Technical specification
  • 32 minutes to read
  • Dark
  • PDF

Technical specification

  • Dark
  • PDF

Article Summary

senhasegura is a security platform composed of software, operating system, and hardware. This modularized platform meets the most stringent security standards in the industry.

In this document, we will cover the main technical aspects of senhasegura.

System modules architecture

The senhasegura software solution is divided into the following modules:

Modules architecture 

These components support the operation of the senhasegura from the physical layer to the application layer.

  • Business layer: where all senhasegura features are located, from integrations to activity recording.
  • Application Server layer: where Orbini is located, MT4 developed a framework to support all solution features.
  • Virtual Appliance: a virtual device where the solution is executed.
  • Appliance layer: senhasegura hardware solution.

Basic systems solution components

In addition to the modules presented, the solution has essential embedded software components integrated into the solution itself without the need for external resources:

  1. Optimized and hardened over all aspects (Application, Data Base, File System, etc) Linux-based operating system. The system has only the minimum services running, obeying the Minimum Privilege Principle, and a kernel adapted to the solution's functionality.
  2. Own database; no license required.
  3. Own and integrated web server.
  4. Embedded web interface, no licenses or additional features to use. With just a single network configuration interface, it is already possible for the deployer to have access to the HTTPS web interface so that all other configurations can be performed in a secure and user-friendly graphical environment.


On virtual and physical appliances in senhasegura, only service ports are released:

TCP/22SSH Server
TCP/80Web Server with redirection to port 443
TCP/443Web Application Server
TCP/3389RDP Proxy
TCP/3306Database cluster
TCP/4444Database cluster
TCP/4567Database cluster
TCP/4568Database cluster
UDP/4567Database cluster



Beta language users may encounter misspellings, typos, and words in another language like English. Translation errors can be reported via the Support PAM Solution.

The solution has all interfaces in the following languages:

  1. Brazilian Portuguese (PT-BR)
  2. United States English (EN-US)
  3. Germany (DE) 
  4. Spanish (ES)
  5. Polish (PL)
  6. French (FR)
  7. Russian (RU) 

The solution allows user input and storage using UTF-8 charset:

  1. Arabic
  2. Arabic Extended-A
  3. Arabic Extended-B
  4. Arabic Mathematical Alphabetic Symbols
  5. Arabic Presentation Forms-A
  6. Arabic Presentation Forms-B
  7. Arabic Supplement
  8. Basic Latin
  9. Bopomofo Extended
  10. CJK Compatibility
  11. CJK Strokes
  12. CJK Symbols and Punctuation
  13. CJK Unified Ideographs
  14. CJK Unified Ideographs
  15. CJK Unified Ideographs Extension B
  16. CJK Unified Ideographs Extension C
  17. CJK Unified Ideographs Extension D
  18. CJK Unified Ideographs Extension E
  19. CJK Unified Ideographs Extension F
  20. Cyrillic
  21. Cyrillic Supplement
  22. Enclosed CJK Letters A
  23. French
  24. Hangul Compatibility J
  25. Hebrew
  26. Hiragana
  27. Kanbun
  28. Katakana
  29. Katakana Phonetic Exte
  30. Latin Extended-A
  31. Latin-1 Supplement
  32. Syriac
  33. Syriac Supplement
  34. Russian
  35. Yijing Hexagram Symbol

Language support


  • Support for typing and persistence in the target language in the web interface
  • Support for typing and persistence in the target language in the RDP proxy interface
  • Support for typing and persistence in the target language in the Terminal proxy interface
  • Session text indexing (OCR) support
  • Keyboard layout
  • Translation of the web interface
  • Translation of the Terminal proxy system
  • Web proxy system translation


  • Support for typing and persistence in the target language in the web interface
  • Support for typing and persistence in the target language in the RDP proxy interface
  • Support for typing and persistence in the target language in the Terminal proxy interface
  • Session text indexing (OCR) support
  • Keyboard layout
  • Translation of the web interface
  • Translation of the Terminal proxy system
  • Web proxy system translation


The solution has user manuals in the following languages:

  1. Brazilian Portuguese (PT-BR)
  2. United States English (EN-US)

Compatibility ISO 27001, PCI, SOX, GDPR, PQO BM&F

senhasegura enables organizations to deploy the most stringent and complex privileged credential access controls required by standards such as ISO 27001, PCI, SOX, GDPR, and PQO by automating privileged access controls, protecting the IT park from data breaches and potential compliance violations.


Hardening reduces the attack surface on a system by changing default passwords, removing unnecessary software, removing unuseful users or logins, and disabling or removing unnecessary services.

senhasegura uses a series of hardening processes at different levels of application and its components, recognized by the security market, to mitigate attempted attacks.

Among other models, senhasegura uses hardening processes indicated by NIST (National Institute of Standards and Technology) and CIS (Centro de Internet Security, Inc.).

The hardening process is periodically reviewed with each new release of the solution so that it is always in compliance with the best practices and the main security processes adopted by the market.

Component update

senhasegura's Research and Development team is aligned with updates to the third-party components that make up the solution. Updating these components is done through a fast communication channel, and it is performed on customers if a critical demand is released.

The tool update process is aligned with the client's update policy. In this case, a team will be deployed to fulfill the installation flow with the least risk of impact on the customer's business.

Functional features by modules


The senhasegura does not allow the installation of other software.

Base Module - System access settings

This module has the following functions:

  • senhasegura Authentication: senhasegura has its authentication module with functionality that implies user blocking after a determined amount of unsuccessful login attempts. Change the password in the first login, validation of the complexity of the new password created with a comparison of the history of passwords used.
  • User Registration: complete user registration with change and configuration traceability.
  • Profile Management: advanced granular profile management with the ability to create according to each user profile.
  • Screen's Log: system screen view log.
  • Screen Identification by codes: each system screen is uniquely identified with a code, making service and support accessible.
  • External Authentication Servers: in addition to its authentication module, senhasegura can be used in conjunction with other directory services. You can set up senhasegura to perform authentication across multiple servers, including establishing an authentication order. The central authentication servers that integrate with senhasegura are Active Directory, LDAP, TACACS, and RADIUS.
  • Two-Factor Authentication: you can reinforce the authentication process through Multi-factor authentication using, for example, the Google Authenticator application.
  • IP Access Blocking: senhasegura can block access through a pre-established IP denylist.
  • Session Management: in the tool, the session management module is responsible for checking session validity and setting a timeout until the next login.
  • Authentication with A1 and A3 Certificates: the authentication process can be carried out using A1 and A3 certificates as the second authentication factor.
  • Single Active Session: Users cannot be logged in to the same senhasegura account from two different sessions simultaneously. If authentication is performed using the Admin account while someone else is already logged in with the same Admin account, the person with the old session will be logged out.

