CyberArk Password Vault Web Access - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide
Originally Published: 2021-10-07
This article describes how to integrate CyberArk PVWA with Authentication Manager (AM) using RADIUS.
Configure AM
Perform these steps to configure AM using RADIUS.
Procedure
- Sign in to Security Console.
- Go to RADIUS > RADIUS Servers and make a note of the IP address of the selected RADIUS server.
- Navigate to RADIUS > RADIUS Clients and click Add New.
- On the Add RADIUS Client page, enter the following:
- Client Name: Enter a descriptive name for the RADIUS client.
- IPv4 Address: Enter the IP address of the RADIUS client (CyberArk Vault IP address).
- Make/Model: Standard Radius.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save & Create Associated RSA Agent.
- On the Add New Authentication Agent page, click Save, then confirm by clicking Yes, Save Agent.
Notes:
- AM RADIUS server listens on ports UDP 1645 and UDP 1812.
- The relationship of agent host record to RADIUS client in the AM can be 1 to 1, 1 to many, or 1 to all (global).
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure CyberArk PVWA
Perform these steps to configure the CyberArk PVWA.
Procedure
- Log in to the CyberArk Vault Windows server.
- Stop the Vault server.
- In the Vault installation folder, run CAVaultManager as administrator with the SecureSecretFiles command to create a file that contains an encrypted version of the RADIUS secret. You can specify the full path of the file that will contain the encrypted secret, and the secret itself. This file may be in DAT, INI, or TXT format. The following example will encrypt the secret RADIUS/Vault password, which is VaultSecret, and store it in a file called radiusauth.dat in the current folder:
CAVaultManager SecureSecretFiles /SecretType Radius /Secret VaultSecret /SecuredFileName radiusauth.dat
- Navigate to /Server/Conf and open DBParm.ini.
- Set the RadiusServersInfo parameter. All the details are specified in the same parameter, separated by semicolons.
RadiusServersInfo=1.1.1.250;1812;vaulthostname;radiusauth.dat
In the preceding example, the IP address of the RADIUS server is 1.1.1.250, and its port is 1812. The name of the RADIUS client (Vault machine as entered in the RADIUS server) is vaulthostname, and the name of the file that contains the secret password is radiusauth.dat. The file is stored in the current folder, and therefore, the full path is not specified. - (Optional) Extend the DefaultTimeoutvalue to 60 seconds. This will allow more time for users to complete out-of-band authentication challenges.
- Start the Vault server.
Configure a RADIUS User on Password Vault Server
- Log in to the PrivateArk Client as an Administrator user.
- Browse to Tools > Administrative Tools > Users and Groups and Add or Update an account to use with RADIUS authentication.
- Choose a username for the user.
- Navigate to the Authentication tab of the user profile, select RADIUS Authentication in the Authentication method drop-down list, and click OK.
Configure Access Through PVWA
- Log in to the PVWA as an Administrator.
- Click Administration > Configuration Options to display the System Configuration page.
- Click Options.
- Open the Authentication Methods menu and click radius.
- Configure the RADIUS properties and click OK.
- DisplayName: Enter the value the display name for this authentication method.
- Enabled: Set to Yes.
- UseVaultAuthentication: Set to Yes.
- UseRadius: Set to Yes.
The configuration is complete.
Related Articles
Way We Do - SAML My Page SSO Configuration - RSA Ready Implementation Guide 5Number of Views Way We Do - RSA Ready Implementation Guide 4Number of Views In RSA Identity Governance & Lifecycle While attempting to create/modify review definition, when we include users with Dat… 33Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 69Number of Views Way We Do - SAML Relying Party Configuration - RSA Ready Implementation Guide 1Number of Views
Trending Articles
RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor… Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU
Don't see what you're looking for?