Cyberark 1
Cyberark 1
Cyberark 1
Cyber Ar k Un
Uniive
ver
r sit
ityy
Privil
rivileged
eged Acc
Account
ount Sec
Securi
ritty Ad
Admi
min
nis
isttr ati
ation
Cyber Ark Universi
Universitty Exercise Gu
Guide page 1
5/21/2018
© Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd - No par
par t of this
th is mate
ateri
ria
al may be discl
disclo
osed to any
any pe
pers
rson
on or
or f
f irm o
irm or
r r
r epr
epr oduc
oduced by
b y an
anyy mean
eans
s, el
electr onic
onic
and mechan
hanicica
al, wi
without
thout the ex
e xpr ess
ss p
pri
rio
or wri
written
tten permissi
permission
on of Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd.
Conte
Cont ent
ntss
Cyber Ark Universi
Universitty Exercise Gu
Guide page 2
5/21/2018
© Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd - No par
par t of this
th is mate
ateri
ria
al may be discl
disclo
osed to any
any pe
pers
rson
on or
or f
f irm o
irm or
r r
r epr
epr oduc
oduced by
b y an
anyy mean
eans
s, el
electr onic
onic
and mechan
hanicica
al, wi
without
thout the ex
e xpr ess
ss p
pri
rio
or wri
written
tten permissi
permission
on of Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd.
Cyber Ark Universi
Universitty Exercise Gu
Guide page 3
5/21/2018
© Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd - No par
par t of this
th is mate
ateri
ria
al may be discl
disclo
osed to any
any pe
pers
rson
on or
or f
f irm o
irm or
r r
r epr
epr oduc
oduced by
b y an
anyy mean
eans
s, el
electr onic
onic
and mechan
hanicica
al, wi
without
thout the ex
e xpr ess
ss p
pri
rio
or wri
written
tten permissi
permission
on of Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd.
Cyber Ark Universi
Universitty Exercise Gu
Guide page 4
5/21/2018
© Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd - No par
par t of this
th is mate
ateri
ria
al may be discl
disclo
osed to any
any pe
pers
rson
on or
or f
f irm o
irm or
r r
r epr
epr oduc
oduced by
b y an
anyy mean
eans
s, el
electr onic
onic
and mechan
hanicica
al, wi
without
thout the ex
e xpr ess
ss p
pri
rio
or wri
written
tten permissi
permission
on of Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd.
Cyber Ark Universi
Universitty Exercise Gu
Guide page 5
5/21/2018
© Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd - No par
par t of this
th is mate
ateri
ria
al may be discl
disclo
osed to any
any pe
pers
rson
on or
or f
f irm o
irm or
r r
r epr
epr oduc
oduced by
b y an
anyy mean
eans
s, el
electr onic
onic
and mechan
hanicica
al, wi
without
thout the ex
e xpr ess
ss p
pri
rio
or wri
written
tten permissi
permission
on of Cy
Cybe
ber-
r- Ark
Ark®® Softw
Soft war e Ltd.
CyberArk Privileged Account Security Administration
Administratio n
Introduction
Using Skytap
Before beginning exercises, here are a few tips to help you navigate the labs more
effectively.
There are two ways to access the virtual machines: directly via the browser or through
RDP.
Click directly on the screen icon to access the virtual machine directly in your
browser.
Click on the RDP button in the upper right-hand corner of the VM box.
If you are using any keyboard other than a standard US, then it is strongly recommended
that you use an RDP connection rather than the HTML 5 client directly in the browser.
When using RDP, all you need to do is set the keyboard language in Windows and
everything should work fine.
Go to the section for International Users for instructions on changing the keyboard.
1. Click the large monitor icon to connect with the HTML 5 client.
5/21/2018
CyberArk Privileged Account Security Administration
3. Use the Ctrl-Alt-Del button on the tool bar to send a Ctrl-Alt-Del to the machine.
4. The clipboard icon will allow you to copy and paste text between your computer and
your lab machine.
5. The fu
settings to avoid scrolling.
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
10. With the option Eng lish (U ni ted States) selected, click the Move down button. This
Note: If you use an alternate keyboard layout (e.g. AZERTY, Dvorak) you can click options
next to your language to install that. Otherwise, close the Language window.
11. In the system tray, click ENG, then choose your keyboard layout. You may switch
back and forth between keyboard layouts. Your instructor may need to switch back
to ENG to help you with exercises, occasionally.
5/21/2018
CyberArk Privileged Account Security Administration
10. Click on the pull-down and examine the Authent ic at i on method s options available.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
5. Press Add from LDAP (You may not see all of the groups shown below).
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
6. In the Filter field
field of the Fi nd x te
nd E ter na
nal Us
l User
/Gr oup
oup screen, enter cy be
ber ark p
p”. This will
find the Power Users. Press Search.