Base Module - Password and information vault

This module is the core of the password vault and has the following functions:

  • Password Guard: storing passwords in the vault, encrypted in AES 256 algorithm with double encryption factor. Passwords can only be accessed in this module through the Access Management module.
  • Protected Information Guard: the password vault allows encrypted storage of information such as tokens, certificates, and files in general.
  • Backup of Secrets: passwords, protected information, and SSH keys require an independent backup unit in the solution.  

 The information vault and passwords are responsible for writing the secrets to a backup encrypted by the Shamir algorithm-based master vault key.

  • HSM Integration: Integration with external or internal Hardware Security Module devices

Base Module - Equipment register

This module is the password senhasegura interface with the assets that will have their passwords managed and includes the following functions:

  • Registration Interface: where the equipment registration occurs, either by web screen individually or by the batch registration process.
  • Connector Management: each device has ports for connection and protocol for access. This module manages the configured connections and communicates with the devices.
  • Connectivity Test: periodically, senhasegura will connect to registered devices and validate their connectivity. Users can be alerted of test results.
  • Equipment Profile: equipment types and models have default swap profiles and password templates in the tool. This module relates devices to these policies.

Base Module - Access to information, passwords, and session policies

The access policy module is the only one with access to the password and information vault and has the following functions:

  • Access Workflow: the access workflow initiates an approval process for the delivery of the authenticated session or password. This process has different configurations and routes depending on the client configurations.
  • Access Approvation: the access approval function allows the approving user to respond to the access request by:
    • User screen
    • E-mail
    • SMS
    • Emergency Access
  • Password Split: this function breaks the password into two parts. For segmented delivery, and is relevant for PCI compliance.
  • Access Control: the access control module unifies the three entities considered in the decision to surrender the credential or access:
    • Delivery Policy
    • Involved Users
    • Related Equipment

The joining of these entities defines the session delivery criteria in the system.

  • User Timing: the access control module can be synchronized with an authentication server. Users of a particular group on the authentication server are loaded into the senhasegura access groups, making access management easier.

Base Module - Reports

  • Reporting Configuration:  the user can remove or add information to a particular report through the interface. You can create a whole new view of helpful information for your needs.
  • Shipping Schedule: the reports you create can be set to send to certain users automatically.
  • PCI Reports: a set of specific reports to meet requirements required by PCI audits.
  • Audit Trails: senhasegura contains reports with all relevant system events. Events can be exported to SIEM and Syslog.

Base Module - Dashboards

  • System Health: responsible for graphically displaying the overview of senhasegura hardware and Virtual Machines. You can view data such as I / O, memory, and processing.
  • Process Monitoring: monitors the execution of crucial vault processes:
    • Password Changes
    • Access Group Synchronisms
    • Password Reconciliation
    • Connectivity Tests
    • Settings Backup
    • Password's backup
  • Business Monitoring: monitors health for credential and information protection:
    • Number of Passwords changed x Failures
    • By period
    • Number of Sessions:
    • Active and Concurrent x System Average
    • Recorded (by period)
    • Average session time logged in
    • Users logged in to the system

Password Change Module

  • SSH Password Change: make the connection and run the default password exchange script on the device using the SSH protocol without the need for agents installed.
  • Windows Server: windows Password Exchange connects to a Windows server and runs local password exchange scripts without needing agents installed.

Using native Microsoft protocols (RPC, RM / WMI), senhasegura can interact with the device using commands from the protocols or through PowerShell commands if protocol support is enabled.

  • Network Asset: make the connection and run the default password exchange script on the device using the SSH protocol without the need for agents installed.
  • Desktop: make the connection and execute the default exchange script for that password on that desktop using various desktop-based protocols.
  • Database: make the connection and execute the default exchange script for that password in that database using the base protocol.

Password Reconciliation Module

Password reconciliations happen the same way on servers, network assets, desktops, and banks: accessing devices and accounts is periodically performed, trying to authenticate with the last password in custody, validating whether custody remains under the password safe.

Proxy Session Management

Constant Changes in User's Originating IP Address
senhasegura does not handle constant changes in a user's originating IP address due to auditing and security reasons. If you're using a VPN that changes your IP often, it may cause frequent disconnections and require you to log back in. For a better experience, we recommend enabling session persistence in your VPN/network settings when accessing senhasegura. This will keep your IP stable, avoiding unnecessary disconnections.

Management Module - Windows sessions

  • Session Delivery: authenticated session delivery is performed without entering a username or password.
  • Session Recording: during access to the authenticated session, the system records the session in video and text.
  • MP4 Video Generation: recorded video can be generated in mp4 format to be downloaded and uploaded.
  • Audited Proxy Support: native audited proxy support for SSH and RDP connectivity of client applications. For compatibility between manufacturers, all proxy modules use current encryption algorithms and native protocols.

Management Module - Linux sessions

  • Linux Web Session Delivery: authenticated session delivery is performed without entering
    a username or password
  • Web Session Recording: during access to the authenticated session, the system records the session in video and text.
  • MP4 Video Generation: recorded video can be generated in mp4 format to be downloaded and uploaded.
  • Audited Proxy Support: native audited proxy support for SSH and RDP connectivity of client applications. For compatibility between manufacturers, all proxy modules use current encryption algorithms and native protocols.

Management Module - SSH Gate Sessions - senhasegura Terminal Proxy

  • Linux Session Delivery via SSH Gate: authenticated session delivery is performed without entering a username or password. This is done transparently to the user through any SSH client.
  • Web Session Recording: during access to the authenticated session, the system records the session in text.
  • Command Audit: All commands sent to the server through senhasegura will be audited, and Command Execution alerts will be generated.
  • Privilege Control: it has granular control of commands that can be executed with the possibility of blocking those not authorized for execution to the user.
  • Audited Proxy Support: native audited proxy support for SSH and RDP connectivity of client applications. For compatibility between manufacturers, all proxy modules use current encryption algorithms and native protocols.

Management Module - HTTP Sessions

  • HTTP and HTTPS Session Delivery: authenticated session delivery to a page is done without the need for a username or password.
  • Web Session Recording: during access to the authenticated session, the system records the video session.
  • MP4 Video Generation: recorded video can be generated in mp4 format to be downloaded and uploaded.

Discovery Module

  • Windows Passwords: discover administrative credentials on Microsoft platform servers and desktops, identifying which ones are privileged, and importing into the vault.
  • Linux / Unix / AIX Passwords: discover administrative credentials on Linux / Unix / Aix servers and desktops, identifying which ones are privileged, and importing into the vault.
  • AD Passwords: discover administrative credentials on the Microsoft platform Active Directory server, identifying which ones are privileged, and importing into the vault.
  • SQL / Oracle Passwords: discover administrative credentials in databases, identifying which ones are privileged, and importing into the vault.
  • SSH Keys: discovers public and private SSH keys that are present on the target device.
  • Certificates: find local or Windows user certificates stored in devices, containers or on the domain.
  • Local Authorities: find local authorities for the devices.
  • Services: find out what services are being performed on the target device.
  • DevOps: find DevOps artifacts that are present in the devices.
  • Glossary of Provisions: allows to create scan list with segmentation by type

Module A2A - App to App

  • .Net: password delivery via lib on .Net to be added to platform application code.
  • Java: password delivery via passwords lib in Java to be added to platform application code.
  • PHP: password delivery via passwords lib in PHP to be added to the platform application code.
  • Application Server: password change in the main Application Servers of the market.
  • senhasegura API: password delivery through the senhasegura API.

Module senhasegura.go

senhasegura.go allows you to invoke administrator privileges to run applications on local workstations. This module is based on .NET Framework for 4.8.

Supported integrations

senhasegura has several types of integration, besides the possibility of configuring integration templates. The templates are open and can be modified by the administrator.

Performing integration may require specific plug-ins. Password architecture and integration features allow senhasegura to develop plug-ins quickly.

senhasegura is noninvasive. Therefore, no agent installation is required on the systems managed by the solution. For some applications it is possible to use senhasegura through agents to create more integration possibilities.


The integration between senhasegura and Tenable was developed to provide a robust vulnerability analysis solution, combining the capabilities of senhasegura in managing passwords and privileged access with Tenable's vulnerability analysis tools.

Access the documentation provided by Tenable on Tenable-Supported Integrations with senhasegura for detailed information about the integration.

Operational system

AppleOS X
CiscoCisco IOS, NX-OS (Nexus)
HPHPUX, Tru64, NonStop (Tandem), Open VMS, HP5500, Tande
IBMAIX, iSeries, Z/OS, CICS, OS/390
LinuxFedora, Ubuntu, Red Hat, SUSE Linux, Debian
MicrosoftWindows XP, Windows Vista, Windows 7, Windows 8 / 8.1, Windows 10, Windows Server 2003, 2008, 2012, 2016
OracleSolaris, Solaris Intel, Enterprise Linux

Network equipment

A10 NetworksA10
AdtranNetVanta 838, Tracer 6420
AlcatelSwitches, Switches (Omniswitch 7000 Series), Intelligent Services Access Manager (ISAM)
AllotAllot Secure Service Gateway, Allot Service Gateway, Allot SmartEngage, Allot WebSafe Personal
Applied InnovationAISCOUT-S02
Aruba NetworksArubaOS
AvayaMedia Gateway
AvocentDSView management
BTI Photonic SystemsNETSTENDER 1030
CiscoRouters, ACS (Access Control Server), Switches Catalyst, Switches Nexus, JMC, Wireless LAN Controller 5508, WAAS, ONS, ESA (Email Security Appliance), Privilege 15, Unified Communication Manager, ISE (Identity Services Engine), UCS (Unified Computing System)
EnterasysRouters, Switches
EricssonServiceOn Element Manager (SOME)
FujitsuFSC iRMC
GemaltoSafeNet KeySecure, SafeNet HSM
HPProCurve, HPE 5500
HuaweiS1720, S2700, S5700, S6720, S6720 V200R011C10
JuniperRouters (JUNOS), Pulse secure
NokiaNetAct, DX200
NortelBayStack, VPN Router, Ethernet Routing Switch
RadwareISR Infiniband Switch, ODS1 Load Balancer, Alteon, Linkproof
RFL ElectronicsIMUX 2000
RiverbedCMI, Xilinx
RuggedComRouters, Switches
SymmetricomSymmetricom Xli
VoltaireISR Infiniband Switch
Extreme NetworksSwitch, Router
DLinkSwitch, Router

Applications servers

Red HatJboss, Wildfly
KasperskyKaspersky Endpoint Security for Business
MicrosoftSQL Server, Exchange Server 2007 - 2019, entre outras aplicações que permitam interatividade via RemoteApp, Windows RPC e Windows RM
VeritasNetBackup 7.7, 8.0, 8.1 e 8.2
IBMWebsphere Application Server, Websphere Datapower
Apache FoundationApache HTTP Server, Apache tomcat
OracleWebLogic Server, Peoplesoft, Oracle Application Server

Security devices (Firewall, UTMs, IPSs)

Acme PacketNet-Net OS-E
AkerAker Firewall UTM
Blue CoatProxy SG
CheckpointFireWall-1, SPLAT, Provider-1, GAIA
Cisco SystemsPIX, ASA, IronPort, Mail Gateway
Critical PathMemova Anti-Abuse
FortinetFortiGate, Fortimanager
IBMDataPower Integration Appliance
McafeeNSM (Network Security Manager), SideWinder, ePO
NokiaCheckpoint FireWall -1 on IPSO
Palo Alto Networks®Panorama
ProofPointProtection Server
RSAAuthentication Manager (SecurID)
SafenetLuna HSM
SchneiderIndustrial Defender
SophosAstaro Security Gateway
SourceFireSourceFire 3D
SymantecBrightmail Gateway
TippingPointIPS, SMS
WatchGuardFirebox X Edge e-series, Firebox X Core e-series, Firebox X Peak e-series, WatchGuard XTM
ImpervaDDoS Protection
Trend MicroSecurity solutions

Virtualization environments

VMwareESX/ESXi Server
CitrixXen Citrix
MicrosoftHyper-V, Azure
GoogleGoogle Cloud Platform (GCP)
AmazonAmazon Web Services (AWS)
RackspaceRackspace Cloud, GoGrid
IBMIBM SmartCloud
GenericISO installation media


IBMDB2, Informix, Datastage
InterSystemsCaché Release 2010 - 2017 (and other supported ODBC versions connected to devices with supported connectivity)
MicrosoftSQL Server
ODBCODBC compatible databases
OracleOracle Database, Oracle Enterprise Manage, RDBMS, Mysql 4 - 8, Oracle RAC
PostgresqlPostgresql 6 - 11
SybaseSybase Database, IQ


DellDell EMC PowerMax 2000, Dell EMC PowerMax 8000, Dell EMC SC5020, Dell EMC SC5020F, Dell EMC SC7020, Dell EMC SC7020F, Dell EMC SC9000 , Dell EMC SCv3000, Dell EMC Unity XT 380F, Dell EMC Unity XT 480F, Dell EMC Unity XT 680F, Dell EMC Unity XT 880F, Dell EMC XtremIO X2, Dell PowerVault, Dell EMC Isilon, Dell EMC VMAX Among other models compatible with supported connections.
IBMStorwize V7000 Gen 3 ”Next Gen”, Storwize V7000 Gen 2+, Storwize V7000 Gen 2, Storwize V7000 family, Storwize V5100E, Storwize V5030E, Storwize V5010E, Storwize V5030, Storwize V5020, Storwize V5010, Storwize V5000, Mainframe IBM AS400 
HuaweiOceanStor 18000F V5, OceanStor 5300 V3, OceanStor 5300F, OceanStor 5500 V3, OceanStor 5500F, OceanStor 5600 V3, OceanStor 5600F , OceanStor 5800 V3, OceanStor 5800F V5, OceanStor 6800 V3, OceanStor 6800F V5 Among other models compatible with supported connections
NetAppNetApp ONTAP (BSD)
HitachiEnterprise Storage, series E, F, G and 5.000
Pure StorageFile Storage

Windows applications

MicrosoftApplications developed under Java, .Net, PHP, Phyton, SQL accounts, Windows scheduled tasks, Windows services, Apache applications, IIS applications, COM+ services, Clustered applications

Directory systems

DigiDigi Remote Manager
NovellNovell Directory Services (NDS)
SunJava System Directory Server
Red HatRed Hat Directory Server (RHDS), 389 Directory Server, FreeIPA
OracleODI Oracle

Remote access and monitoring

AmazonAmazon Web Services (AWS)
DellDell Remote Access Card (DRAC)
HPStorageWorks, iLO
CA TechnologiesCA Remote Control
IBMMaximo Application Suite
SUN TechnologiesDesktop Management
DigiDigi Remote Manager
FujitsuServerView Suite

DevOps environment, VSC and others SDLC softwares

AtlassianBamboo CI/CD, JIRA Core, Bitbucket
GitLab Inc.GitLab CI/CD
JenkinsJenkins CI/CD

ITSM tools

AtlassianJira Service Desk
ServiceNowServiceNow ITSM

TOTP tools

senhasegura MFA function works with any Time-based One-Time Password (TOTP) tool. Here you can see some options:

GoogleGoogle Authenticator
MicrosoftMicrosoft Authenticator
AuthyTwilio Authy 2-Factor Authentication
Red HatFreeOTP Authenticator
SophosSophos Authenticator
LastPassLastPass Authenticator

Integration plugins

JenkinsAllows the consultation of secrets in the senhasegura

SIEM solutions

ExabeamVersion i31 onwards.
IBM QRadarVersion 7.3 onwards.
LogRhythmVersion 7.4 onwards.
Rapid7 - InsightIDRVersion 20180814 onwards.
Rapid7 - InsightOpsVersion 20190204 onwards.
SecuronixVersion 6.3 onwards.
SplunkVersion 6.3 onwards.

SSO solutions

OktaLifecycle Management
DuoDuo Multi-factor Authentication
Red HatKeycloak

Authentication integrations

Here are the available SSO and MFA integration tools.


Active DirectoryLDAP
Azure ADSAML 2.0
ForgeRockSAML 2.0
KeycloakOpenID SAML 2.0
OktaOpenID SAML 2.0


Google AuthenticatorTOTP
Microsoft AuthenticatorTOTP
SmartCardsA3 x.509
Symantec VIPTOTP
TokensA3 x.509

Integration with AuthID: Passwordless Authentication

Integration with AuthID offers the ability to implement "passwordless" authentication using biometric methods such as fingerprints or facial recognition. This approach eliminates the need for conventional passwords, simplifying the authentication process. Additionally, it significantly strengthens platform security by reducing vulnerabilities associated with traditional password practices.

Embedded browser version

Firefox91.6.1esr (64-bit)

Encryption and security features


Senhasegura uses open-source libraries and software to perform all necessary cryptographic processes for the solution to function securely. All communication between solution components is encrypted using the SSL (Secure Sockets Layer) protocol to ensure the security of transmitted messages. In addition, the AES-256 algorithm is used to encrypt information in the database, such as:

  • API keys
  • Credentials
  • Certificates
  • Access tokens

To provide authentication for the senhasegura web interface, both locally and through external authentication servers, user passwords are stored using the SHA-256 hash format. Communication between the client workstation and senhasegura is encrypted and follows the standards of the protocols used, whether RDP, SSH, or HTTPS. Similarly, access to remote target devices is encrypted using the same standard across all protocols that allow configuration.

