CyberArk allows you to seamlessly secure identities while accessing any resource across any infrastructure, including hybrid, SaaS and multi-cloud.
You will need the following resources to setup CyberArk Password Vault authentication:
CyberArk Password Vault URL
CyberArk Password Vault Username (for On-Premise)/CyberArk Password Vault Client ID (for SaaS)
CyberArk Password Vault Password (for On-Premise)/CyberArk Password Vault Client Secret (for SaaS)
CyberArk Password Vault Account ID (the ID of the specific service/application you need to retrieve credentials for)
Create CyberArk Password Vault resources and credentials in Tines
You will need to create:
Three resources: "CyberArk Password Vault URL", "CyberArk Password Vault Username"(for On-Premise)/"CyberArk Password Vault Client ID"(for SaaS), and "CyberArk Password Vault Account ID"
Two HTTP Request type credentials: "CyberArk Password Vault Token" and "CyberArk Password Vault <Service> Token"
Resources
Login to your Tines tenant
Navigate to the team that will be using the API and click "Resource"
Click "+ New Resource"
Input the values for the CyberArk Password Vault resource
Name: CyberArk Password Vault URL
Description: Optional
Builder: Your CyberArk Password Vault URL
Optional
Access: What other teams can also use the resource
Click "Save resource"
Click "+ New Resource"
Input the values for the CyberArk Password Vault resource
Name: CyberArk Password Vault Username (for On-Premise)/CyberArk Password Vault Client ID (for SaaS)
Description: Optional
Builder: CyberArk Password Vault Username (for On-Premise)/CyberArk Password Vault Client ID (for SaaS)
Optional
Access: What other teams can also use the resource
Click "Save resource"
Click "+ New Resource"
Input the values for the CyberArk Password Vault resource
Name: CyberArk Password Vault Account ID
Description: Optional
Builder: Your CyberArk Password Vault Account ID
Optional
Access: What other teams can also use the resource
Click "Save resource"
Credentials
Step 1
To generate a CyberArk Password Vault bearer token, follow the steps outlined for the appropriate scenario.
Scenario 1: Tines Cloud Hosted and SaaS CyberArk Password Vault
Navigate to the team that will be using the API and click "Credentials"
Click "+ New Credential" and select "HTTP request"
Input the values for the CyberArk Password Vault credential
Name: CyberArk Password Vault Token
Description: Optional
URL:
https://<<RESOURCE.cyberark_password_vault_url>>/oauth2/platformtoken
Content Type: JSON
Method: post
Payload: Copy the below object and paste into the "Plain code" section:
{
"client_id": "<<RESOURCE.cyberark_password_client_id>>",
"client_secret": "<<secret>>",
"grant_type": "client_credentials",
"concurrentSession": "True"
}Secret: CyberArk Password Vault Client Secret
Click "Save"
Click "Run request" and make sure it returns a successful response.
Location of token from response:
cyberark_password_vault_token.body
Optional
Domains: Ensure this credential can only be used when making HTTP requests to specific domains
Access: What other teams can also use the API
Click "Save"
Scenario 2: Tines Cloud hosted and On-Premise CyberArk Password Vault
Navigate to the team that will be using the API and click "Credentials"
Click "+ New Credential" and select "HTTP request"
Input the values for the CyberArk Password Vault credential
Name: CyberArk Password Vault Token
Description: Optional
URL:
https://<<RESOURCE.cyberark_password_vault_url>>/passwordvault/api/Auth/cyberark/logon
Content Type: JSON
Method: post
Payload: Copy the below object and paste into the "Plain code" section:
{
"username": "<<RESOURCE.cyberark_password_vault_username>>",
"password": "<<secret>>",
"concurrentSession": "true"
}Secret: CyberArk Password Vault Password
Click "+ Add option" and add "Use tunnel"
Click "Save"
Click "Run request" and make sure it returns a successful response.
