Thycotic Outage History

Thycotic is up right now

There were 8 Thycotic outages since February 9, 2026 totaling 111h 49m of downtime. Each is summarised below — incident details, duration, and resolution information.

Source: https://status.thycotic.com

Major April 26, 2026

Privileged Access Service / Cloud Suite Pod34 increased latency and unresponsiveness

Detected by Pingoru
Apr 26, 2026, 06:21 AM UTC
Resolved
Apr 27, 2026, 02:14 PM UTC
Duration
1d 7h
Affected: Privileged Access Service / Cloud Suite
Timeline · 3 updates
  1. investigating Apr 26, 2026, 06:21 AM UTC

    We are investigating reports of degraded performance affecting Privileged Access Service / Cloud Suite Pod34. Some users may experience slower than normal response times. Users may encounter slow page loads, increased latency, or timeouts. Our team is actively investigating.

  2. monitoring Apr 26, 2026, 02:09 PM UTC

    We wanted to provide you with an update on the incident affecting the service(s) listed below. We have implemented a mitigation and are monitoring the situation. For any questions or concerns, please reach out to our support team at https://support.delinea.com.

  3. resolved Apr 27, 2026, 02:14 PM UTC

    We’re pleased to inform you that the incident affecting the service(s) listed below has been resolved. Our team has implemented a fix, and all systems are now operating normally. We apologize for any inconvenience this incident may have caused, and we appreciate your understanding and support. For any questions or concerns, please reach out to our support team at https://support.delinea.com.

Read the full incident report →

Minor April 25, 2026

Privileged Access Service / Cloud Suite: HTTP 401 on Custom Authorization Profiles in Cloud Suite 26.1

Detected by Pingoru
Apr 25, 2026, 09:25 PM UTC
Resolved
Apr 26, 2026, 12:51 PM UTC
Duration
15h 25m
Affected: Privileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud Suite
Timeline · 2 updates
  1. identified Apr 25, 2026, 09:25 PM UTC

    We have identified an issue in the recently rolled out Cloud Suite 26.1 release where custom authorization profiles containing wildcard or regex characters (e.g., "*") may return HTTP 401 errors. Built-in authorization profiles are not affected. A workaround is available. Please refer to the following knowledge base article for details: https://support.delinea.com/s/article/1777148833588 A fix is actively in progress, and is expected to be available shortly. We will post an update as events warrant. We apologize for any inconvenience this may cause.

  2. resolved Apr 26, 2026, 12:51 PM UTC

    We’re pleased to inform you that the incident affecting the service(s) listed below has been resolved. Our team has implemented a fix, and all systems are now operating normally. We apologize for any inconvenience this incident may have caused, and we appreciate your understanding and support. For any questions or concerns, please reach out to our support team at https://support.delinea.com.

Read the full incident report →

Minor April 24, 2026

Secret Server Cloud: US - Intermittent Application errors

Detected by Pingoru
Apr 24, 2026, 05:58 PM UTC
Resolved
Apr 25, 2026, 08:56 PM UTC
Duration
1d 2h
Affected: Secret Server Cloud
Timeline · 5 updates
  1. identified Apr 24, 2026, 05:58 PM UTC

    We have identified the cause of the current issues impacting Secret Server Cloud in the US region. An ongoing cloud provider incident is affecting an availability zone hosting workloads in our US East region. Customers may encounter HTTP 500 errors when accessing the Secret Server UI, with messages similar to the following: "Http failure response for https://.secretservercloud.com/... : 500 OK" To restore service, we are failing over traffic to our secondary region. Customers may experience brief connectivity errors during the failover. We will continue to provide updates as the failover progresses. We apologize for the disruption and thank you for your patience.

  2. monitoring Apr 24, 2026, 07:06 PM UTC

    After further investigation, we determined that a failover to our secondary region was not required. We have moved the affected resources to a different availability zone within the primary region and are observing improvement in service health. Application errors are no longer being reported. We will continue to monitor the environment closely and post a further update once the incident is fully resolved. We apologize for the disruption and thank you for your patience.

  3. monitoring Apr 24, 2026, 11:06 PM UTC

    We are continuing to monitor for any further issues. We are not seeing any Application errors since 15:31PM Eastern.

  4. resolved Apr 25, 2026, 08:56 PM UTC

    This incident has been resolved.

