CyberArk PAM
Visualize CyberArk PAM users, groups, safes, privileged accounts, platforms, and applications in JupiterOne. Map CyberArk users to employees, monitor safe access assignments, and track privileged account management through queries and alerts.
- Installation
- Data Model
Installation
To install this integration, you will need to configure settings both within CyberArk PAM and on JupiterOne. Before enabling in JupiterOne, ensure that you complete the setup within your CyberArk PAM environment.
Configuration on CyberArk PAM
A CyberArk PAM user's Base URL, Username, and Password are required for the JupiterOne integration to interact with CyberArk PAM.
The integration authenticates using the CyberArk PAM REST API (v14.6+). An administrator of the CyberArk PAM vault will need to create or designate a user account for JupiterOne with the appropriate permissions.
To configure a CyberArk PAM user for use with JupiterOne:
- Log in to the CyberArk PrivateArk Client or PVWA (Password Vault Web Access).
- Create a new CyberArk user or designate an existing user for JupiterOne.
- Assign the user the following minimum vault-level authorizations:
List Accounts— required to enumerate users and groups.Audit Users— required to retrieve user details.
- For each safe you want JupiterOne to ingest, add the JupiterOne user as a safe member with the following permission:
View Safe Members— required to list members of a safe.
- Note the Base URL of your CyberArk PVWA instance (e.g.,
https://cyberark.example.com).
The integration supports CyberArk, LDAP, RADIUS, and Windows authentication methods. The default authentication type is Cyberark. If your environment uses a different authentication method, you can specify it in the JupiterOne configuration.
The integration automatically appends /PasswordVault to the base URL if it is not already present. Do not include a trailing slash.
Permissions
The API user requires the following permissions to ingest all supported resources:
| Resource | Required Permission |
|---|---|
| Users | Vault-level List Accounts and Audit Users |
| Groups | Vault-level List Accounts |
| Safes | Vault-level List Accounts |
| Safe Members | Safe-level View Safe Members on each target safe |
| Privileged Accounts | Safe-level List Accounts on each target safe |
| Platforms | Vault-level List Accounts |
| Applications | Vault-level List Accounts |
If the API user lacks permissions for a specific resource, the integration will log a warning and continue ingesting other resources rather than failing entirely.
Configuration in JupiterOne
To install the CyberArk PAM integration in JupiterOne, navigate to the Integrations tab in JupiterOne and select CyberArk PAM. Click New Instance to begin configuring the integration.
Creating a CyberArk PAM instance requires the following:
-
The Account Name used to identify the CyberArk PAM account in JupiterOne. Ingested entities will have this value stored in
tag.AccountNamewhen theAccountNametoggle is enabled. -
Description to assist in identifying the integration instance, if desired.
-
Polling Interval that you feel is sufficient for your monitoring needs. You may leave this as
DISABLEDand manually execute the integration. -
Enter the Base URL for your CyberArk PVWA instance (e.g.,
https://cyberark.example.com). Do not include/PasswordVault— it is appended automatically. -
Enter the Username of the CyberArk user designated for JupiterOne.
-
Enter the Password for the CyberArk user designated for JupiterOne.
-
Optionally, enter the Authentication Type if your environment uses a method other than the default CyberArk authentication (e.g.,
LDAP,RADIUS, orWindows).
Click Create once all values are provided to finalize the integration.
Next steps
Now that your integration instance has been configured, it will begin running on the polling interval you provided, populating data within JupiterOne. Continue on to our Instance management guide to learn more about working with and editing integration instances.
Entities
The following entities are created:
| Resources | Entity _type | Entity _class |
|---|---|---|
| Account | cyberark_account | Account |
| Application | cyberark_application | Application |
| Group | cyberark_group | UserGroup |
| Platform | cyberark_platform | Configuration |
| Privileged Account | cyberark_privileged_account | Secret |
| Safe | cyberark_safe | Vault |
| User | cyberark_user | User |
Relationships
The following relationships are created:
Source Entity _type | Relationship _class | Target Entity _type |
|---|---|---|
cyberark_account | HAS | cyberark_user |
cyberark_account | HAS | cyberark_group |
cyberark_account | HAS | cyberark_safe |
cyberark_account | HAS | cyberark_platform |
cyberark_account | HAS | cyberark_application |
cyberark_group | HAS | cyberark_user |
cyberark_group | ASSIGNED | cyberark_safe |
cyberark_safe | CONTAINS | cyberark_privileged_account |
cyberark_user | ASSIGNED | cyberark_safe |