1. Within the Users and Groups on Server Prod window, highlight PV W
W A
M on
oni to
tor and
r and
press Update
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
3. Select Cy be
ber
Ark Po
Pow er Us
r Users.
rs.
5/21/2018
CyberArk Privileged Account Security Administration
7. Press Close Prod
the nesting process.
Viewing the differences between Vault Admins and Power Users groups
Next, you will login to the PVWA to view the differences between Vaul t Ad mi ns and
Cy ber
Ark Pow er Users directory mappings within the PVWA.
Up to this point we have been logging in with users who were created on the CyberArk
system and authenticated by CyberArk .
Since the LDAP integration has already been configured, we will log in to the PVWA with
Active Directory credentials and be authenticated with LDAP. From this point forward, you
will use LDAP Authentication for all users except Ad mi nist ra
tor . The Ad mi nist ra
tor user will
use CyberArk Authentication.
5/21/2018
CyberArk Privileged Account Security Administration
Note: You may receive a message from Firefox saying that blocking Flash player is
blocked. Enable the plug-in and choose the option to remember this choice.
3. Confirm that your LDAP authentication was successful and you are able to view the
Policies, Reports, and Administration screens. This verifies that the LDAP user
(vaultadmin01) has the correct Vaul t Ad mi ns and PV W A
M oni tor privileges.
5/21/2018
CyberArk Privileged Account Security Administration
4. Go to POLICIES > Access Control (Safes) and verify that you can see the Add
Safe button in the upper right hand corner of the window. This confirms that the
v aul tad mi n01 user has been provided the Add Safe s vault authorization.
5. Log out of the PVWA and log back in as pow er user 01 using LDAP as the
authentication method.
5/21/2018
CyberArk Privileged Account Security Administration
4. Press OK to confirm that you would like to verify the password.
Note:
6. After a few minutes the message should disappear and the Last v eri fi e
d field will be
updated.
5/21/2018
CyberArk Privileged Account Security Administration
Note: You can speed up the process by restarting the CyberArk Password Manager
service in the Windows Services console. This is not something you would
normally do in a production environment.
5/21/2018
CyberArk Privileged Account Security Administration
Note:
Hint: You can restart the CyberArk Password Manager service to move things along.
5/21/2018
CyberArk Privileged Account Security Administration
4. On the Safe Details page, click the Add Member button to grant other users access
to this safe.
5. Enter wi n in the Search field, select cy ber-ark-demo.l oc al in the Search In field, and
click Search.
6. Select Wi ndows Ad mi ns.
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
3. Click Active. Review the options available. When ready, press Finish.
5/21/2018
CyberArk Privileged Account Security Administration
1. Back in the Master Policy page, again under Privileged Access Workflows , select
the option R equir e Users to s peci f y r eason for acc ess and press Add Exception.
Password Management
Based on what you have already learned, you should now be able to add Password
Management exceptions for the two platforms we created in the section Password
Management Part 1. Add the following exceptions
5/21/2018
CyberArk Privileged Account Security Administration
Log-on accounts
Windows server local admin accounts with reconciliation
Dual control workflow
Exclusive and one-time passwords
Unix via SSH keys account (optional)
In this exercise you will add to our CyberArk PAS implementation a Linux privileged
account that is prevented from accessing the server
manage the password despite the SSH restriction. The logon account establishes the
connection to the target machine and executes a switch user operation to the privileged
account in order to change the password.
In the Unix/Linux world, the account that is typically prevented from connecting to a
server remotely is the root account. Here in CyberArk training, we are going to use
an account named user01 and we will use the account we created earlier, logon01,
as the log-on account.
4. Press Save.
5/21/2018
CyberArk Privileged Account Security Administration
7. Highlight the l ogon01 account (created earlier - you may need to search to see this
user) and click Associate.
8. Press the Verify button and click OK to confirm. If you receive the following
message, press OK.
Note: After a few minutes, the account should be verified. In the background the CPM
connected to the server as logon01 and switched to the user01 account to verify the
password.
5/21/2018
CyberArk Privileged Account Security Administration
In this exercise you will create a Windows local server account for which the correct
password is unknown. In order to bring this account under management, you will
associate it with a domain administrator account ( ad mi n01) that can perform a password
change.
Duplicating a Platform
5. Go to UI & Workflows .
5/21/2018
CyberArk Privileged Account Security Administration
7. Go to Automatic Password Management > General and set both the Interv al and
I mmed i ateInterv al to 1.
