CyberArk is a password vault tool. The integration with CyberArk retrieves passwords or credentials to implement discovery and launch remote consoles.

Step 1: Configure the integration

  1. From All Clients, select a client.
  2. Navigate to Setup > Account.
  3. Select the Integrations and Apps tile.
  4. The Installed Integrations page, where all the installed applications are displayed. Note: If there are no installed applications, it will navigate to the Available Integrations and Apps page.
  5. Click + ADD on the Installed Integrations page. The Available Integrations and Apps page displays all the available applications along with the newly created application with the version.
  6. Search for CyberArk using the search option available.
    Alternatively, use the All Categories option to search.
  7. Click Add on the CyberArk tile.
    On the Configuration page, add credential mappings.
  8. Click +Add in the Credential Mappings section.
  9. Enter the following information in the Create Credential Mapping window:
    1. Name: Specify the password vault.
    2. Type: Select Type from the dropdown. Based on the Type selected, the values in the Key and Value fields under Credential Mappings appear.
    3. Enter the values for the respective keys:
      • AppID: Displays the unique ID of the application issuing the password request.
      • UserName: Displays the UserName property of the password.
      • Address: Displays the Address property of the password.
      • PolicyID: Unique ID of the policy.
      • Safe: Name of the Safe where the password is stored. You can add, edit or delete the values accordingly.
    4. Click Add. The configuration is created.
      • Click the three dots icon to Edit, Save As, and remove the password vaults respectively.
      • Click +Add to create credential mappings.
  10. Click Done.

Step 2: Create a credential

  1. Navigate to Setup > Accounts > Clients and select the client for CyberArk credential assignment.

  2. From the Credentials tab, click Add, and enter:

    • Name
    • Description
    • Type: Select SSH from the drop-down menu.
      • Authentication type: Enter either Password or Key Pair. Key Pair
      • Username
      • Use Password Vault
      • Integration: Pre-populated with CyberArk.
      • Policy Mapping: Pre-populated with your configured integration name.
      • Port:
    • Connection Time-out (ms):
  3. Click Next to assign resources.

  4. Click Save.

CyberArk Credential Configuration

Actions on Integration

You can perform actions on an integration.

  • See here for more information.