For data in transit security, the OpenSSL library maintained by OpenSSL Software Foundation is used. This is an open-source implementation of the SSL and TLS cryptographic protocols. The library, written in the C programming language, implements the main encryption algorithms. In addition, the OpenSSL library is FIPS 140-2 certified. For more information, visit the OpenSSL FIPS 140-2 Security Policy.

For the security of critical data stored in the database, open-source software GnuPG is used, which is part of the Free Software Foundation and the GNU Project. This software has the option to work in "fips mode," which ensures that cryptographic processes are performed according to all requirements imposed by the FIPS 140-2 standard set by the National Institute of Standards and Technology (NIST).

senhasegura complies with security standards such as:

  • FIPS 140-2 - Level 1
  • FIPS 140-2 - Level 2 with an HSM or PAM Crypto Appliance

HSM encryption

For companies that need a higher level of security, you can opt for the Hardware Secure Module (HSM), a hardware security and encryption device with military specifications and tamper-evident standards.

HSM technical specifications

  • Encryption
  • RSA (PKCS #1 V2.1) (1024, 2048, 4096 bits)
  • FIPS 197 AES 128, 192, 256
  • FIPS 46-3 DES/3DES
  • Supports certificates x509v3
  • Supports import and internal key generation
  • Random Number Generator
  • Internal, hardware based
  • Meets AIS31 P2 standard
  • Real time clock (RTC)
  • Internal, maximum deviation of 1 minute per year
  • Appliance and Appliance Security Features
  • HSM Entrust nShield
  • HSM Kryptus
  • HSM Thales

Web proxy cryptographic

  • Key Exchange methods:
    • ecdh-sha2-nistp256
    • ecdh-sha2-nistp384
    • ecdh-sha2-nistp521
    • ssh-curve25519-sha256
    • ssh-curve25519-sha256-libssh
    • diffie-helman-group-exchange-sha256
    • diffie-helman-group-exchange-sha1
    • diffie-helman-group14-sha1
    • diffie-helman-group1-sha1
  • Supported keys:
    • ecdsa-ssh-nistp256
    • ecdsa-ssh-nistp384
    • ecdsa-ssh-nistp521
    • ssh-ed25519
    • ssh-rsa
    • ssh-dss
  • MAC methods:
    • hmac-sha2-256
    • hmac-sha2-512
    • hmac-sha1
    • hmac-sha1-96
    • hmac-md5
    • hmac-md5-96
    • hmac-ripemd160
    • hmac-ripemd160-openssh-com
  • Ciphers:
    • aes128-ctr
    • aes192-ctr
    • aes256-ctr
    • aes256-cbc
    • rijndael-cbc-lysator-liu-se
    • aes192-cbc
    • aes128-cbc
    • blowfish-cbc
    • arcfour128
    • arcfour
    • cast128-cbc
    • 3des-cbc

Terminal proxy cryptographic

  • Key Exchange Methods:
    • ecdh-sha2-nistp256
    • ecdh-sha2-nistp384
    • ecdh-sha2-nistp521
    • diffie-hellman-group16-sha512
    • diffie-hellman-group-exchange-sha256
    • diffie-hellman-group14-sha256
    • diffie-hellman-group-exchange-sha1
    • diffie-hellman-group14-sha1
    • diffie-hellman-group1-sha1
  • Supported keys:
    • ssh-ed25519
    • ecdsa-sha2-nistp256
    • ecdsa-sha2-nistp384
    • ecdsa-sha2-nistp521
    • ssh-rsa
    • ssh-dss
  • MAC methods:
  • Ciphers:
    • aes128-ctr
    • aes192-ctr
    • aes256-ctr
    • aes128-cbc
    • aes192-cbc
    • aes256-cbc
    • blowfish-cbc
    • 3des-cbc

Encryption for SSH sessions

Symmetric ciphers

  • 3DES
  • AES128-cbc
  • AES192-cbc
  • AES256-cbc
  • rijndael-cbc
  • AES128-ctr
  • AES192-ctr
  • AES256-ctr
  • AES128-gmc
  • AES256-gmc
  • chacha20-poly1305

Symmetric ciphers that support authenticated encryption

  • AES128-gmc
  • AES256-gmc
  • chacha20-poly1305


  • hmac-sha1
  • hmac-sha1-96
  • hmac-sha1-256
  • hmac-sha1-512
  • hmac-md5
  • hmac-md5-96
  • umac-64
  • umac-128
  • hmac-sha1-96-etm
  • hmac-sha1-256-etm
  • hmac-sha1-512-etm
  • hmac-md5-etm
  • hma-md5-96-etm
  • umac-64-etm
  • umac-128-etm

Key exchange algorithms

  • diffie-hellman-group1-sha1
  • diffie-hellman-group14-sha1
  • diffie-hellman-group14-sha256
  • diffie-hellman-group16-sha512
  • diffie-hellman-group18-sha512
  • diffie-hellman-group-exchange-sha1
  • diffie-hellman-group-exchange-sha256
  • ecdh-sha2-nistp256
  • ecdh-sha2-nistp384
  • ecdh-sha2-nistp521
  • curve25519-sha256

Certificate key

  • ssh-ed25519-cert-v01
  • ssh-rsa-cert-v01
  • ssh-dss-cert-v01
  • ecdsa-sha2-nestp256-cert-v01
  • ecdsa-sha2-nestp384-cert-v01
  • ecdsa-sha2-nestp521-cert-v01

Key types

  • ssh-ed25519
  • ssh-ed25519-cert-v01
  • ssh-rsa
  • ssh-dss
  • ecdsa-sha2-nestp256
  • ecdsa-sha2-nestp384
  • ecdsa-sha2-nestp521
  • ssh-rsa-cert-v01
  • ssh-dss-cert-v01
  • ecdsa-sha2-nestp256-cert-v01
  • ecdsa-sha2-nestp384-cert-v01
  • ecdsa-sha2-nestp521-cert-v01

Availability and contingency

The senhasegura system supports operation on virtual or physical appliances. The senhasegura virtual appliance is customized for installation without releasing administrative users in the operating system.

In any configuration, the system supports high availability and external contingency disaster configurations.

