CyberArk Tab

IT Asset Management (Cloud)
Important: The menu item for the CyberArk tab on the left side of the Beacon UI appears only when CyberArk is detected on the system. If CyberArk is not detected, the CyberArk tab will be inaccessible.

This tab may have two different appearances, depending on whether an administrator has chosen to disable or enable the use of CyberArk from this inventory beacon.

CyberArk is available, but disabled

The group Configure CyberArk connection appears at the top of the page, but contains only two items:
  • The indicator that CyberArk Credential Provider is installed on this inventory beacon.
  • The cleared (empty) check box labeled Use CyberArk Credential Provider on this inventory beacon. It is unchecked because someone with administrator privileges has disabled (presumably, temporarily) the use of CyberArk from this inventory beacon (each inventory beacon must be controlled independently, as there is no communication between inventory beacons where they could share this information).
In this mode:
  • Only credentials saved in the FlexNet Beacon vault are available for use by the inventory beacon in remote execution tasks.
  • The inventory beacon cannot request existing credentials from CyberArk. Remote execution tasks for any target device with credentials (only) in CyberArk will fail.
You can now:
  • Click Use CyberArk Credential Provider on this inventory beacon to enable (or re-enable) CyberArk, entering the mode described below.

CyberArk is available, and enabled

The group Information for CyberArk connection appears at the top of the page, containing:
  • The indicator that CyberArk Credential Provider is installed on this inventory beacon.
  • The selected check box Use CyberArk Credential Provider on this inventory beacon that is enabling the use of CyberArk integration.
  • Several data fields providing information that can be copied and pasted to configure CyberArk to accept connections from this inventory beacon.

The configuration of CyberArk is, in principle, a one-time operation performed by your CyberArk administrator. (However, depending on the level of security applied, the configuration may also need to be updated each time the FlexNet Beacon software on this inventory beacon is updated. For this reason, if you are working in a highly secure environment, you may wish to control the timing of updates to inventory beacons, as described in Upgrading Inventory Beacons and related topics.)

The information in these fields is read-only, and supplied automatically by the inventory beacon.

You can now:
  • Ask your CyberArk administrator to configure the appropriate CyberArk vault with the data supplied. Full details are available in the CyberArk documentation, and an overview is included in the Inventory Beacon Credentials for Other Computers section in IT Asset Management System Reference.

IT Asset Management (Cloud)

Current