Skip to content

saviynt/cyberark-vault-connector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cyberark Vault Connector

The CyberArk Vault connector supports fetching secret from vault. It supports 2 modes of integration - PVWA and CCP.

  1. PVWA mode of integration supports dynamic bearer token authentication.
  2. CCP mode of integration supports client certificate based authentication.

This is developed using Saviynt Vault Connector Framework, it also enables configuring vault mapping for each secret parameter on the connection page, allowing it to work with connections that have more than one secret parameters.

This document outlines the steps to use this connector.

Pre-Requisite:

  1. Ensure that you have a working .pfx extension client certificate (validated using Postman) for authentication with CCP. Please refer CyberArk documentation for more details on generating the certificate.
  2. Please raise a Saviynt support ticket for registering the Connector Jar in your EIC environment.

Upload client certificate to EIC:

  1. Log in to EIC.
  2. Go to Admin -> File Directory -> Connector Files.
  3. Upload Client certificate (.pfx extension).

Create connection type:

  1. Log in to EIC.
  2. Go to Connections -> Connection Type List -> Actions -> Create Connection Type.
  3. Enter Connection Type Name as "CyberArkVault".
  4. Select Enhanced Connector Framework as true, from the popup windows select "CyberArk Vault::1.0" -> Get Config.
  5. This will populate default values -> click on Create.

Create/Configure the CyberArk Vault connection:

  1. Go to Connections -> Connection List -> Actions -> Create Connection.
  2. Enter Connection Name "CyberArkVault".
  3. Select Connection Type as "CyberArkVault".
  4. Select Connector Version as "CyberArk Vault::1.0"
  5. Configure rest parameters as below:
Parameter Name Description
INTEGRATION_MODE It is a mandatory parameter, expects administrator to configure CCP or PVWA here. Connector defaults to PVWA if invalid value is configured.
HOSTNAME Enter CCP/PVWA hostname or IP address for e.g. server.example.com or 10.20.30.40
PVWA_USERNAME Enter Username to authenticate with PVWA service, this is used if INTEGRATION_MODE is PVWA
PVWA_PASSWORD Enter Password to authenticate with PVWA service, this is used if INTEGRATION_MODE is PVWA
CCP_AUTH_CERTIFICATE Enter PFX file name which will be used for CCP client certificate based authentication for e.g. TestCert.pfx, this is used if INTEGRATION_MODE is CCP. This file needs to be uploaded to File Directory -> Connector Files
CCP_AUTH_CERTIFICATE_PASSPHRASE Provide passphrase to be used alongside CCP_AUTH_CERTIFICATE

Use CyberArk Vault connector to get secret in IGA connector:

  1. Go to Connections -> Connection List -> Open a connection which requires to fetch a secret value from CyberArk vault, for e.g. any AD connection.
  2. Select Credential Vault Connection as "CyberArkVault".
  3. Click on Vault Config -> Advanced.
  4. Depending on INTEGRATION_MODE used in CyberArkVault connection, enter the vault config.

If INTEGRATION_MODE is CCP:

{
  "encryptionmechanism": "None",
  "AppID": "App_Saviynt",
  "ignoreMapping": [
    "AppID",
    "Safe",
    "Object"
  ],
  "Safe": "Safe_Saviynt",
  "Object": "Operating System-DummyPlatform-dummy"
}

If INTEGRATION_MODE is PVWA:

{
  "reason": "EIC retrieval",
  "encryptionmechanism": "None",
  "ignoreMapping": [
    "AccountName",
    "SafeName",
    "reason",
    "TicketingSystemName"
  ],
  "SafeName": "Safe One",
  "TicketingSystemName": "SNOW",
  "AccountName": "Acct one"
}

Important points to consider:

  1. You can configure additional attribute mapping as per API support from CyberArk.
  2. PVWA implementation uses SafeName and AccountName to internally fetch the AccountID and then corresponding secret value.
  3. If you don't specify a parameter under ignoreMapping, connector automatically prefix the connection name before parameter value during API calls, for e.g. if you don't specify SafeName in ignoreMapping, connector will use "ConnectionName_Safe One" value, if you have AccountName and SafeName etc. created with connection name prefix in CyberArk target, you don't need to specify them in ignoreMapping, however if your objects don't have connection name as prefix in CyberArk target, specify them under ignoreMapping, so while calling CyberArk connector passes the value without prefixing connection name.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages