This post summarizes some unique points for setting up a CyberArk SaaS Cloud PAM solution for a small or medium-sized Cloud only (Azure AD) enterprise. Cloud only here means no domain service or a one-way sync-ed (from Azure AD to Azure Domain Service).
Diagram
Identity Integration with Azure AD
To add AAD as a directory source, you need to register an application in your Azure account with appropriate access to the Microsoft Graph API. You can then authenticate using the Azure application’s Application ID, Directory ID, and Client Secret.
Your Azure Active Directory users can now log in to CyberArk Identity using their Azure Active Directory credentials. Add them to roles so you can grant permissions to applications, enforce authentication profiles, and more.
After entering a username, users are redirected to login.microsoftonline.com for authentication, then redirected back to the User Portal after successfully completing authentication mechanisms.
Pre-implemetation Checklist
Install Identity Connectors on Servers
Download Softwares and Tools
The package contains the following tools:
- Add-PSMApps
- CreateCredFile-Helper.zip
- Connector Management Prerequisites (Only for CM, otherwise use PSMCheckPrerequisites_PrivilegeCloud.zip)
- LDAPSCertificateTool.zip
- ldp.zip
- PSMCheckPrerequisites_PrivilegeCloud.zip
- PSMCodec.exe
- PSMP AutoInstall Script(psmpwiz.sh).zip
- PSM Convert local2domain Users (Set-DomainUser)
- Onboard PrivilegeCloud Admin(For Standalone)
- Reports (LicenseCapacity and UserReport)
CyberArk is proud to announce the release of Privilege Cloud version 13.2!
This release includes the following improvements to Privilege Cloud:
- Privileged Session Manager (PSM) enhancements
- Support for ‘non-sticky’ sessions
- Conjur Enterprise plugin
- Custom plugin development improvement
- Access Amazon Web Services (AWS) console with STS
- Accessibility improvements (Privilege Cloud standard only)
- Secure Tunnel enhancements
Install Softwares
- PSM will be active on both servers
- CPM will be active on primary and standby for secondary
- For Syslogs traffics
- For PSM-RDP traffics
Add Identity Connectors
The CyberArk Identity Connector is a multipurpose service that provides support for key features and enables secure communication between other services on your internal network or a cloud instance. Not all services require a connector, however. For example, if all users are CyberArk Cloud Directory user accounts, the connector isn’t required.
You can install additional connectors for load balancing and failover.
The following diagram illustrates the default ports used by the Identity Connector.
1. From Identity Administration page, select Connector Management
2. Add a connector
3. Define installation details
4. Copy script and run it in the connector servers
CyberArk Privilege Cloud Secure Tunnel