CAU 08 Conjur - Fundamentals Integrations
CAU 08 Conjur - Fundamentals Integrations
Objectives
with Jenkins
• v10.1 to Latest
https://docs.cyberark.com 4
• Knowledgebase
• Enhancement Requests
https://cyberark-customers.force.com/s/
6
https://docs.cyberark.com/Product-Doc/OnlineHelp/AAM-
DAP/Latest/en/Content/HomeTilesLPs/LP-Tile4.htm
10
11
12
13
Policy Elements:
– Create and define one or more Jenkins hosts
– Grant each Jenkins host authentication access to
Conjur
– Grant each Jenkins host authorization access to 15
each Secret(s) in Conjur
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
cyberark.com
1. Log in to Jenkins as an
administrator
2. Navigate to Jenkins → Manage
Jenkins → Manage Plugins
3. Search for Conjur Secrets plugin
and install
4. Restart Jenkins
Jenkins Plugins:
https://plugins.jenkins.io/conjur-credentials/ 16
GitHub Download:
https://github.com/cyberark/conjur-credentials- 17
plugin/releases
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
cyberark.com
Conjur Jenkins Plugin Usage
PIPELINE CODE EXAMPLE FREESTYLE PROJECT EXAMPLE
18
19
CyberArk Summon
Kubernetes to sync w/ HA Cluster
Conjur Follower
(separate namespace) Namespace
Follower Service
K8S Authenticator Client
Shared Volume
Sidecar / Init Container: Application Container
Pod
Method Description
init An init container does not run continuously and therefore uses fewer resources.
Run the Kubernetes Authenticator Client as an init container for applications that do not need
to fetch rotated secrets; that is, the application\s are not using the Conjur rotator services.
The init container provides the application with one initial access token and then it exits.
The application uses the token to get its required secrets and does not require any further
Conjur access. The provided access token expires after 8 minutes.
Brokers the connection to Uses API calls to retrieve Fetches secrets and Uses Init container to fetch
the target resource secrets makes them available to secrets and push them into
the application as Kubernetes Secrets
environment variables
KEY ADVANTAGES
• No Secrets delivered to the • Available APIs for Java, • No code change required • Easier deployment
application Ruby, Go, .NET • CyberArk open source • Native experience for
• No code changes required • RESTAPI developers that already use
• Supports rotations Kubernetes Secrets
OTHER CONSIDERATIONS
• Requires a service • Requires code change in • Rotations are not supported • Uses Kubernetes RBAC and
connector to the target the application – requires a pod restart Audit functions (vs. central
(select from list of available when password changes CyberArk functions)
connectors) • Deployments requires more • Secrets are stored externally
steps to the pod in Kubernetes 23
Secrets.
24
Requirements:
✓ Conjur Secrets Manager
Enterprise or Conjur Open Source
https://github.com/conjurdemos
✓ Clone GitHub repository
25
Requirements:
✓ Linux host running Docker
✓ Clone GitHub repository
26
https://github.com/cyberark/conjur-quickstart
Copyright © 2023 CyberArk Software Ltd. All rights reserved. cyberark.com
cyberark.com
Summary
27
28
29