  • High Availability
  • Contingency and Disaster Recovery


senhasegura has several mechanisms to recover information in case of failure:

Encrypted password backup

External in client infrastructure. The backup file of this information is password protected, which is distributed in multiple custody among trusted participants at the client's free choice. At least two custodian users are required to receive and retrieve the information. Once the senhasegura delivery ceremony has taken place, all passwords to the safe will be reset and the client will receive their respective custody, except for the passwords to the senhasegura database and operating system.

From version 3.10 on the backup procedure will also be performed for user passwords and Access Keys of the DevSecOps module.

Backup fast recovery

Internal and rapid recovery. Stores more critical information, is considered faster, because with the content of the base available the environment is recovered quickly and already becomes accessible upon request.

Encrypted backup of settings

Allows not only the stored data but also the password settings to be available for retrieval. This backup is not enabled by default, but its activation is available in system settings.

Safe video backup

The senhasegura allows the backup of the videos to be stored in a remote directory under the responsibility of the client. By default the videos are stored in the solution's file system.

Secrets backup

The backup of secrets: console credentials and access keys are stored in dedicated directories.

Monitoring and Syslog and SIEM

senhasegura has monitoring capabilities designed to alert administrators of any process, integration, connectivity, or access failure.

This system issues on-screen alerts to the administrator or via email, SMS, snmpmibs and snmptraps.

The solution can be integrated with any industry tool using SNMP V1, V2 or V3 standard.

Integration with Syslog and SIEM services.

Own integration with ArcSight.

Browser compatibility

The senhasegura web interface is accessible only through HTTPS protocol, and it is recommended that you provide your own SSL certificate in accordance with current security assumptions.

senhasegura uses HTML5 and WebSocket technology and only browsers that support these technologies will provide a complete passwords security experience. It also maintains compatibility with browsers in their most recent versions:

  • Internet Explorer
  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox

Network operating conditions

Connections between users and the senhasegura application have a minimum bandwidth of 180 Kbps per remote session without loss of functionality.

Connections between users and the senhasegura application have a maximum latency of 900 ms without any loss of functionality.

senhasegura application allows IPV4 and IPV6 protocol support following IETF RFC 2460 specification.

Supported protocols and ports

senhasegura allows the use of several protocols, through their respective standard ports or any other configured in the solution, for the following operations: remote connections, password changes, Scan Discovery, authentication and web access.

Operations are performed based on the ports configured on the device.

ConnectivityDefault PortDescription
HTTP80Web Access
HTTPS443Secure Web Access
LDAP389Scan Discovery / Authentication
LDAPS636Password Change / Scan / Discovery / Authentication
MySQL3306Remote Connection* / Password Change
Oracle1521Remote Connection* / Password Change
PostgreeSQL5432Remote Connection* / Password Change
RDP*3389Remote Connection
RM HTTP5985Password Change / Scan Discovery
RM HTTPS5986Password Change / Scan Discovery
SQL Server1433Remote Connection* / Password Change
SSH22Remote Connection / Password Change
Telnet23Remote Connection / Password Change
VNC**5900Remote Connection
Windows RM5986Password Change
Windows RPC135Password Change / Scan Discovery
X11 Forward**22Remote Connection / Password Change

The supported protocols are only available on TLS1.2 and TLS1.3, once connected to the senhasegura vault.

*RemoteApp only

**graphical interfaces


The senhasegura architecture is designed for maximum performance in all operations performed through the solution.

All tests were performed on senhasegura PAM Crypto Appliances with the following configuration:

Hardware settings

  • Model: senhasegura PAM Crypto Appliance Titanium
  • Processor: Intel E5-2630v4
  • RAM Memory: 128GB

senhasegura settings

  • Cores: 38 vCPUs
  • RAM Memory: 126GB
  • HD: 2TB

SSH sessions via senhasegura Terminal Proxy

5005%10GB4.500 KB/s
200020%50GB6.000 KB/s
350055%85GB8.000 KB/s

SSH sessions via senhasegura Web Proxy

25010%10GB7.500 KB/s
75035%15GB5.000 KB/s
125045%20GB2.000 KB/s

RDP sessions via senhasegura RDP Proxy

5005%15GB8.500 KB/s
125010%30GB5.000 KB/s
200015%50GB2.000 KB/s

RDP sessions via senhasegura Web Proxy

2505%10GB16.000 KB/s
100010%20GB9.000 KB/s
175020%30GB1.000 KB/s

Web HTTP connections (high usage)

1010%5GB2.100 KB/s
2018%10GB1.800 KB/s
3020%15GB1.500 KB/s

Web HTTP connections (medium usage)

1010%4GB80.000 KB/s
2020%8GB40.000 KB/s
3020%10GB10.000 KB/s

Web HTTP connections (low usage)

1010%10GB40.000 KB/s
3520%15GB20.000 KB/s
6030%20GB10.000 KB/s

Resource limit

The platform senhasegura has some features that are technically limited, either for reasons for database limitations, operating system limitations, file-system limitations or software architecture limitations.

The limitations relating to contract or license are fixed by contract, and will not be addressed in this topic.

The limitations relating to the number of contracted instances, in a cluster scenario, will also not be addressed in this topic. We will focus on limitations on an instance and its components.

User limit

Technically, the application will support up to 16,500,000 user records. This number is shared with WebService A2A users, service users, and actual system users. This number does not express the ability of all these users are using the system simultaneously. Simultaneous use capacity may vary according to the type of use, quantity of contracted instances and network latency supplied.

Device limit

The technically application will support up to 16,500,000 device records. This number contains even inactivated devices over time. This number does not express the ability of all these devices are being accessed via proxy, or any other asynchronous process that accesses the device simultaneously. The ability to manage devices can vary by the number of contracted instances, supported systems and protocols and the network latency provided.

Credentials limit and protected information

The application technically will support up to 16,500,000 credential records. This number contains even inactive credentials over time. This number does not express the ability of all these credentials are being accessed and used by asynchronous tasks or proxy sessions simultaneously. The ability to manage credentials can vary by the amount of contracted instances and the network latency provided.

Proxy session recording

Different from other market solutions, the senhasegura does not perform screen captures in image format, or real-time mp4 videos or other media formats. The real persistence of protocol ensures a faithful and optimized copy of the session. Inactivity times are recorded through 4Bytes timestamp per second, unlike screens capture that would consume much more resources. Native format recording of the protocol already considers the native compression format of the protocol.

