This is my CyberArk troubleshooting post to record those issues I met during working on CyberArk PAS (Privileged Account Security) Solutions including following modules: PVWA (Password Vault Web Access), PSM (Privileged Session Manager), CPM (Central Policy Manager).
- PVWA:Reports Fail When Run As Administrator
- CyberArk System Health Dashboard
- LDAP Log In without Entering Domain Name
- Change Windows Local Admin Account Denied
- Change Win Account Password Failed
- PVWA login : Your session has expired
- Error with Network Level Authentication and CredSSP encryption oracle remediation
- ITATS450E Owner xyz is the quota Owner of Safe
- PVWA Prompted to Change Password
Logged in PVWA as built-in administrator user, but got a failed notification when running a report.
PROBLEM:
This is a known limitation with the Password Vault Web Access report engine.SOLUTION:
Connect to the PVWA as a user other than Administrator to run reports.
CyberArk System Health Dashboard
It is relating to DR replication error. here is log found from active Vault server. Log can be found from this file: C:\Program Files (x86)\PrivateArk\Server\Logs\italog.log
Note: Server 192.23.1.25 is PVWA
Issue can be fixed based on CyberArk Article:
PVWA – How to create / update credential files for PVWA manually?
for problem psm server:
- check username in psmapp.cred and psmgw.cred
- use command at problem psm server to change password
- update users’ password in the vault
same process for pvwa server users.
- check appuser.ini and gwuser.ini under folder : C:\CyberArk\Password Vault Web Access\CredFiles
- You will find user name in those two files.
- use command at problem pvwa server to change password
- update users’ password in the vault
C:\CyberArk\Password Vault Web Access\Env>CreateCredFile.exe appuser.ini
Vault Username [mandatory] ==> PVWAAppUser1
Vault Password (will be encrypted in credential file) ==> *********
Disable wait for DR synchronization before allowing password change (yes/no) [No] ==>
External Authentication Facility (LDAP/Radius/No) [No] ==>
Restrict to Application Type [optional] ==> PVWAAPP
Restrict to Executable Path [optional] ==>
Restrict to current machine IP (yes/no) [No] ==>
Restrict to current machine hostname (yes/no) [No] ==>
Restrict to OS User name [optional] ==>
Display Restrictions in output file (yes/no) [No] ==>
Use Operating System Protected Storage for credentials file secret (Machine/User/No) [No] ==> Machine
Command ended successfully
C:\CyberArk\Password Vault Web Access\Env>CreateCredFile.exe gwuser.ini
Vault Username [mandatory] ==> PVWAGWUser1
Vault Password (will be encrypted in credential file) ==> *********
Disable wait for DR synchronization before allowing password change (yes/no) [No] ==>
External Authentication Facility (LDAP/Radius/No) [No] ==>
Restrict to Application Type [optional] ==>
Restrict to Executable Path [optional] ==>
Restrict to current machine IP (yes/no) [No] ==>
Restrict to current machine hostname (yes/no) [No] ==>
Restrict to OS User name [optional] ==>
Display Restrictions in output file (yes/no) [No] ==>
Use Operating System Protected Storage for credentials file secret (Machine/User/No) [No] ==> Machine
Command ended successfully
C:\Windows\system32>iisreset
Attempting stop...
Internet services successfully stopped
Attempting start...
Internet services successfully restarted
After rebooted both DR and main PSM & PVWA servers, system finally got back into healthy status.
LDAP Log In without Entering Domain Name
the UPN login username, do the following:
- Login
to PVWA with an admin account - Navigate
to: Configuration options>LDAP integration>LDAP - Change
AddDomainToUserName to No - Make
sure it saves
Vault (it will now be test1 instead of [email protected]).
