This document is based on the Configure SPP Asset Platform section of the Safeguard for Privileged Passwords (SPP) 8.2 Administration Guide: Configure SPP asset platform . It also addresses a specific configuration scenario which may not be applicable to your environment. Our Professional Services team is available help you tailor this solution to your organizations requirements to ensure compliance.
A customer has an SPP instance hosted in Safeguard On Demand that they access over a secure VPN. There is concern that they could lose access to secrets if:
Historically, this was handled by using Secrets Broker as an intermediary between the Production SPP cluster and a Standalone SPP appliance:
[SPP Production] <--- [Secrets Broker] ---> [SPP Standalone] In this model, Secrets Broker monitors events on the Production appliance, then pulls secrets from Production and pushes them to the Standalone appliance.
While functional, Secrets Broker introduces an additional component (and therefore an single point of failure).
The SPP Asset Platform can push secrets directly from one SPP instance to another. This means that when a privileged AD account password is rotated on SPP Production, the updated secret can be pushed to the Standalone SPP appliance automatically.
[AD] <--ChangePassword---> [SPP Production] ----Password Pushed---> [SPP Standalone]Key difference:
Because of this push model, Production must be able to reach/communicate with the Standalone appliance over the network.
This guide makes the following assumptions
To prevent the Standalone appliance from overwriting secrets received from Production, ensure the Standalone does not rotate or change these accounts on its own.
At minimum, confirm on the Standalone appliance:
If the Standalone Appliance rotates or changes the password independently, it can cause mismatches and potentially overwrite the secret being pushed from Production.

If the asset names do not match, the password will not get successfully pushed from production to the standalone appliance. Be aware of spelling/case errors.

Important constraints:
You can only use the Account Name.
The value must match exactly what exists on the Production appliance (including spelling/case conventions as enforced in your environment).




Automated verification: Consider implementing a recurring validation that compares a known test secret on both systems via safeguard-ps. If you need assistance you can reach out to one of our many One Identity Safeguard Professionals.
Bulk Import of AD Accounts to the Standalone Appliance: Consider using CSV export/import to simplify the task if you have many accounts that you want replicated to the Standalone appliance.
© 2026 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center