The session videos are encrypted and stored in a proprietary format and on the same server as the password, with all the standard vault defenses protecting the video's integrity. If the customer wants to apply his own security standards, he can configure the external backup.

User behavior will define the amount of sessions that can be stored. Not excluding the possibility of disk expansion or remote storage mapping to increase storage capacity.

This combination of factors makes the limit of sessions virtually unlimited. Consider the performance table described in the performance session to calculate your need.

Simultaneous proxy sessions

The amount of simultaneous sessions may vary with the amount of contracted instances, making the solution appropriate to its need without excessive hiring of resources. The cluster architecture also allows the definition of dedicated nodes for specific protocols, or the definition of dedicated instances for different datacenters or network segments. This combination of factors makes the limit of sessions virtually unlimited. Consider the performance table described in the techspec-performance session to calculate your need.

senhasegura versioning

The senhasegura versioning nomenclature follows the M.N.P format (eg: 3.22.1-9):

Release TypeDescription
M - MajorIncludes profound architecture and/or technology changes.
N - MinorIncludes new features and/or improvements to existing features. Also includes known bug fixes and minor architectural changes.
P - PatchIncludes critical bug fixes and security patches. (immediate update recommended)

New versions frequency of release

senhasegura N Updates can vary from 1 to 5 months, depending on the period of the year.

As for the available formats, there are two ways:

  1. For the new senhasegura environment, can be used the virtual machines available in the partner support.
  2. Updates are always available through our repositories, with new releases updated as soon as they become available.

Implementation requirements

Use cases

For the correct functioning of the solution, the possible Use Cases must be defined where privileged access management will be performed.

Here are some examples of these cases:

  • Active Directory: the Active Directory administrator wants to have remote desktop access (RDP) to Active Directory Server Windows Server 2016 using the “Administrator” user.
  • Databases: the DBA wants to have access to the SQL software client Server Management Studio 2014, which manages SQL database using the local administrator user of the production instance of the “sa” database.
  • Network Assets: the infrastructure administrator requires access to via command line, shell, or console to a Cisco router, via SSH or Telnet port, using the “operator” or “admin” user.
  • Web Applications: access to the portal AWS, using the Cloud Computing administrator account using the account “[email protected]”.
  • Deletion of credentials in hardcore: if you want to eliminate the Database credentials recorded in the source code of an accounting app, change password synchronized in configuration files and services dependent on authentication or provide a connection API for your subscription.
  • Registration of Activities with Generic Users: you desire to obtain a record of activities during any session, including logs of custom audit, look for any command executed by keyboard during the session and on recordings.
  • Segregation of Functions and Segmentation of Functions: you want to create user profiles broken down by denylist lists of commands using the same privileged credential. You want to define groups with privileged access to associated users belonging to the same area.
  • VPNs Optimization: do you want to control and monitor in real-time the access of suppliers and outsourced users to the corporate environment, provide remote access only to specific applications or services on the network for a predetermined time.
  • Cloud Environment Recording: do you want to manage access to cloud applications and ensure user legitimacy that will connect to the same IT governance standards as all other internal network environments.
  • Shared Access: with critical applications whose licensing is very expensive, senhasegura can deliver shared access not-simultaneous from multiple locations for different users making use of the same privileged credential, obtaining information independent and personalized of each session and your recording of video.
  • Repository for Strength Analysis: you can get an analysis of behavior to get metrics, model usage reports, inventory planning, and policy structuring for the efficient use of resources. Online access to session recordings for troubleshooting purposes.
  • Information Protection: do you want to store information with Digital certificates, connection keys, encryption keys, and passwords personal access, with which you can define flows and controls of accesses, which evidences and monitors its use and visualization.

Requirements in managed systems

Define the following information for managed systems:

  • Hostname: hostname of the device. It will be the identifier of queries. (For example, apl001s10 or Facebook).
  • IP Management: device management IP used by the vault for connection. (For example, or
  • Manufacturer: device manufacturer. It will be created if you are not registered. (For example, Microsoft, Oracle).
  • Type: device type. It will be created if you are not registered. (ex: server, Subscription)
  • Model: device model. It will be created if you are not registered. (For example, Windows Server 2012).
  • Location: geographic location. Where the device is located. It will be created if not registered. (For example, Data Center Guatemala).
  • Additional 1: additional Information. (Ex: Platform, Core, Accounting).
  • Additional 2: additional Information. (For example, System, Database, Data, Main Application)
  • Connectivity: device and gateway connectivity, separated by comma and colon. (Ex: RDP: 3389, SSH: 22).
  • Domain: device domain. (For example,

Privileged account requirements

To access managed systems, you must have the following information from credentials or privileged accounts:

  • Password type: password policy. (For example, local user Privileged)
  • User: username. (Ex: root)
  • Password: password value. If not filled in, the password is not will update. (For example, Da@lU!83m$1)
  • Domain: domain of the credential. (For example,
  • Additional information: additional information on the current credential. Used for DB instances, password changes, or links in general. (For example, ORAC19).
  • Labels: password labels, separated by commas. It is used to group or filter certain credentials. (Ex: cellphone, dev)
  • Enable Auto Change:indicate whether the password will be changed automatically by the safe (Yes or No)
  • Swap plugin: plugin used in change model. (Ex: NetSSH)
  • Change Template: template used to change password. (For example, Linux as root)
  • Status Control: indicates whether the password status will be controlled automatically by the vault. (Yes or No)
  • Plugin activation: plugin used by activation model. (Per example: Net SSH)
  • Activation model: the model used to perform the activation of the credential. (For example: Enable credentials as root)
  • Plug-in inactivation: plugin used by the inactivation model of the credential. (For example, Net SSH)
  • Inactivation model: template used to perform the inactivation of the credential. (For example: Disabling credentials as root)
  • User for connection: the user used to connect to the equipment and perform status changes and control operations. You can use the same credential. (ex: root or even password)
  • Hostname for connection: hostname used to connect to the device and perform control and status change operations. You can use the same password value. (For example, apl001s10 or Even of the password).
  • Credential owner: user of the credential.