  5. postmortem May 01, 2026, 01:35 PM UTC

    **Incident Overview** On April 24, 2026, a subset of Secret Server Cloud customers in the US region experienced intermittent errors or connectivity issues when accessing their tenants. The disruption was caused by an outage in our cloud infrastructure provider at the East US data center. The issue originated in a single part of the data center but spread to additional areas as traffic was automatically redistributed, extending the scope and duration of the incident. Full-service recovery was confirmed at 00:15 UTC on April 25, 2026. **Root Cause** The outage impacted internal networking components that our platform depends on, disrupting connectivity across the environment. These failures contributed to the intermittent HTTP 500 errors experienced by some Delinea customers during the incident window. The issue originated in one of the Availability zones in East US data center and expanded to other zones as traffic was automatically redistributed, broadening the impact. Our team responded promptly, identifying the root cause at our cloud infrastructure provider and redistributing traffic to other zones. As a precautionary measure, our team initiated a failover to a secondary region, but later determined it was no longer needed and safely rolled back with no additional impact. Service was fully restored after our infrastructure team redirected traffic away from the affected nodes within the primary environment, with full recovery confirmed at approximately 00:15 UTC on April 25, 2026. **Preventive Actions** * Evaluate multi-availability-zone node pool configurations to improve platform resilience and reduce the impact of localized data center failures. * Establish clear thresholds and decision criteria for triggering regional failover versus in-region mitigation to improve response speed during incidents.

Read the full incident report →

Minor April 10, 2026

Platform: Global - SAML/Federation Authentication Failures

Detected by Pingoru
Apr 10, 2026, 04:11 AM UTC
Resolved
Apr 03, 2026, 10:00 PM UTC
Duration
Timeline · 2 updates
  1. resolved Apr 10, 2026, 04:11 AM UTC

    This incident has been resolved. SAML/Federation authentication has been fully restored for all affected tenants. A platform update deployed earlier today introduced a change that caused login failures for tenants with non-default SAML issuer settings. We apologize for the disruption and will be publishing a full post-incident review. Investigating We have received reports of SAML/Federation users being unable to log in to their Delinea Platform tenants. We are actively investigating the issue and will provide updates as more information becomes available. Tenants using username/password authentication are not affected at this time.

  2. postmortem Apr 10, 2026, 04:47 AM UTC

    ### Incident Overview On Friday, April 3rd, 2026, a subset of SAML/Federation users were unable to authenticate to their Delinea Platform tenants. The issue was first reported at approximately 5:01 PM ET and was fully resolved by 8:38 PM ET following a rollback of a recent platform update. Tenants using the default SAML issuer configuration were not impacted. Customers with local \(non-SAML\) accounts retained access throughout the incident via breakglass or local admin credentials. ### Root Cause A platform update deployed at approximately 4:20 PM ET introduced a code change that inadvertently caused custom SAML authentication configurations to not be correctly applied for affected tenants. This resulted in authentication failures for tenants that relied on a custom SAML issuer, while tenants using default settings were unaffected. A contributing factor was insufficient test coverage for this specific authentication scenario prior to the global rollout of the update. ### Preventive Actions * A code fix is being implemented to ensure custom SAML authentication configurations are correctly applied in all cases going forward. * Automated test coverage is being expanded to include SAML authentication scenarios with custom configurations to prevent similar issues in future releases.

Read the full incident report →

Notice March 16, 2026

Secret Server Cloud: UK - Access Denied when accessing SSC

Detected by Pingoru
Mar 16, 2026, 12:32 PM UTC
Resolved
Mar 16, 2026, 10:00 AM UTC
Duration
Timeline · 2 updates
  1. resolved Mar 16, 2026, 12:32 PM UTC

    We are investigating reports from a subset of customers experiencing "Access Denied" errors, intermittent blocking, or unexpected captcha challenges when accessing Secret Server Cloud. Our cloud Web Application Firewall (WAF) provider detected an anomalously high request rate and activated DDoS mitigation, which resulted in these access issues. Upon investigation, we verified that the increased request count was legitimate and worked with our WAF provider to disable mitigation for this event. We will continue to collaborate with our vendor to improve anomaly detection and reduce the likelihood of false-positive events in the future. We apologize for any inconvenience this may have caused and appreciate your patience as we work to ensure reliable access. For assistance or further updates, please contact our support team at https://support.delinea.com.

