Only Once Share
onboardingITcredentials

Sharing Credentials During Employee Onboarding: A Secure Approach

Employee onboarding inevitably involves sharing credentials: email passwords, VPN access, cloud service logins, database credentials, and more. How your organization handles this process has significant security implications. Here's how to do it right.

The Common (Insecure) Approach

Most organizations default to one of these methods:

  • IT sends credentials via email to the new hire's personal email
  • Credentials are written on a sticky note and left on the desk
  • A shared spreadsheet contains all standard passwords
  • The manager texts or Slacks the password to the new hire

Every one of these methods creates a persistent record of the credential that can be discovered in a future breach.

A Better Workflow

Here's a secure onboarding credential flow that takes minimal extra effort:

Step 1: Prepare Credentials

Before the new hire's start date, gather all the credentials they'll need. Format them clearly:

Email: jane.doe@company.com
Temporary password: [password]
VPN: vpn.company.com
VPN password: [password]
Slack workspace: company.slack.com
Cloud console: console.company.com

Step 2: Create Encrypted Self-Destructing Links

Use Only Once Share to create separate encrypted links for each set of credentials (or one link for all):

  • Set the expiration to match the onboarding timeline (24h is typical)
  • The link encrypts everything in the browser with AES-256-GCM
  • Your IT team never needs to type passwords into email

Step 3: Share the Links

Send each link to the new hire through your standard communication channel. Even if that channel (email, Slack) is later compromised, the links will already be expired and the data destroyed.

Step 4: Require Immediate Password Changes

Set all initial passwords as temporary and require the new hire to change them on first login. This is the most critical step β€” it ensures the shared credential has the shortest possible lifespan.

Step 5: Transition to a Password Manager

Once the employee is set up, enroll them in your organization's password manager for any ongoing shared credentials (team service accounts, shared tools, etc.).

Handling Different Credential Types

Email / SSO

Share the temporary password via encrypted link. If your organization uses SSO (Google Workspace, Okta, Azure AD), the IT admin can set a temporary password and share it securely. Enable MFA as part of the setup process.

VPN / Network Access

VPN credentials are particularly sensitive because they grant network access. Share via encrypted link and rotate the credential after the employee confirms connectivity.

Cloud Services

For AWS, GCP, Azure, and similar services, prefer IAM roles and SSO over shared credentials. When individual access keys are necessary, share them via encrypted link and set rotation reminders.

Database Access

Database credentials should ideally be managed through a secrets manager integrated with your application. For direct access during development setup, share connection strings via encrypted link.

Audit Trail

While self-destructing links intentionally don't leave a record of the secret content, you should maintain a record of what was shared (not the passwords themselves) for compliance purposes:

  • Log which systems the new hire was given access to
  • Record the date credentials were shared
  • Track whether initial passwords were changed
  • Note the onboarding checklist completion

Conclusion

Secure credential sharing during onboarding doesn't need to be complicated. Use encrypted self-destructing links for the initial handoff, require immediate password changes, and transition to a password manager for ongoing access. This approach takes roughly the same amount of time as sending an email β€” but eliminates the persistent security risk that email creates.

Share secrets securely β€” for free

Only Once Share uses AES-256-GCM encryption with zero-knowledge architecture. No account required.

Try Only Once Share
All posts