Requirements on access groups and users

To be able to start the senhasegura vault and certain privileged accounts, some access groups must be defined that will allow filtering by segments or groups, the different managed systems, privileged accounts, and privileges to which users who enter the solution must have their own credentials access, and you can create locally in the vault or integrate with an authentication source such as Active Directory, Radius, or TACACS, to configure these features:


  • Number of Access Groups
  • Names of Access Groups
  • Systems Privileged by Access Groups
  • Privileged Accounts by Access Groups
  • Users by Access Groups
  • Options by Access Groups (Access to the session and view of the password must be set if you need to enter a reason or get approval.
  • Access limitations by days of the week and time slots (8:00 AM -12:00 PM, 12:00 PM - 16:00 PM, 16:00 PM - 20:00 PM, 20:00 PM - 00:00 AM, 00:00 AM - 04:00 AM, 04:00 AM - 08:00 AM).

Example of how to fill in the access group field:

Access group

NameSystemPrivileged AccountsUsersOptionsAccess limitations
ServersSRV Win 2016 (10.235.x.x)Administratora.martinezonly access to the session without reason or approvalEvery day from 8 am to 5 pm

If there is a growth in the number of users and devices initially defined, the solution must be dimensioned with a gap of 20% to grow without the needing to modify the hardware. If the growth is more significant, it is always possible to scale the solution by integrating it with other hardware with superior capabilities.

User profiles in senhasegura

For the solution to work as intended, it is proposed to have the following access profiles:

  • Administrator: user with greater privileges in the vault, in charge of the configuration activities, modification, and elimination of any configuration, during its operation. It is recommended that there is only one administrator profile and that any activity performed by them is previously documented and authorized.
  • Configurator: user with high privileges in the vault, responsible for privileged account or system modification activities it manages. It is recommended that there are at least two users with a configurator profile and that any action performed by them is previously documented and authorized.
  • Auditor: user only with privileges to view recordings of sessions and their audit logs. There may be multiple users with this profile and may be part of the company’s staff or third parties.
  • User with privileged access: only users with session access to managed systems that use privileged credentials defined in the access group to which the user belongs. As many users as are allowed in the user license can be configured.
  • View of user with a privileged password: user with access to view the password of the privileged account of the managed systems defined by the access group to which the user belongs. As many users as are allowed in the user license can be configured.
  • User with privileged access and view: user with privileged access, login view, a password for managed systems, and privileged credentials defined by the access group to which the user belongs. As many users as allowed can be configured in the user license. There may be multiple users with this profile. They can be part of the company’s staff, applications, or third parties.

Example of filling in the user field:


NameUsernameDepartmentEmailPhoneAccess groupProfile
Alex Martineza.martinezAdministration[email protected]+000 000XXXXServersUser with privileged access

Technical requirements - Virtual Device - PAM


You can implement senhasegura in virtualized environments. The virtualization assumptions depend on the solution used for deployment and the appliances needed. According to the defined architecture, the compatible environments are as follows:

  • VMware® (ESX/ESXi Server): support ESXi 7.0 and ESXi 6.x (OVA deployment), must use VMXNET3 network adapter driver, plus paravirtualized disk. When performing virtual machine (VM) deployment, the upgrade must be done on the machine’s hardware. Virtual machines can be used in OVA/OVF format.
  • Xen Citrix®: support Citrix Hypervisor 8.2 LTSR, Citrix XenServer 7.0, XenServer 7.1 LTSR, and Xen Project 4.x.x Series (OVA deployment). You must use the HVM generator. RAW format virtual machines can be used.
  • Microsoft® Hyper-V: Support for Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows 10 (OVA to VHD conversion), virtual machines in VHD/VHDx format can be used. Azure: Virtual machines in VHD format can be used. AWS: VM in OVA or VMDK structure.
  • Microsoft® Azure (OVA to VHD conversion).
  • Linux KVM(QCOW2).
  • Amazon (Amazon Web Services - AWS) (AMI deployment) (enter account ID and region).
  • Google® Cloud Platform (GCP) (OVA deployment).
  • Openstack: virtual machines in RAW format can be used.
  • ISO installation media.

Hardware requirements

These requirements depend on the maximum number of simultaneous sessions handled by the solution and the recording retention time given by each scenario in the different environments, which are defined according to the following information:

  • RDP/SSH: when the access is done by the Terminal Proxy.
  • Web: when the access is done through the browser.

The access structure is as follows:

NOVPN architecture (optional)  

Consumption per connection

CPU: number of Concurrent Connections per core (con./core)Moderate30030
RAM: amount of memory used per connection (MB/con.)Moderate2040
HDD: disk space by time per connection (kB/s/con.)Moderate34
NET: network traffic per connection(Server Side RX / TX)(kbps / con.)
NET: network traffic per connection(Client Side RX / TX)(kbps / con.)

For customer deployment, the following features are available for the HA (Two Equal Appliances in Cluster) scheme in the Credit Bureau Datacenter:

  • Up to xxx simultaneous connections
  • Users: xxx
  • Managed Systems: xx
  • Hours of use per day: xx hours
  • Days of use per week: x Days
  • Retention months: x months

The minimum hardware requirements would be as follows:

  • x minimum vCPU (2.0 GHz) (not shared).
  • Minimum RAM x GB (not shared).
  • Minimum DD x TB (Not shared, this requirement directly depends on the required retention).
  • Minimum 1 network port (1 GbE) (not shared).

For a High Availability (Active-Passive) architecture with two members in a cluster, two machines with the exact Hardware requirements are needed. For an (Active-Active) model, a balancer must be added, which is not included.

For deployment as disaster recovery, you have the following capabilities for a single device:

  • Up to x simultaneous connections
  • Users: x
  • Managed Systems: x
  • Hours of use per day: x hours
  • Days of use per week: x days
  • Retention months: x months

The minimum hardware requirements would be as follows:

  • Minimum vCPU x CPU (2.0 GHz) (not shared).
  • Minimum RAM x GB (not shared).
  • Minimum DD x TB (not shared, this requirement directly depends on the required retention).
  • Minimum 1 network port (1 GbE) (not shared).

Was this article helpful?