0% found this document useful (0 votes)
146 views

06 PAS Fundamentals Integrations

This document discusses integrating CyberArk with external systems like LDAP, SMTP, SNMP, and SIEM. It covers configuring LDAP integration to automate user provisioning and separate vault admins from identity functions. It also covers configuring SMTP, SNMP, and SIEM integrations to enable notifications, monitoring, and correlating privileged account activity.

Uploaded by

Oliver Quiambao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views

06 PAS Fundamentals Integrations

This document discusses integrating CyberArk with external systems like LDAP, SMTP, SNMP, and SIEM. It covers configuring LDAP integration to automate user provisioning and separate vault admins from identity functions. It also covers configuring SMTP, SNMP, and SIEM integrations to enable notifications, monitoring, and correlating privileged account activity.

Uploaded by

Oliver Quiambao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

CyberArk University

Integrations

1
Objectives

By the end of this session you will be able to:


▪ Describe ho Identity & Authentication functions in CyberArk.
▪ Integrate CyberaArk with the following external systems:
■ LDAP Integration
■ SMTP Integration
■ SNMP Integration
■ SIEM Integration
■ NTP Integration

2
LDAP Integration

3
Overview

▪ LDAP integration allows an organization to automate user provisioning and


to separate Vault Admins from I&A functions.
▪ Users are transparently provisioned in the Vault with their user information
(full name; email address), and their security information (such as groups).

4
LDAP Integration (1)

▪ Prepare the LDAP server:


■ Create an LDAP Bind account with READ ONLY access to the directory.
• Have the User Name, Password, and DN available.
■ Create three LDAP groups that will be used for Vault access.

LDAP Group Vault Group


CyberArk Administrators Vault Admins
CyberArk Auditors Auditors
CyberArk Users No mapping to any Vault
group

5
LDAP Integration (2)

▪ Configure the LDAP connection to the external directory.

6
LDAP Integration (3)

▪ Configure the LDAP connection to the external directory.


■ Test the connection using the Test button.

7
LDAP Integration (4)

▪ Configure the LDAP connection to the external directory.


▪ Configure typical CyberArk roles based predefined directory maps
(optional).

8
Directory Mapping

▪ A Directory Map determines whether a User Account or Group may be


created in the Vault, and the roles they will have.
• User Mapping – allows for authentication and defines user’s attributes,
such as Vault Authorizations and Location.
• Group Mapping – makes LDAP groups searchable from within CyberArk,
allowing mapped groups to be granted safe authorizations and to be nested
within built-in CyberArk groups.

9
Predefined Directory Maps

▪ When the first directory is configured using the setup wizard, predefined
directory mappings are created automatically with standard Vault
Authorizations and nested group settings for: CyberArk Users, Vault
Admins, and Auditors.
▪ You can use these directory maps immediately, modify them with relevant
mapping rules, or create new directory maps using the PrivateArk Client.

10
Vault Admins (1)

▪ After completing the configuration using the Wizard:


■ the AD group CyberArk Vault Admins will be created in the Vault and nested
under the internal Vault Admins group.

11
Vault Admins (2)

▪ After completing the configuration using the Wizard:


■ the AD group CyberArk Vault Admins will be created in the Vault and nested
under the internal Vault Admins group.
■ LDAP users who are members of CyberArk Vault Admins will be able to
authenticate to CyberArk using LDAP authentication.

12
Vault Admins (3)

▪ After completing the configuration using the Wizard:


■ the AD group CyberArk Vault Admins will be created in the Vault and nested
under the internal Vault Admins group.
■ LDAP users who are members of CyberArk Vault Admins will be able to
authenticate to CyberArk using LDAP authentication.
■ LDAP users who are members of CyberArk Vault Admins will receive all vault
authorizations based on the User Template in the directory mapping.

13
Vault Admins (4)

▪ After completing the configuration using the Wizard:


■ the AD group CyberArk Vault Admins will be created in the Vault and nested
under the internal Vault Admins group.
■ LDAP users who are members of CyberArk Vault Admins will be able to
authenticate to CyberArk using LDAP authentication.
■ LDAP users who are members of CyberArk Vault Admins will receive all vault
authorizations based on the User Template in the directory mapping.
■ LDAP users who are members of CyberArk Vault Admins will will be able to see
the ADMINISTRATION Tab in the PVWA.

14
Transparent User Management

▪ When users authenticate through LDAP for the first time they are
provisioned automatically in the Vault.
▪ LDAP Users and Groups that have been created in the Vault are marked
with the LDAP User or Groups icon.
▪ If you delete a user within CyberArk, it will be automatically re-created upon
login if it still exists within AD.

To permanently delete a user,


it would have to be removed
from all groups that have a
directory mapping or deleted
from the external directory

15
LDAP Synchronization

▪ The Vault can be synchronized with the External Directories so that changes
made to External User properties can be updated automatically in the Vault.
▪ The relevant parameters are configured in the dbparm.ini file.

AutoSyncExternalObjects=Yes,24,1,5

Whether or not The hours


The number of
to sync with the during which
hours in one
External the sync will
period cycle
Directory take place

16
SMTP Integration

17
SMTP Integration

Email integration is critical for monitoring vault activity and facilitating workflow
processes:

■ Dual control messages and notifications

■ Password verification errors

■ Password change failures

■ Advanced notice for password change


• Messages triggered as heads-up notification before passwords expire.

■ New/Modified Password
• Will trigger messages to Safe Owners upon arrival of newly created or
updated Passwords.

18
Notification Flow Examples

IT user requests access to


account using PVWA

Vault
SMTP
Server

Port: 25
ENE

CPM fails to
verify password

19
SMTP Setup

Email integration Prerequisites:


▪ Have the IP address of the SMTP Gateway Available.
▪ Ensure that any necessary firewall rules or ACLs allow communications from
the Vault Servers to the SMTP Gateway.

20
SMTP Setup

21
SMTP Setup

22
SMTP Setup

23
Confirmation Email

24
Monitoring the ENE

▪ Log Files
■ Stored on the Vault Server under
Program Files\PrivateArk\Server\ENE\Logs
■ ENEConsole.log – System Status Log

■ ENETrace.log – Messages and errors about activities of the ENE.

• Amount of trace information detail is controlled in the


EventNotificationEngine.ini

▪ Event Viewer
■ Service level events and errors
▪ Remote Control Client

25
SNMP Integration

26
Purpose

▪ We recommend not installing any third-party monitoring agents. CyberArk


can send status information to your monitoring solution using SNMP.
▪ SNMP traps can be sent from the Vault to monitoring solutions using the
Remote Control Agent

Prerequisites:
▪ Configure Remote Control Agent
▪ Have IP Addresses of all servers that can accept SNMP traps available.
▪ Have Community String available.

27
SNMP Setup

▪ paragent.ini defines:
■ Information to be send via SNMP traps
■ Location of SNMP trap receiver

[MAIN]
RemoteStationIPAddress=10.0.0.3
UserCredentialsPath="C:\Program Files (x86)\PrivateArk\Server\ParAgent.pass"
RemoteAdminPort=9022
ExtensionComponentList="C:\Program Files (x86)\PrivateArk\Server\PARVaultAgent.dll,C:\Program
Files (x86)\PrivateArk\Server\PARENEAgent.dll"
AllowedMonitoredServices="PrivateArk Database,CyberArk Logic Container"
SNMPTrapsThresholdCPU=200,90,3,30,YES
SNMPTrapsThresholdPhysicalMemory=200,90,3,30,YES
SNMPTrapsThresholdSwapMemory=200,90,3,30,YES
SNMPTrapsThresholdDiskUsage=200,85,3,30,YES
SNMPTrapsThresholdServiceStatus=200,3,30,YES
LogMessagesFilterRegexp=.*
ExludedLogMessagesFilterRegexp=(ITA|PARE|PADR|CAS).*I
SNMPHostIP=10.0.1.1
SNMPTrapPort=162
SNMPCommunity="public"

28
SNMP Setup

▪ Restart Remote Control Agent

29
SIEM Integration

30
SIEM Integration

SIEM Integration is a powerful way to correlate Privileged Account Usage


with Privileged Account Activity.
▪ Have IP addresses of all servers that can accept SYSLOG information
available.
▪ Have a resource from the team responsible for SYSLOG servers
available.

31
SIEM Setup
▪ We will be sending Audit log information to the SIEM.
▪ Rename one of the sample translator files
■ Translator files translate CyberArk logging format into the SIEM logging
format
■ These five files will cover the most commonly deployed SIEM systems

32
SIEM Setup

▪ Add SYSLOG configuration to the dbparm.ini file.

[MAIN]
TasksCount=20
DateFormat=DD.MM.YY
TimeFormat=HH:MM:SS
ResidentDelay=10
BasePort=1858
LogRetention=7
LockTimeOut=30
DaysForAutoClear=30
DaysForPicturesDistribution=Never
ClockSyncTolerance=600

AllowNonStandardFWAddresses=[10.0.0.3],Yes,3389:outbound/tcp,3389:inbound/tcp
ComponentNotificationThreshold=PIMProvider,Yes,30,1440;AppProvider,Yes,30,1440;OPMProvider,Yes,30,1440;CPM,Yes
,720,1440;PVWA,Yes,90,1440;PSM,Yes,30,1440;DCAUser,Yes,60,2880;SFE,Yes,10,2880;FTP,Yes,60,2880;ENE,Yes,60,360
[BACKUP]
BackupKey=C:\PrivateArk\Keys\Backup.key
[CRYPTO]
SymCipherAlg=AES-256
ASymCipherAlg=RSA-2048
[SYSLOG]
SyslogTranslatorFile=Syslog\ArcSight.xsl
SyslogServerIP=10.0.255.222
SyslogServerPort=514
SyslogServerProtocol=UDP
SyslogMessageCodeFilter=0-999
SyslogSendBOMPrefix=NO

33
SIEM Setup

▪ Restart PrivateArk Server Service

34
NTP Integration

35
NTP Integration

NTP integration can be important in environments where CyberArk is one of


many system producing security logs, so that times between all security
devices will correlate.

Prerequisites:
▪ IP Address of the Network Time Server.

36
NTP Integration

▪ Create a firewall exception in DBParm.ini to allow the vault to communicate


on the NTP port (123).

[NTP]
AllowNonStandardFWAddresses=[10.0.1.1],Yes,123:outbound/udp,123:inbound/udp

37
NTP Integration

▪ Set a special time skew to prevent very large changes to the system clock.

HKLM\System\CurrentControlSet\Services\W32Time\Parameters\Period=65532

38
Summary

39
Summary

This session has covered:

▪ LDAP Integration
▪ SMTP Integration
▪ SNMP Integration
▪ SIEM Integration
▪ NTP Integration

40
Thank You

41

You might also like