Skip to main content
Sticky

Monthly Buzz - April - Password Safe

  • April 30, 2026
  • 0 replies
  • 23 views

Closing the Agent Credential Gap with Password Safe

 

As AI agents proliferate inside ServiceNow workflows, they inevitably need credentials to query systems, authenticate to APIs, retrieve data. Storing these credentials statically creates serious risk as over-privileged secrets become attractive targets.

BeyondTrust Password Safe solves this by acting as the secure credential vault for ServiceNow AI agents at runtime.

Through the ServiceNow Integration Hub spoke for Password Safe, ServiceNow workflows, and sub-flows, AI agents can check out privileged credentials dynamically at the moment they're needed, under full audit control, and with automatic check-in and rotation afterward:

  • Dynamic Credential Checkout: AI agents never hold static credentials. Every checkout is logged and time bound.

  • Full Audit Trail: Every access is tied to an approval workflow if required, while Password Safe ensures complete session management for machine-initiated access.

  • Rotation by Default: Credentials are automatically rotated after checkout, eliminating long-lived secrets in automation workflows.

Read More Here

 

Customer Case Study
ivision: How ivision Simplifies and Scales Identity Security with BeyondTrust

 

Latest Available Version
Password Safe Mobile App 1.4.0 - March 2026
BeyondInsight and Password Safe 26.1.0.878 release notes - April 2026
Password Safe Cloud Resource Broker 26.1.24.1 release notes - April 2026

 

Beekeepers Hot Topics
 

Synced Accounts from Different Systems
 

Greetings all

I have a developer who is using AWS Secrets Manager for his code. However, he is passing the username and password from Active Directory over to the secret in AWS Secrets Manager and calling that JSON from Secrets Manager.Ideally, yes, he should be calling it from BT and not AWS Secrets Manager but that would involve a lot of code rewrite for him on a production system.We are looking at adding the secret in Secrets Manager as a synced account with the service account so that when we rotate the password on the service account, it would also rotate the password on the AWS Secrets Manager secret to the same password.What he needs though, complicates it. He is storing this in his AWS secret {"binddn":"cn=ldapauth_account,OU=Service,OU=Accounts,OU=company,DC=domain,DC=com","password":"abcabc"}

When BT rotates the password on the service account in AD, it writes the password to the secret in AWS wiping out everything so he ends up with something like newpassword instead of the whole line including the service account DN. Anybody know of a way to work around this? He really needs the whole line and not just the password.
 

Read More Here

Click here for the most popular articles In our Beekeepers Community

 

Upcoming and In Case You Missed It Webinars

 

Road Maps: Password Safe Roadmap - May 7, 2026
The Ghost in the Machine (Securing Non-Human Identities) - May 19, 2026
Webinar: AI: Is there a Single Source of Truth Anymore?

This topic has been closed for replies.