Last Updated: 2025-02-03
Purpose
This article provides set up information on the CyberArk integration.
Introduction
CyberArk enables organizations to securely store and manage passwords, encryption keys, and other credentials. This helps prevent unauthorized access to sensitive systems and information. This article outlines the setup process for integrating CyberArk, a tool for securely managing passwords and credentials. To add a CyberArk integration a PEM-formatted certificate, a .pem file , is required, which can be generated using OpenSSL.
Add New CyberArk Integration
To add a CyberArk integration:
-
Go to Configuration > Integration in the left hand side menu.
-
Click the green
icon to open a new integration form. -
Select CyberArk in the drop-down menu.
-
Fill in credentials such as Name, URL, Application ID, Default safe, Default folder.
|
Option |
Description |
|---|---|
|
Name |
Name of the integration. |
|
URL |
URL to the CyberArk integration. |
|
Application ID |
CyberArk token used for authentication. |
|
Default safe |
Default value used for CyberArk safe. If this field is empty in next step (in the credentials) this value is used instead for safe. |
|
Default folder |
Default value used for CyberArk folder. If this field is empty in next step (in the credentials) this value is used instead for folder. |
Only selecting an integration for credentials will not get the values from integration into credentials. You have to add jinja variables in the credentials fields.
For example, if you enter {{Content}} in the field, we will get password value from CyberArk and use that in credential.
-
Click the blue upload button and select a PEM-formatted certificate file. See How to Generate a .pem File with OpenSSL section on how to create a .pem file.
-
Click the blue ADD to save the new integration.
If both Safe and Folder field is empty then CyberArk will search in all safes and folders.
If Safe have value and Folder field is empty then Root will be default folder and Cyberark will only search in Root folder.
If Folder has value it should be the full path, like Root/Groups, Cyberark will not search in subfolders
How to Generate a .pem File with OpenSSL?
Prerequisite
You need to install OpenSSL before performing this step.
Generate the .pem File
Follow these steps to generate a .pem file using OpenSSL:
-
Open a command prompt or terminal.
-
Navigate to the directory where you want to generate the .pem file.
-
Run the following command to generate a private key and CSR (Certificate Signing Request) file:
openssl req -newkey rsa:2048 -nodes -keyout private.key -out csr.csr -
Follow the instructions to enter the necessary information for the CSR.
-
Next, run the following command to create the .pem file:
openssl x509 -req -in csr.csr -signkey private.key -out certificate.pem
OpenSSL will be created in the same directory.
Link a CyberArk Integration to an Account
To link a CyberArk integration to an account:
-
Click the Account view in the upper right corner and select Credentials.
-
Click the Add Credentials button on bottom right corner.
-
Select Web in the drop-down menu.
-
Fill in the credentials.
-
Fill in CyberArk Object, CyberArk Safe, CyberArk Folder. If any of these are empty, the default value in the previous step is used.
Edit Credentials
To edit account’s integration:
-
Click the Account view in the upper right corner and select Credentials.
-
Click on the Edit icon inside account card.
-
Change the credentials and click Save.
Troubleshooting
If something goes wrong when using the credentials with integrations when scanning, an error message is displayed in the scan details.
Related Articles
- 2FA on User Accounts
- Accepting a Risk
- Account
- Agent Assessment
- Agent Call Home
- Agent Installation Introduction
- Agent Introduction
- Agent Latest Version
- API Examples
- Asset Discovery
- Assets
- Authenticated Network Scan
- Automatic Asset Joining With Netsec
- Basic Credentials
- Certificates
- Change Instance Type on HIAB on Amazon Web Services
- Check Connectivity to Agent Server
- Checking if Agent is Running
- Checking if the Agent has Produced Results
- Checking Schedules from OUTSCAN in Agent
- Column Configuration
- Common Settings Panel
- Configuring and Accessing the HIAB console using SSH
- Container Inspection - Azure
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- CyberArk Integration
- Delinea Integration
- Delta
- Discovering the Agent in OUTSCAN
- Discovery Scan Configuration
- Discussions and Commenting
- DNS Lookup in UI and in Console
- Download Agents
- Event Notification - Integration
- Event Notification - Use Cases
- Filters
- Finding the Agent Version
- Firewall Rules
- Firewall Setup for Agents
- General Information about SMB/WinRM Scanning
- Generate Reports
- Getting Started with the Portal
- Hardening the HIAB
- HIAB Backup
- HIAB Console
- HIAB Deployment Guide
- HIAB Distribution Settings
- HIAB E-mail Whitelisting
- HIAB Enrollment
- HIAB Maintenance Settings
- HIAB Remote SSH Guide
- HIAB Remote Support
- HIAB Restore
- HIAB Server Settings
- HIAB Setup Guide
- HIAB Updates
- Identity and Access Management (IAM)
- Importing Tags for AWS Discovery
- Installing a Linux Agent
- Installing a macOS Agent
- Installing a Windows Agent
- Integration Management
- Integrations
- Licensing Consumption
- Log In Using LDAP
- Log In Using Single Sign-On (SSO)
- Logging in to the Portal
- Managing Agents
- Managing Tags
- Marking as False Positives
- Network Discovery
- Network Host Assessment
- Notification Settings
- Notifications
- Object Identifiers
- PGP on User Accounts
- Portal Icon List
- Portal Integration with ServiceNow Incidents
- Ports
- Products
- Products Database
- Read Agent Scan Result
- Removing an Agent from Linux
- Removing an Agent from Windows
- Report Library
- Reports
- Resource Group Management
- REST API Interface Technical Document
- Retrieving a REST API Token From XMLAPI
- Retrieving Results From the Agent in OUTSCAN
- Retrieving the Agent UUID
- Role Management
- Scan Assessment Configuration
- Scan Blueprint
- Scan Configuration Settings
- Scan Credentials
- Scan Policies
- Scan Scheduling Errors
- Scan Stages
- Scanning Range
- Scans View
- Scheduled Reports
- Schedules
- Services
- Setting Up an Agent Using System Proxy
- SMB Credentials
- SNMP Integration
- Solutions
- SSH Credentials
- Subscriptions Overview
- Supported Browsers
- Syslog Integration
- Tags
- Technical Specification
- Troubleshooting checklists
- Understanding Scanner and Scheduler
- Updating the Agent
- User Management
- Using the Agent Info Command
- View Templates
- Virtual HIAB Appliance
- VMware vSphere Credentials
- Vulnerabilities
- Vulnerability Database
- Webhook Integration
- Webhook Integration with JIRA
- Webhook Integration with Microsoft Teams
- Webhook Integration with OAuth v2
- Workflows
- XML API Interface Technical Document