CyberArk Tab
This tab may have two different appearances, depending on whether an administrator has chosen to disable or enable the use of CyberArk from this inventory beacon.
CyberArk is available, but disabled
- The indicator that CyberArk Credential Provider is installed on this inventory beacon.
- The cleared (empty) check box labeled Use CyberArk Credential Provider on this inventory beacon. It is unchecked because someone with administrator privileges has disabled (presumably, temporarily) the use of CyberArk from this inventory beacon (each inventory beacon must be controlled independently, as there is no communication between inventory beacons where they could share this information).
- Only credentials saved in the FlexNet Beacon vault are available for use by the inventory beacon in remote execution tasks.
- The inventory beacon cannot request existing credentials from CyberArk. Remote execution tasks for any target device with credentials (only) in CyberArk will fail.
- Click Use CyberArk Credential Provider on this inventory beacon to enable (or re-enable) CyberArk, entering the mode described below.
CyberArk is available, and enabled
- The indicator that CyberArk Credential Provider is installed on this inventory beacon.
- The selected check box Use CyberArk Credential Provider on this inventory beacon that is enabling the use of CyberArk integration.
- Several data fields providing information that can be copied and pasted to configure CyberArk to accept connections from this inventory beacon.
The configuration of CyberArk is, in principle, a one-time operation performed by your CyberArk administrator. (However, depending on the level of security applied, the configuration may also need to be updated each time the FlexNet Beacon software on this inventory beacon is updated. For this reason, if you are working in a highly secure environment, you may wish to control the timing of updates to inventory beacons, as described in Upgrading Inventory Beacons and related topics.)
The information in these fields is read-only, and supplied automatically by the inventory beacon.
- Ask your CyberArk administrator to configure the appropriate CyberArk vault with the data supplied. Full details are available in the CyberArk documentation, and an overview is included in the Inventory Beacon Credentials for Other Computers section in IT Asset Management System Reference.
IT Asset Management (Cloud)
Current