Skip to main content

Credential Manager end user guide - Help business users protect your organization

  • June 27, 2025
  • 1 reply
  • 79 views
Credential Manager end user guide - Help business users protect your organization

You know the feeling: Business applications house sensitive data and critical functions — and they’re often accessed by non-IT staff. These business users may not have domain admin rights, but they often have access to privileged accounts that introduce significant risk. 

 

The Problem: Risky password practices put accounts at Risk 

Most business users aren’t trained to manage credentials securely. They reuse passwords, save them in browsers, rely on Post-It notes, or use consumer-grade password tools — all outside IT’s control. 😱  

  • No enforcement of password complexity, rotation, or MFA 
  • No visibility for audits or reporting 
  • No integration with enterprise security tools 
  • High user friction leads to low adoption 

 

The Solution: Bring Business Users into your strategy 

With Business User Licenses and the soon-to-be live Credential Manager, business users can access and manage passwords securely with IT oversight and enterprise-grade controls. It's a win-win for all parties: 

  • Easy, safe access: Users secure access to business apps without needing to remember or manage passwords. 
  • Centralized Control: IT and Security teams gain visibility, compliance enforcement, and audit capabilities across all users — not just IT staff. 
  • Smooth user experience: Users will... 
    • Store and manage secrets in a personal folder structure with approval workflows 
    • Access their secrets via Delinea Credential Manager in any browser — no direct login needed 
    • Manage credentials on the go with the Delinea Mobile app 
    • Securely share secrets with full audit trails 

 

When Business Users Use Secret Server, Everyone Wins 

But how do we get them on board?! 

Delinea put together this customizable one-pager for those of you planning to roll out Credential Manager in your organization when it’s GA later this quarter. Buy in is all about communication, and security is often about buy in.  

We hope it helps and would love to hear: how are you involving your business users in your security strategy today? 

1 reply

  • Sr. PAM Security Engineer - PAM Team Lead
  • June 27, 2025

Does this rely on the absolutely horrible out-of-box implementation of Personal Folders or can it utilize much improved home-grown solutions?