Note: Once again, we are modifying these values for training purposes only, enabling us
to move a little faster. A one-minute immediate interval is suitable for testing but
should be set to five in a production environment. The Interval parameter should
never be set to 1 in a production environment.
8. Enter Win-Srv in the All ow edSafes field to limit the accounts against which this
platform will be applied. Click Apply to save your change.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
To allow for an automatic release of a checked-out password, you will need to enable
Enforc e one-t im
ime passw or d acc ess for
ss for the platform Wi ndo
ndows Serv er Lo
Loc al Ad
Ad mi
mi ns 45 .
2. Select Wi ndo
ndows Serv er Lo
Loc al Ad
Ad mi
mi ns 45 and
and press Next.
3. Press Active to enable one-time password access for this platform and then click
Finish.
3. Set Mi nVa
nVali d
di
i t
ty
y
Pe
Peri od
od to
to 5.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
4. Press Apply and OK to close the Platform and then sign out of the PVWA.
2. Login to the PVWA as the LDAP user will ’ with the password Cy be
ber ark 1.
5/21/2018
CyberArk Privileged Account Security Administration
6. Log out and log back in as v aul tad mi n01. You should notice a lock icon next to the
l oc al ad mi n01 account.
5/21/2018
CyberArk Privileged Account Security Administration
After several minutes (remember the minimum validity period was set to 5 min), the
v aul tad mi n01 user will be able to access the password and the CPM will have changed the
password.
If the account is not released after several minutes, run the restart.bat file and check
again.
5/21/2018
CyberArk Privileged Account Security Administration
Adding a Safe
Duplicating a Platform
In this section, we are going to create a Platform dedicated to managing accounts used to
access Oracle databases, such as a DBA account.
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
Note: Take a good look at the image above. You may notice that the only active platforms
are those that we have created. This image illustrates why it is a good idea to
deactivate unused platforms. Furthermore, the inactive platforms are not shown
when adding
you want (and possibly make a mistake).
7. Set I mmed i ateInterv al to 1.
9. Press Apply.
11. Click OK to save the changes and close the Platform.
Adding an Account
5/21/2018
CyberArk Privileged Account Security Administration
Address: 10.0.0.20
Port: 1521
Database: x e
Password: Cy ber ark 1
2. Press Save.
Note: Because the policy was set to AutoChangeOnAdd=Yes, the account will be set for
immediate change.
5/21/2018
CyberArk Privileged Account Security Administration
In this exercise, we are going to run the CyberArk Password Upload Utility , a command-
line tool for performing bulk uploads of accounts into the system. For convenience, we will
run the Password Upload Utility using the CyberArk ad mi nist r ator account.
We will be adding the new accounts to a new Safe that we create with the PUU
LinuxPU.
The ad mi nist r ator does not have any custom safe authorizations and so cannot even see
the safes that we have created so far. We want to use our existing Linux Finance safe as
a tem pl ate safe (basically a standard safe that provides parameters not given during the
execution of the PUU), so we just need to add the ad mi nist ra tor to the Linux Finance safe
as a member before starting the Password Upload Utility process.
5/21/2018
CyberArk Privileged Account Security Administration
1. Go to the C :\Passw or d U
pl oad U ti li ty
directory.
5/21/2018
CyberArk Privileged Account Security Administration
3. On the T e x t I m por t screen make sure that the file is only Separated by…Comma .
4. Press OK.
5. Review the contents of this file to see the options available for uploading accounts.
5/21/2018
CyberArk Privileged Account Security Administration
6. Close the file when you are done (Note, we will use a preformatted file to perform the
actual import).
8. Make sure that the file is Separated by…Comma and press OK.
5/21/2018
CyberArk Privileged Account Security Administration
Note: This is a pre-formatted file with all the necessary information to upload into
CyberArk.
9. If you would like to experiment, you can add a line or two to the file. Adding the
information below would add a single new account in a separate Safe named
LinuxPU2.
Password_na e: li nu x ad mi n01
TemplateSafe: Li nu x Fi nanc e
Folder: R oot
CPMUser: Passw or d Ma
nager
Safe: Li nu x P U2
Password: Cy ber ark 1
DeviceType: Oper at in
g System
PolicyID: Li nu x SSH 30
Address: 10.0.0.20
UserName: li nu x ad mi n01
10. Save and close the file when done. Be sure to maintain the same CSV format .
5/21/2018
CyberArk Privileged Account Security Administration
12. In the address field, enter the IP address your vault server (make sure you use the
IP address of your Vault Server).