Location of token from response:
cyberark_password_vault_token.body
TTL:
30
Optional
Domains: Ensure this credential can only be used when making HTTP requests to specific domains
Access: What other teams can also use the API
Click "Save"
Scenario 3: Tines Self Hosted and On-Premise CyberArk Password Vault
Navigate to the team that will be using the API and click "Credentials"
Click "+ New Credential" and select "HTTP request"
Input the values for the CyberArk Password Vault credential
Name: CyberArk Password Vault Token
Description: Optional
URL:
https://<<RESOURCE.cyberark_password_vault_url>>/passwordvault/api/Auth/cyberark/logon
Content Type: JSON
Method: post
Payload: Copy the below object and paste into the "Plain code" section:
{
"username": "<<RESOURCE.cyberark_password_vault_username>>",
"password": "<<secret>>",
"concurrentSession": "true"
}Secret: CyberArk Password Vault Password
Click "Save"
Click "Run request" and make sure it returns a successful response.
Location of token from response:
cyberark_password_vault_token.body
TTL:
30
Optional
Domains: Ensure this credential can only be used when making HTTP requests to specific domains
Access: What other teams can also use the API
Click "Save"
Step 2
Now that the CyberArk Password Vault bearer token is stored in a credential, the token can be leveraged to make a subsequent call to retrieve specific service/application credentials.
For Service/Application token (SaaS):
Navigate to the team that will be using the API and click "Credentials"
Click "+ New Credential" and select "HTTP request"
Input the values for the CyberArk Password Vault credential
Name: CyberArk Password Vault <Service> Token
Description: Optional
URL:
https://<<RESOURCE.cyberark_password_vault_url>>.priviledecloud.cyberark.cloud/PasswordVault/API/Accounts/<<RESOURCE.cyberark_password_vault_account_id>>/Password/Retrieve
Content Type: JSON
Method: post
Payload: Copy the below object and paste into the "Plain code" section and modify as required:
{
"reason": "EnterReason"
}Headers:
"Authorization": "<<CREDENTIAL.cyberark_password_vault_token>>"
Click "Save"
Click "Run request" and make sure it returns a successful response.
Location of token from response:
cyberark_password_vault_<service>_token.body
where<service>
is the service you are retrieving the credentials forOptional
Domains: Ensure this credential can only be used when making HTTP requests to specific domains
Access: What other teams can also use the API
Click "Save"
For Service/Application token (On-Premise):
Navigate to the team that will be using the API and click "Credentials"
Click "+ New Credential" and select "HTTP request"
Input the values for the CyberArk Password Vault credential
Name: CyberArk Password Vault <Service> Token
Description: Optional
URL:
https://<<RESOURCE.cyberark_password_vault_url>>/passwordvault/api/accounts/<<RESOURCE.cyberark_password_vault_account_id>>/password/retrieve
Content Type: JSON
Method: post
Payload: Copy the below object and paste into the "Plain code" section and modify as required:
{
"reason": "api testing",
"TicketingSystem": "SIR12342134",
"TicketId": "CHG0000123",
"ActionType": "show",
"isUse": false,
"Machine": "tines"
}Headers:
"Authorization": "<<CREDENTIAL.cyberark_password_vault_token>>"
(Optional) Click "+ Add option" and add "Use tunnel"
Click "Save"
Click "Run request" and make sure it returns a successful response.
Location of token from response:
cyberark_password_vault_<service>_token.body
where<service>
is the service you are retrieving the credentials forOptional
Domains: Ensure this credential can only be used when making HTTP requests to specific domains
Access: What other teams can also use the API
Click "Save"
Your credentials should look like the following:
Step 1
For Scenario 1:
For Scenario 2:
For Scenario 3:
Step 2
For Service/Application token (SaaS):
For Service/Application token (On-Premise):
More on creating credentials in Tines here.
You can also find a selection of CyberArk Password Vault stories in the story library.