CyberArk Cookbook Lesson 2a
CyberArk Cookbook Lesson 2a
PVWA
Password Vault Web Access
Cyber-Ark Product Suite
Digital Vault
2
PIM Basic Operation
Supported platforms:
(partial list)
• PIM Workflows
Operating and Policy
systems: UNIX (Solaris, AIX,
HP/UX), Linux, Windows, i5/OS, z/OS,
VMWare ESX
Enforcement: Report
Policy
(partial
• Databases: Oracle, DB/2, list)
SQLServer,
• Password Access
Informix, Sybase, MySQL Vault
• Dual control
• Applications: SAP IT/Auditor
• Integration
• Security withFirewall-1,
Appliances: Ticketing IPSO,
systems
• One-time Passwords,
SPLAT, PIX, Netscreen, Fortigateexclusivity
•• Network
PrivilegedDevices:
SSO Cisco, Juniper, Alcatel,
• Secure
Quintom, F5 Remote Connection
• Transparent
• Directories: Active Connection
Directory, SunONE,
eDirectory, Kerberos, NIS
• Remote Control: HP-iLO, ALOM, HMC Security/
Policy Risk Management
• Generic: Any telnet/SSH device, pluggable
architecture Password Vault
Web Access
3
Objectives
5
Authentication
Type in your user and password
6
Accessing Passwords
7
Searching for Passwords
8
Retrieving Passwords
9
Connect
10
Password Details
11
Password Details cont.
• CPM tab –
– shows the status of the password regarding
current actions of the CPM.
• The password in the picture has an error
–Shows additional password details that are
linked with the CPM tasks
12
CPM Error
13
Password Details cont.
• Activities tab –
– Display all actions that were carried out on the
password and by which user
– To watch activities – click the activities tab
14
Watching Versions
• Click
the versions tab to see all last version and who
created them
• You can show, copy or try to connect with each version
15
Locking Passwords
16
Locking Passwords
17
Requests and confirmations –
submitting a request
18
Requests and confirmations –
submitting a request
• Fill in reason and additional details.
• The request can be confirmed by any of the
authorized users/groups written at the bottom.
19
Requests and confirmations –
confirming a request
• When an authorized confirmer logs in, the
desktop will show:
20
Requests and confirmations
21
Requests and confirmations –
receiving the confirmation
22
Supplying a reason
24
Customizing
• In the Customize
Screen you can:
–Choose the default
view (Dashboard,
passwords, files)
–Choose default tab
(frequently,
Recently)
–Choose how many
password or file
objects to display
in a page
–Change your own
password
25
Cyber-Ark lesson
28
Adding Passwords
• Click the Add Account button and the Add Account tab
will appear
Note: This button
will only be
displayed if you
have Store
authorization in at
least one Safe.
29
Adding Accounts
30
Deleting Accounts
34
Disabling Automatic
management - PVWA
• Edit Password Screen:
36
Resuming Automatic
management
37
Move Accounts Between Safes
39
Ticketing Systems – dual
control
40
Files
41
Summary
• Retrieving Passwords
• Managing Passwords
• Workflow features
• Refer to implementation guide for more
info
42
Q&A