So now either delete your test1@ user after making the change, or delete it
before (it makes no difference).
personal preferences, you will need to recreate.
that have the full UPN, and they may now login with the SAMAccountName (test1 in
your case).
best to do this now before you get a lot of users creating themselves in the
Vault
your credentials in RDCM, but you cant stop your users from doing it. However
if they do, they should include the logon domain into the settings:
in to PSM, but the Vault expects the username only (not including the domain)
Change Windows Local Admin Account Denied
Error in changepass operation to user 172.2.1.12\tmpadmin on domain 172.2.1.12(\\172.2.1.12) with logon account. Reason: Access is denied. (winRc=5). Logon account details – Safe: Win-Logon-Reconcile-ISO, Folder: Root, Object: Operating System-WinSrvLocal-172.2.1.12-appadmin The CPM is trying to change this password because its status matches the following search criteria: ResetImmediately.
Winrc=5 : This error typically happens when the account does not have permission to perform change. Does the user have permission to change its own password ?
SOLUTION:
2) Launch “Start” -> “Administrative Tools” -> “Local Security Policy”
3) Expand “Local Policies”, then click “Security Options”
4) Double click on “User Account Control: Run all administrators in Admin Approval Mode”
5) Check the “Disabled” button
6) Click “Apply”
7) Reboot the system
Reference: https://cyberark-customers.force.com/s/article/00003277
Note: If you are using a local admin account as logon account , you will need to make this policy change. But if you are using domain admin account, this step is not necessary.
There is another workaround for this issue:
Go to platform , edit , right click Automatic Password Management, Additional Policy Settings , change ChangePasswordInResetMode from no to Yes.
This will enable change password behavour to be done by reconcile account. It is on platform level. You will have make sure your account has a reconcile account associate with it.
Change Win Account Password Failed
Failed because the password does not meet the password policy requirements.
Error in changepass operation to user 172.2.1.12\tmpadmin on domain 172.2.1.12(\\172.2.1.12) with logon account. Reason: The password does not meet the password policy requirements. Check the minimum password length, password complexity and password history requirements. (winRc=2245). Logon account details – Safe: Win-Logon-Reconcile-ISO, Folder: Root, Object: Operating System-WinSrvLocal-172.2.1.12-appadmin The CPM is trying to change this password because its status matches the following search criteria: ResetImmediately.
Winrc=2245: This error happens when there are restrictions like minimum password length, password complexity and password history requirements. In this scenario you could use a reconcile account which permission to reset target account in question. Basically you are using Recon account to reset password of other accounts.
For me, I am violating this minimum password age 1 days policy rule. I waited one day to test it again and it works.
PVWA login : Your session has expired
Tried to log in PVWA and got this error. Tried a different account and still same.
Solution is simple, iisreset on PVWA server.
ITATS450E Owner xyz is the quota Owner of Safe
https://cyberark-customers.force.com/s/article/00000991
PVWA Prompted to Change LDAP Login Password
CyberArk will check your LDAP login’s expiration date and by default, if it found it will expire in 7 days, it will ask you to change it.
The settings are in following page. It is at Options -> Authentication Methods -> Generalsettings ->AllowPasswordChangeInNonCyberArkAuth
The AllowPasswordChangeInNonCyberArkAuth parameter determines whether or not users who are logged on with LDAP authentication will be able to change their passwords.
The PasswordExpirationNotificationDays defines the number of days before the password expires that the user will be notified (relevant only for CyberArk authentication). To cancel this notification, specify -1.
Hi,
I have configured PVWA on two servers, and configured these two PVWA behind HAPROXY (LB)
I am able to login to PVWA via LB VIP FQDN (https://pvwa.test.com/passwordvault)
When i click on sign-out, am getting redirected to individual server FQDN logon page. (https://pvwa01.test.com) instead of LB VIP FQDN (https://pvwa.test.com/passwordvault)
Could you please on this issue.
Regards,
Gowtham.
Hi Gowtham,
I haven’t used HAproxy as LB for PVWA. But it might relates to load-balanced IP/FQDN setting rather than the default value set during pvwa installation.
At video: https://www.youtube.com/watch?v=4MXq3oyjaFc, 7:22, you will see Vault Server and PVWA connection details page, you will need to put PVWA load balancer’s url into PVWA URL textbox.
Let me know if it helps.