Algorius Net Viewer Manual | Password Manager

General Information

Password manager maintains the list of logins. Each login has a name, user name and password. Name also used as the login identifier. Logins can be used for automatic authorization on various network devices.

Password manager considers following aspects:

  • Security. All passwords are encrypted with high security level and are available for current OS user only. Microsoft RSA Crypto Provider is used for encryption. Encryption key is stored in the special protected Windows repository and is available for current OS user only. Size of RSA key depends on Windows version and usually equals to 1024 bit. The same way is used to store all passwords which are specified in Algorius Net Viewer settings: for e-mail notifications, Web access etc. In case of app transfer to other PCs, the passwords will need to be entered again, for security purposes. The only exception in this case are the user passwords on the server. In their case, the only thing saved in the database is the hash (using the PBKDF2 algorithm).
  • Multiuser support. Several users can use different logins for the same network map. Moreover, passwords and user names for authorization on devices are not stored in the maps. Maps store only login names (identifiers) to enhance the security.
  • Convenience. All passwords and usernames are specified in application settings in one single place. It is possible to assign the same login for different devices. You can specify which login to use for different devices. Group Operations feature allows making that for several devices on different maps. There is default login, which can be used for devices with no login specified.


The logins are set up separately for the application and for each server. Please note that, for security purposes, servers do not send the client any password information, be it plain or encrypted. That is why, in case the client side requires a login that is stored on the server side, set up a login with the same name in the application settings and provide a password for it. You can also specify a different user name or password. That is to say, the in-app login and password settings override the server login and password settings.

To configure logins, go to Options or the server settings and select Logins:

Following elements are available:

  • Logins for WMI, Inventory, commands — list of all logins with their name and user name. Name of login also serves as its identifier and can be used in device editor. A default login is used for devices without a login.
  • Add — create new password profile.
  • Edit — edit the selected password profile.
  • Copy — copy the login into clipboard. For security purposes, the password cannot be copied.
  • Paste — paste the login from the clipboard. If there's already a login with the same name, the system will display a prompt offering to replace it.
  • Delete — delete the selected password profile. Default profile can’t be deleted.

Using Logins

Logins can be used in the following areas:

  • You can set user name and password in the configuration of external commands and scanning methods via %LOGIN_USER% and %LOGIN_PASSWORD% macro. In the scan results (in detail), the password is automatically replaced with asterisks.
  • MIB Browser and WMI Browser use logins for automatic authorization on a device.
  • Different scanning methods, for example, WMI, URI SQL, Mail, use logins for automatic authorization on a device.
  • Inventory uses logins for automatic authorization.