Purpose
This document provides setup information on the CyberArk integration.
Introduction
CyberArk provides a privileged account security solution and password vault. It is required to have the CyberArk AIM suite to use the integration.
CyberArk is supported in HIAB and OUTSCAN for both internal and external IP addresses.
CyberArk authentication cannot be configured on the policy level, only on the target level.
Define the Application Manually via CyberArk
To define the Application manually via CyberArk’s PVWA (Password Vault Web Access) Interface:
-
Log on with a user allowed to managed applications (Manage Users authorization is required)
-
Go to Applications tab, click Add Application; the Add Application page is displayed.
-
Fill with the pre-defined APPID the customer should use, specified in the Name field.
Set Up CyberArk in OUTSCAN or HIAB
To set up CyberArk in OUTSCAN or HIAB:
-
Go to Main Menu > Settings > Integrations.
-
Select the CyberArk tab.
Provide the below information to use CyberArk:
|
Option |
Description |
|---|---|
|
Enabled |
Click on this field to enable CyberArk. |
|
Host |
Provide the hostname to the CyberArk server. |
|
Port |
Provide the port that CyberArk accepts connections on. |
|
AppID |
Enter the application ID, an authentication token from CyberArk. |
|
Default safe |
Provide the CyberArk safe name to be used as default. |
|
Default folder |
Provide the folder to search for secrets. |
|
Save |
Click on this button to save your current settings. |
-
Click Save.
After enabling CyberArk:
-
Go to Main Menu > Netsec > Manage Targets.
-
Edit a target to setup the Authentication.
CyberArk SSHand CyberArk SMB are now visible as new options. -
Click on any of the options to use the respective authentication.
-
Provide your Credentials:
|
Option |
Description |
|---|---|
|
Username |
Provide your username to use when authenticating to the target. |
|
Object name |
Check your CyberArk Vault administrator and provide the object name. It is the name of the "secret" (which contains the specific credential). |
|
Override safe |
Provide a different safe name in case you wish to override the existing safe name. |
|
Override folder |
Provide a different folder name in case you wish to override the existing folder names. |
The Override settings provide the ability to change (override) them on a specific target.
-
Click Test to start a verification.
-
Click Save to enable the current settings.
Related Articles
- Windows 10/Windows 2019 Server
- HIAB Updates
- General Information about SMB/WinRM Scanning
- Change Risk Levels
- Removing an Agent from Windows
- ServiceNow - Legacy
- Windows 8.1
- Netsec Filters
- Discovering the Agent in OUTSCAN
- Technical Specification
- Account Settings
- How to Test SMB Authentication
- Windows 2016 Server
- Identity Provider Settings
- HIAB Server Settings
- Installing a Linux Agent
- Okta Identity Provider Configuration
- Scanning-Less Scanning
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- Overview
- Event Notification Module
- HIAB Maintenance Settings
- HIAB Deployment Guide
- Database Connector (HIAB only)
- Azure AD Identity Provider Configuration
- Add Comments
- Target Groups
- Checking if Agent is Running
- Core Installation
- Windows 2008 R2 Server
- Agent Installation Introduction
- Automatic Asset Joining With Netsec
- Manage Users
- Firewall Setup for Agents
- Scanning Range
- SNMP (HIAB only)
- ADFS Identity Provider Configuration
- Splunk
- Agent Call Home
- Advanced Report Filters
- Accept Risks
- SMB Authentication from OUTSCAN/HIAB
- Virtual HIAB Appliance
- Using the Agent Info Command
- Amazon
- User Roles
- Removing an Agent from Linux
- Retrieving the Agent UUID
- Atlassian Jira
- Understanding Scanner and Scheduler
- Finding the Agent Version
- Create and Edit Event Notifications
- Installing a macOS Agent
- Syslog (HIAB only)
- Setting Up an Agent Using System Proxy
- ServiceNow - App
- Thycotic
- DNS Lookup in UI and in Console
- HIAB Console
- Auditing Guide
- Adding Agent Attributes
- HIAB Distribution Settings
- Run Verification Scans
- Agent Latest Version
- Finding New Agents In OUTSCAN
- Setting up a HIAB as an Appsec Scale Scanner
- Checking Schedules from OUTSCAN in Agent
- Hardening the HIAB
- Performing a PCI DSS Scan
- Two Factor Authentication
- Attributes
- Firewall Rules
- HIAB Enrollment
- Supported Platforms for Authenticated SSH Scanning
- Authenticated Scanning Using WinRM
- OneLogin Identity Provider Configuration
- Windows 7
- HIAB Remote Support
- Compliance Scanning
- Manage Targets
- Assign Tasks
- Authenticated Scanning Using SSH
- Tickets Quick Start Guide
- Retrieving Results From the Agent in OUTSCAN
- Appliance Logs
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Updating the Agent
- Troubleshooting SMB Authentication
- Agent Licensing
- Mark as False Positives
- Installing a Windows Agent
- Using Farsight in Netsec
- Testing Target System for Open TCP Ports
- HIAB Restore
- Scan Stages
- Request Clarifications
- HIAB Setup Guide
- Updating Agent Attributes
- CyberArk
- LDAP/AD
- Checking if the Agent has Produced Results
- ArcSight (HIAB only)
- HIAB E-mail Whitelisting
- Adjust Identity Provider SAML Metadata File
- Scanning Critical Industrial Devices/Machines
- Reporting Tools
- Scan Scheduling
- Scanning Performance and Impact Tuning
- PCI Compliance Scanning
- Configuring and Accessing the HIAB console using SSH
- User Groups
- Create Users
- HIAB Remote SSH Guide
- Download Agents
- Create Targets
- Windows 2012 R2 Server
- HIAB Backup
- Report Scheduling
- Access Tokens
- O24AUTH
- Complementary Authenticated Scan on Default Credentials
- Authenticated Scanning Using SMB
- Dynamic Target Group