  2. postmortem Mar 26, 2026, 05:25 AM UTC

    ## Incident Overview On Monday, March 16, 2026, customers hosted on the Delinea Secret Server Cloud \(SSC\) UK cluster experienced a service disruption that prevented access to the SecretServer endpoint. The Delinea WAF blocked inbound traffic to the affected endpoint as an automated protective response after regional traffic volumes exceeded predefined DDoS threshold limits. * Start Time: February 16, 2026 – 10:03 UTC * End Time: February 16, 2026 – 10:57 UTC ## Root Cause The incident was caused by abnormally high traffic generated by a single customer Secret Server engine, which exceeded predefined DDoS protection threshold limits in the UK region. Key contributing factor: * Engine request spike:` `Traffic from secret-server-engines increased dramatically from a typical baseline of fewer than 100 calls to approximately 27,000 calls, triggering automated DDoS protection mechanisms. ## Preventive Actions * The UK site DDoS threshold was temporarily increased to 4500, allowing legitimate but abnormal traffic patterns to be handled while ensuring continued regional protection. * Enhance monitoring to identify sharp, customer-specific engine call spikes.

Read the full incident report →

Minor March 12, 2026

Platform: Global - Federation Error 102 Missing SSO Attribute

Detected by Pingoru
Mar 12, 2026, 01:49 AM UTC
Resolved
Mar 12, 2026, 02:38 PM UTC
Duration
12h 48m
Affected: PlatformPlatformPlatformPlatformPlatformPlatform
Timeline · 8 updates
  1. investigating Mar 12, 2026, 01:49 AM UTC

    We are currently investigating an issue affecting SSO authentication for some customers. Impacted users are encountering Federation Error 102 during login. Our team is actively investigating.

  2. investigating Mar 12, 2026, 02:57 AM UTC

    We are continuing to investigate this issue.

  3. identified Mar 12, 2026, 04:59 AM UTC

    We have identified that affected customers have their "Map federated user to existing directory user" setting configured as Disabled, which is not the default setting. The default value for this setting is Optional. 1. From the left navigation, click Settings, then select Federation Providers. 2. Click the name of your federation provider. 3. On the Settings tab, click Edit. 4. Under User Mappings, locate the "Map federated user to existing directory user" option. 5. Change the value from Disabled to Optional. 6. Click Save. We are currently working on a remediation and will provide an update once it is complete.

  4. identified Mar 12, 2026, 06:15 AM UTC

    We have verified a fix for this issue and will be deploying a hotfix at the earliest opportunity. Once the hotfix is applied, affected customers who applied the workaround will be able to revert their "Map federated user to existing directory user" setting back to Disabled. We will provide an update once the hotfix has been successfully deployed.

  5. identified Mar 12, 2026, 11:16 AM UTC

    We are aware that some customers are unable to apply the previously communicated workaround due to the error: "Entra Tenant Id is already in use." We are currently working to deploy a permanent fix that will resolve this issue without requiring customers to apply the workaround. We will provide a further update once the fix has been successfully deployed. We apologize for the inconvenience and thank you for your patience.

  6. monitoring Mar 12, 2026, 01:47 PM UTC

    A fix has been implemented and we are monitoring the results.

  7. resolved Mar 12, 2026, 02:38 PM UTC

    This incident has been resolved.

  8. postmortem Mar 26, 2026, 05:27 AM UTC

    ## Incident Overview On March 12, 2026, a subset of customers in Australia \(AU\) and the United States \(US\) regions began experiencing Federation configuration error. The issue rooted from a planned software update that prevented some users from logging in to Platform. This was caused by the user session becoming corrupted or inconsistent. Start Time: March 12, 2026 – 01:33 UTC End Time: March 12, 2026 – 14:43 UTC At the time of the incident only AU and US were marked as impacted, but later investigations identified that it impacted subset of clients globally. ## Root Cause The incident was caused by a defect introduced in the Identity API release that corrupted user authentication state for federated users. This error persisted even after the deployment was rolled back, requiring a targeted fix to repair affected tenants. Key contributing factors included: A defect in the new Identity API release caused user accounts to enter a broken state upon authentication. Automated background session refreshed affected users who were not actively logged in, extending the scope of the impact beyond those actively using the platform. The sequence of multiple coordinated releases made it more difficult to isolate the faulty component quickly ## Preventive Actions * A targeted new build was developed and deployed to handle users who entered the bad state, fully resolving the incident. * We are adding additional pre-release testing for federated authentication flows: All releases that touch authentication, Identity, or federation service will have dedicated test coverage. * Cross-service release dependency review: We are confirming that the combination of releases has been tested together in lower silos, not just each service in isolation.

