Onboarding the CyberArk Application

Use this task to provision users from Verify to On-Premises CyberArk adapter.

Before you begin

  1. Configure the identity agent for authentication in Verify. See, Configuring through the Verify user interface.
  2. Deploy and configure the IBM® Security Verify Identity Brokerage On-Premises component.

Procedure

  1. Log in as administrator on IBM Security Verify.
  2. Select Applications > Applications and click Add application.
  3. Search application type as the name set for the uploaded application profile from the menu and click Add application.
    For example, if the CyberArk profile was uploaded with name CyberArk, then the application is found with CyberArk(custom).
  4. In the Add applications page, select the General tab, and specify the required details.
  5. Select the Account lifecycle tab.
  6. Specify the provisioning and deprovisioning policies.
    Parameters Description
    Provision accounts

    Provision accounts are Disabled by default, which means the account creation is performed outside of IBM Security Verify.

    Select the Enabled option to automatically provision an account when the entitlement is assigned to a user. Password generations and email notification features are available for the account that is created using IBM Security Verify.

    Deprovision accounts

    Deprovision accounts is Disabled by default, which means account removal is performed outside of IBM Security Verify.

    Select the Enabled option in to automatically deprovision an account when entitlement is removed from a user.

    Account password
    Sync user's Cloud Directory password
    This option is available if Password sync is enabled on the Cloud Directory. It uses the Cloud Directory password when a regular user is provisioned to the application. Federated users receive a generated password when provisioned to the application.
    Generate password
    This option generates a random password for the provisioned account. The password is based on the Cloud Directory password policy.
    None
    This option provisions the account without a password.
    Send email notification This option is available when you select the Generate password option. When you select the Send email notification option an email notification with the auto-generated password is sent to your email address after the account is provisioned successfully.
    Grace period (days) Set the grace period in days for which deprovisioned account is kept as suspended before deleting it permanently.
    Deprovision action Delete the account. This field is available only if the deprovision account field is enabled.
  7. In General section, select Application profile from the drop-down. If the profile does not exist you must create one. For more information see, Managing identity adapter application profiles.
  8. Specify the API authentication details.
    Parameters Description
    Security Directory Integrator location Specify the URL for the IBM Security Directory Integrator instance. The valid syntax for the URL is rmi://ip-address:port/ITDIDispatcher, where ip-address is the IBM Security Directory Integrator host and port is the port number for the RMI Dispatcher.

    The default URL for the default SDI1 instance is rmi://localhost:1099/ITDIDispatcher.

    Server URL The CyberArk server URL. This field is mandatory. For example, http://<Instance name>:<Port number>.
    Login ID The CyberArk user account login ID that adapter uses to connect to the CyberArk Server instance. This field is mandatory.
    Password Password for CyberArk user account. This field is mandatory.
    Search Page Size (1-999) Specify a limit for the number of accounts to return for reconciliation.
  9. Click Test Connection to test the connection to the CyberArk on premises. The connection needs to be successful to provision or reconcile accounts on the CyberArk application.
  10. Map the target CyberArk attributes to the Verify attributes as required. Select the Keep updated check box for the attributes that need to be updated on the target.

  11. Select the Account sync tab.
  12. In the Adoption policy section, add one or more attribute pairs that need to match for the account sync process to assign CyberArk accounts to their respective account owners on Verify.

  13. In the Remediation Policies section, choose a remediation policy to remediate non-compliant accounts automatically.
  14. Click Save.
  15. After the application is saved, specify the authorization policy on the Entitlements tab.