PasswordFile: pu_passw or ds
.csv
DefaultTemplateSafe: Li nu x Fi nanc e
5/21/2018
CyberArk Privileged Account Security Administration
2. Click
3. Review the options to filter the report but keep the default values, then click .
5/21/2018
CyberArk Privileged Account Security Administration
5. Select the refresh icon at the bottom of the page until the report status shows
Excel icon.
5/21/2018
CyberArk Privileged Account Security Administration
7. After going over the report, save the new report in the folder you created earlier in the
shared drive. If you are asked if you want to save the document in its current format,
click Keep Current Format
2. Under Tools > Reports , click on Safes List to generate a safes list report
5/21/2018
CyberArk Privileged Account Security Administration
3. Click Report Output and save the new report to the folder you created. (If you
cannot save it directly to the network drive, save it locally)
5/21/2018
CyberArk Privileged Account Security Administration
6. Click OK
7. After reviewing the report, save a copy of the report to the folder you created in the
shared drive.
9. Repeat these steps creating a User s List report and copy the report to the folder you
created in the shared drive.
10. By the end of this exercise you should have 3 reports in your named folder in the
Privileged Accounts Inventory Safes List
Users List
5/21/2018
CyberArk Privileged Account Security Administration
Again for the sake of convenience, we will be using our Ad mi nist r ator account to perform a
number of tasks during backup and restore.
We will begin by enabling two additional CyberArk accounts: Back up, which we will use to
execute the back up; and DR , the disaster recovery account that has authority to restore
objects, create Safes, etc.
For this section of the exercise, you will log in to the PrivateArk Client on the
Components server in order to enable the users required to run a backup.
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
5/21/2018
CyberArk Privileged Account Security Administration
VAULT = “ Vaul t ”
ADDRESS=10.0.10.1
PORT=1858
5/21/2018
CyberArk Privileged Account Security Administration
CreateCredFile.exe user.ini
Vault Username [mandatory] ==> backup
Vaul t Passwor d…==> Cyberark1
17. Press enter to accept the defaults for the remaining questions.
5/21/2018
CyberArk Privileged Account Security Administration
Note: The target machine 10.0.0.21 does not exist. This is just a dummy account to test
Back-up and Restore.
5/21/2018
CyberArk Privileged Account Security Administration
Running a Backup
If the backup is successful, you should see a number of messages indicating that that files
are being replicated with a final message stating that the replication process has ended.
1. Making sure you are logged into the PVWA as the ad mi nist r ator user, go to
POLICIES > Access Control (Safes) .
3. Press Yes to confirm that you would like to delete the safe and contents.
4. You will receive a message that the R oot folder cannot be deleted for 7 days.
However, the contents of the safe should have been removed.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
9. We are now looking at the Account Details for the Scheduled Task. Press the
Associate button.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
5/21/2018
CyberArk Privileged Account Security Administration
Note: The scheduled task is associated with a different platform than the localadmin01
account. After the localadmin01 account has been changed, the flag will be set for
the scheduled task to be changed. The entire process could take in excess of 10
minutes to complete.
14. After the Windows password has been changed, select the scheduled task and open
the Account Details. You will see that the usage password is now scheduled for
immediate change.
15. Wait for the usage password to change and then re-run the scheduled task from the
command prompt.
16. e scheduled
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
8. Enter T
Enter T e x t
tC
C
onf
onf i
ig il e as the Value . Pr ess Apply and OK.
Fil
g F
9. In the interest of good practice, create a dedicated Safe for this purpose called Linux
Apps.
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
Address: 10.0.0.20
File Path: / v
va
r
/opt/app/app01.i ni
Password Regex Passw or d=
d=( .*
)
.*
Connection Type: SSH
5/21/2018
CyberArk Privileged Account Security Administration
Administratio n
Note::
Note This process can take several minutes to complete. The usage has interval settings,
just like the account. When the account
account changes,
changes, it scans the vault for usages,
marks those usages for change, and then according to those intervals the changes
take effect.
So it will be a few minutes between when the password changes and the file
changes.
16. After the password change is complete, connect to 10.0.0.20 with the app-acc ount01
ount01.
5/21/2018
CyberArk Privileged Account Security Administration
Fil e c ategory is the CyberArk term for the attributes or fields available on accounts
(Address, User Name, etc.). This section will detail the steps required to create and use
custom file categories, all
requirements.
1. Using the Components server, from the PrivateArk Client, log onto the Vault and go
to File > Server File Categories.
5/21/2018
CyberArk Privileged Account Security Administration
Name: Busi nessU ni t
Type: List
4. After each value is added, select the R equir ed C ategory checkbox and click OK.
9. Go to UI & Workflows > Properties > Required. Right-click and select Add
Property from the context menu.
5/21/2018