Read the full incident report →

Minor March 8, 2026

Privileged Access Service/ Cloud Suite: Authentication Issues

Detected by Pingoru
Mar 08, 2026, 03:53 PM UTC
Resolved
Mar 09, 2026, 03:57 PM UTC
Duration
1d
Affected: Privileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud SuitePrivileged Access Service / Cloud Suite
Timeline · 4 updates
  1. investigating Mar 08, 2026, 03:53 PM UTC

    We are receiving reports of a small subset of customers experiencing difficulties connecting to PAS/Cloud Suite due to Delinea rotating the wildcard.my.centrify.net certificate yesterday (March 7th). Sectigo certificates require a new root and intermediate certificates that can be manually downloaded from Sectigo for those systems that are not automatically updated. Our team is actively working on a KB article for this issue. Most systems have already pulled this updated certificate. While the KB Article is being created, in the meantime if you need to install the cert for your system, you can download it via the links below. Root Cert from Sectigo: https://crt.sh/?d=4256644734 Intermediate Cert from Sectigo: https://crt.sh/?d=4267304690 Information from Sectigo on the Root Cert rotation: https://www.sectigo.com/sectigo-public-root-cas-migration

  2. identified Mar 08, 2026, 05:24 PM UTC

    The issue has been identified. Please see the links below to resolve. If you need to install the new root certs for your system, you can download it via the links below. Root Cert from Sectigo: https://crt.sh/?d=4256644734 Intermediate Cert from Sectigo: https://crt.sh/?d=4267304690 Information from Sectigo on the Root Cert rotation: https://www.sectigo.com/sectigo-public-root-cas-migration

  3. identified Mar 08, 2026, 08:31 PM UTC

    We are continuing to work on a fix for this issue.

  4. resolved Mar 09, 2026, 03:57 PM UTC

    This incident has been resolved.

Read the full incident report →

Minor February 9, 2026

Platform: Error Message When Navigating Between Pages

Detected by Pingoru
Feb 09, 2026, 08:31 PM UTC
Resolved
Feb 09, 2026, 09:12 PM UTC
Duration
40m
Affected: PlatformPlatformPlatformPlatformPlatformPlatformPlatform
Timeline · 5 updates
  1. identified Feb 09, 2026, 08:31 PM UTC

    We are currently investigating an issue where some platform users are receiving the error message: "Cannot access 't' before initialization" This occurs when navigating between the following sections: User Management Network At this time, we are not aware of any functional impact beyond the display of this error message. We have identified the issue as being related to a recent release and are actively rolling back the change to restore normal behavior. We will provide an update once the rollback is complete.

  2. monitoring Feb 09, 2026, 08:42 PM UTC

    A fix has been implemented and we are monitoring the results.

  3. monitoring Feb 09, 2026, 08:46 PM UTC

    We are continuing to monitor for any further issues.

  4. resolved Feb 09, 2026, 09:12 PM UTC

    This incident has been resolved.

  5. postmortem Feb 19, 2026, 02:38 PM UTC

    **Incident Overview** Between 2:20 PM and 3:34 PM EST on February 9, 2026, Platform users experienced red banner errors, “Cannot access ‘t’ before initialization”, when clicking on the Discovery link in the left-hand navigation. These errors occurred due to client-side bundle incompatibility introduced during a recent Platform update. * Start of Impact: February 9, 2026, at 19:20 UTC * End of Impact: February 9, 2026, at 20:34 UTC **Resolution** We resolved the incident by pinning our build tooling back to the previous compatible version of webpack, which restored correct bundle generation and eliminated the errors. Normal service was confirmed to be restored by 3:34 PM EST. **Root cause** The incident was caused by a minor Angular framework update that indirectly upgraded the webpack to a newer version - a change that was not explicitly requested or anticipated. This newer version of webpack generated application bundles in a format that was incompatible with our existing module federation setup, which is the mechanism we use to load different sections of the platform as separate, independently deployable units. When the incompatible bundle was loaded, it caused client-side errors that surfaced to users as red banner messages. **Preventative Actions** We are taking the following steps to reduce the risk of similar incidents occurring in the future: * As a longer-term improvement, we are planning a migration away from our current module federation setup to native federation, which will eliminate the dependency on webpack and reduce the risk of similar issues in the future.

Read the full incident report →

Looking to track Thycotic downtime and outages?

Pingoru polls Thycotic's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Thycotic reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Thycotic alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Thycotic for free

5 free monitors · No credit card required