KeyControl Vault User Accounts

There are two types of KeyControl Vault user accounts:

  • KeyControl Vault-managed user accounts. These are individual accounts created and administered locally in KeyControl Vault. A KeyControl Vault-managed account can be authenticated locally (with a password stored in KeyControl Vault) or externally (with a password stored in an LDAP server), and it can have any combination of the available user roles: Security Admin, Domain Admin, and Cloud Admin. These three user roles and their privileges are described below.

    With KeyControl Vault-managed accounts, a KeyControl Vault Security Admin should create one user account for each person who needs access to KeyControl Vault, being careful to assign each account the appropriate user roles and access rights.

  • Active Directory (AD)-managed user accounts. Unlike KeyControl Vault-managed accounts where you have to create one account for each KeyControl Vault user, AD-managed users are granted access at the AD Security group level. When a KeyControl Vault Security Admin creates a Cloud Admin Group, they can assign one or more AD Security groups to that Cloud Admin Group. When they do so, every individual in every explicitly-named AD Security group is automatically granted Cloud Admin access to KeyControl Vault. (For more information, see Considerations When Using AD Security Groups.)

    AD Security groups can only be associated with a Cloud Admin Group, and the only available user role for an AD-managed user account is Cloud Admin. This means you cannot use an AD group to specify users that need Security Admin or Domain Admin access to KeyControl Vault. Those users must have their own KeyControl Vault-managed user account.

By default, the KeyControl Vault installer creates the KeyControl Vault-managed user account secroot, which is automatically assigned all three user roles and placed in the default Cloud Admin Group. You can change the password and group membership for secroot, but you cannot delete the account or change its assigned Security Admin user role. We recommend you only give the secroot password to a very small number of administrators who need root-level access. If you need to change the secroot password, see Resetting the secroot Account Password.