Come join our live training webinar every other Wednesday at 11am PST and hear LogicMonitor experts explain best practices and answer common questions. We understand these are uncertain times, and we are here to help!
LogicMonitor stores sensitive information including credentials, secrets, etc., for hosts, devices, services. LogicMonitor also offers integration with Credential Vault and provides better control over credentials management to users using their own Credential Vault. The LogicMonitor Collector provides the integration with Thycotic as a Credential Vault solution. For more information, see Thycotic documentation.
The Thycotic Secret Server publishes REST API to manage various entities. For more information, see https://docs.thycotic.com/ss/10.9.0/api-scripting/rest-api-reference-download.
The Secret Server (SS) REST API guides are version-specific. Please ensure you refer to the correct version Secret Server guide.
The LM Thycotic Secret Server integration uses the OAuth2 token-based REST API of the Thycotic Secret Server. In this approach, you receive the OAuth2 token for authentication, which is used to perform the various entity operations of the Thycotic Secret Server.
The below table contains the collector agent configuration related to the vault.
Vault properties, such as Vault Metadata and Vault Keys for the Collector, can be configured at the device or device group level.
The following table lists the Vault Metadata properties.
Vault keys need to be specified at the device level with the suffix .lmvault. For example, ssh.user information should have the key specified as ssh.user.lmvault.
In This Article