After entering the username, the server is asked for the main factor for the authentication.With the
22-
release of version 8.12, our server and client applications have expanded their support for
19+
Since version 8.12, the Password Secure server and clients are supporting authentication methods other than
20+
passwords. Therefore, a two-step authentication was introduced in the server and the clients.
21+
After entering the username, the server asks for the main factor for the authentication. With the
22+
release of version 8.12, the server and client applications have expanded their support for
2323
authentication methods beyond traditional passwords. Consequently, to enhance security, a two-step
24-
authentication process has been introduced within both our server and client environments. This
24+
authentication process has been introduced within both the server and client environments. This
2525
process entails the user inputting their username, followed by a request to the server for the
26-
primary authentication factor. Notably, this change was not initially implemented in our APIs.
26+
primary authentication factor. Notably, this change wasn't initially implemented in the APIs.
2727

28-
To align our systems with enhanced security standards, we have undertaken the implementation of the
29-
new PBKDF2 hashing iteration count. As part of this transition, we have made the strategic decision
30-
to discontinue the use of the old authentication endpoint. Subsequently, we have diligently
31-
integrated the new authentication mechanism into our APIs to ensure a consistent and secure user
32-
experience.
28+
To align the systems with enhanced security standards, the implementation of the new PBKDF2 hashing
29+
iteration count was done. As part of this transition, the strategic decision
30+
to discontinue the use of the old authentication endpoint was made. Subsequently, the new authentication
31+
mechanism was integrated into the APIs to ensure a consistent and secure user experience.
3332

3433
Transition details:
3534

3635
- **Old Method Deprecation**: The previous login method is deprecated and no longer operational with
3736
servers of version 9.0.
38-
- **New Authentication Requirement:** To access our services, users must switch to the updated
39-
authentication method in our APIs, compatible with servers from version 8.12 onward. Versions
37+
- **New Authentication Requirement:** To access Password Secure services, users must switch to the updated
38+
authentication method in the APIs, compatible with servers from version 8.12 onward. Versions
4039
older than 8.12 are no longer operational with the API. If you're using such an old version,
41-
please use the old API.
40+
use the old API.
4241

4342
**CAUTION:** Action Required: Ensure that your server version is 8.12 or later to implement the new
44-
authentication method and seamlessly access our services. Update your integration with the API to
43+
authentication method and access the services. Update your integration with the API to
4544
incorporate the revised login interface and maintain uninterrupted service access.
4645

4746
Below are code examples for the previous and updated authentication methods.
@@ -129,11 +128,11 @@ while (!psrApi.authenticationManagerV2.isAuthenticated) {
129128

130129
The API object is created as always: by passing the server address to the constructor.
131130

132-
After that, the implementation differs slightly between C# and JavaScript. For C#, we’re getting the
133-
authentication flow via **psrApi.AuthenticationManagerV2.StartNewAuthentication("your-database",
131+
After that, the implementation differs slightly between C# and JavaScript. For C#, the authentication flow
132+
can be accessed via **psrApi.AuthenticationManagerV2.StartNewAuthentication("your-database",
134133
"your-username");**. On the resulting instance, the asynchronous method **StartLogin()** needs to be
135-
called and awaited. Using the JavaScript API, we can directly call and await the
136-
**psrApi.authenticationManagerV2.startLogin('your-database', 'your-username)** method.
134+
called and awaited. Using the JavaScript API, the **psrApi.authenticationManagerV2.startLogin('your-database', 'your-username)**
135+
method can be called directly.
137136

138137
After this, you must call the **GetNextRequirement()** method. The result contains the requirements
139138
the user has to fill in. It usually contains a “Fields“ list, where the “Value” needs to be set. The
@@ -150,7 +149,7 @@ in the fields, and send the requirement via **authenticate** method.
150149
As soon as the authentication is completed, the **psrApi.authenticationManagerV2.isAuthenticated**
151150
property is set to true.
152151

153-
For any queries or assistance in transitioning to the new authentication method, please refer to our
154-
updated documentation or reach out to our support team.
152+
For any queries or assistance in transitioning to the new authentication method, refer to the
153+
updated documentation or reach out to the support team.
155154

156-
Thank you for your cooperation as we continue to improve security and usability within our API.
155+
Thank you for your cooperation in continuing improving security and usability within the API.

0 commit comments

Comments
 (0)