Using The One-Time Secret Tool In Manage

Reading Time: 2 minutes

In order for one of our clients to start using the ‘one time secret’ tool within manage, you will need to login to the Manage portal to get started. Typically, passwords are not meant to be shared. Unfortunately, sometimes you will need to share a password or other sensitive data with the support admin you are working with. Regrettably, trying to pass along individuals character over the phone can be frustrating, annoying, and overly time consuming, and more so when a password is long and if the phone has a bad connection.

So, what can we do when it is time to share a password with support? Using the One Time Secret tool in your Liquid Web account allows you and your Heroic Support admin to share a password in a safe and secure manner that will enable them access to your password or other sensitive data.

The One Time Secret tool is also useful when you need us to change a server’s root password for you or, we need a cpanel password to assist you with a support request.

Note:
The username and IP address of the secret submitter are kept in logs stored internally, as well as timestamps for submission, and retrieval or expiration.

So, how do we access and utilize this tool? Let’s jump right in…

  1. Log into your Liquid Web account.
  2. From the home page of your account, click on Account in the left side menu and then, one the “Secrets” tab.secrets tab
    Warning:
    One Time Secret is not available for HIPAA customers.
  3. This will open the One-Time Secret home page.
    one-time secret home page
  4. Click Create New One-Time Secret.create new button highlighted
  5. Enter the message or password you need to share with us. This will encrypt the message and store it in an internal database.secret created
  6. Click Submit One-Time Secret to save your password. Click the link below to view the secure one-time secret.

submit button highlighted

Both you and the admin can now view the password. Passwords are decrypted when the secret is viewed.

Caution:
Your secret is only viewable once before it is removed forever. Additionally, if the secret is not viewed within 24 hours, it is removed from the One Time Secret tool.

Have more questions about this tool? Reach out to one of our Heroic Support admins 24 hours a day, 365 days a year by creating a ticket at support@liquidweb.com, opening a chat with us or giving us a call at 1-800-580-4985. We are always looking forward to providing an answer to any questions you may have!

Thank you for hosting with Liquidweb!

Top Ten 2019 Password Security Standards

Reading Time: 4 minutes

 

Here are the top ten password security standards and specification for 2019. Use these tips to increase your overall security and remember, your server is only as secure as your weakest password or point of authentication.

Follow these top 10 best practices for 2019 to better protect all of your information.

Continue reading “Top Ten 2019 Password Security Standards”

Best Practices for Security on Your New Ubuntu Server: Users, Console and Firewall

Reading Time: 4 minutes

Thank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:

Continue reading “Best Practices for Security on Your New Ubuntu Server: Users, Console and Firewall”

Reset Your WordPress Admin Password

Reading Time: < 1 minute

Whether its a hacked site or a lost password, you may find that you are locked out of your WordPress Admin control panel. If you’ve forgotten your password or don’t have access to the email address that the “Lost your password?” link sends to, you still have one more option to access it. Through the database!  WordPress’ database stores all WordPress username, encrypted passwords, and the user’s email address and thus can be edited through a database client like phpMyAdmin. In this tutorial, we’ll be showing you how to edit the email address and change your user’s password.

Continue reading “Reset Your WordPress Admin Password”

Change a Password for PostgreSQL on Linux via Command Line

Reading Time: < 1 minute

PostgreSQL supports many client authentication methods, but in this case we’re only going to concern ourselves with two: password and md5.

Note: The default authentication method for PostgreSQL is ident. If you’d like to change the PostgreSQL authentication method from ident to md5, then visit the linked tutorial!

Continue reading “Change a Password for PostgreSQL on Linux via Command Line”