Skip to main content

Whiteboard Notes: Understanding PasswordSafe User Provisioning with Smart Group nuance

  • October 10, 2025
  • 2 replies
  • 85 views

tclowater
BeyondTrust Employee

Common challenges with PasswordSafe User Provisioning comes down to the confusion between Smart Rules and Smart Groups, and the concept that PasswordSafe groups are only provisioned if they have permissions assigned to them. You cannot give access to users who are in a group with no permissions

 

📌 If you’re wanting an overall yes/no flow if a user can access PasswordSafe or a managed account, please see Whiteboard Workflow Diagrams for PasswordSafe Authentication and Permissions | Community

 

In the effort to share the knowledge, I’m sharing the raw whiteboard notes I have around an approach to thinking about PasswordSafe User Provisioning. Whiteboards are my first step in understanding any system, and, quite frankly, I’ll never get this article posted if I were to transpose this into writing. 

 

🚩 This is a general case. There are different ways of altering what a user is provisioned to access by using the PasswordSafe configurations. 

 

PasswordSafe Users need a provisioned reason

PasswordSafe won’t allow users to log into the console unless they have provisions associated to a use case, even if they can authenticate against SAML and belong to a PasswordSafe user group

 

 

Smart Groups vs Smart Rules

PasswordSafe assigns roles to Smart Groups. The Smart Groups vs Smart Rules aren’t the same, and the following is a summary of the difference.

 

Provision a Smart Group that allows a WHO and WHAT 

Since you’re provisioning access to a Smart Group, this gives a general guide about how assigning a Managed Account Smart Group can provide both the WHO and WHAT with linking.

 

 

PasswordSafe Provisioning Diagram

The following is an example of how granting access to Smart Group A provides linking to the different systems. 

 

 

2 replies

Forum|alt.badge.img+1
  • Apprentice
  • December 1, 2025

Hi All,

 

We noticed an issue in Password Safe where the user accounts that have been deleted in Entra ID / Active Directory continue to appear in Managed Accounts inside the PAssword Safe.

  1. Is there a standard cleanup process or smart rule that ensures the Managed Accounts are removed when the source Entra / AD is deleted?
  2. Is there a configuration or sync setting that controls this behavior?
  3. HAs anyone implemented an automated cleanup or validation rule for stale accounts?

Additionally, our Resource Brokers appear to still reference the old email address associated with a removed account. Any guidance on where this configuration lives would also be helpful.

 

Thanks in advance for any direction.


tclowater
BeyondTrust Employee
  • Author
  • BeyondTrust Employee
  • December 1, 2025

Hey ​@Lakshmi

PasswordSafe wouldn’t delete accounts but can unlink them and mark them as unmanaged; even with the smart rules. 

 

Automation rules typically come in with APIs and smart rules using asset tags mark decommissioned, inactive, or other accounts. This helps provide a phased approach; the managed accounts will need to be deleted or unlinked first before deleting a decommissioned managed system. 

 

As for the resource broker sending emails; that’s likely a local server configuration as emails for resource brokers aren’t available in PasswordSafe: https://beyondtrustcorp.service-now.com/csm?id=kb_article_view&sysparm_article=KB0022315