CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide
Originally Published: 2021-10-07
This article describes how to integrate Cloud Access Service (CAS) with CyberArk Password Vault Web Access (PVWA) using RADIUS.
Configure CAS
Perform these steps to configure CAS using RADIUS.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients > RADIUS.
- Click Add Radius Client and Profiles.
- On the RADIUS Client page, enter the following:
- Name: Enter a descriptive name for the RADIUS client.
- IP Address: Enter the IP address of the RADIUS client (CyberArk Vault IP address).
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save and Next Step, and then click Finish to complete the configuration.
- Click Publish Changes to apply your changes to the RADIUS server and wait for the process to be completed.
Notes:
- The Cloud Access RADIUS server is configured to listen on UDP port 1812.
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure CyberArk PVWA
Perform these steps to configure the CyberArk PVWA.
Procedure
- Log in to the CyberArk Vault Windows server.
- Stop the Vault server.
- In the Vault installation folder, run CAVaultManager as an administrator with the SecureSecretFiles command to create a file that contains an encrypted version of the RADIUS secret. You can specify the full path of the file that will contain the encrypted secret and the secret itself. This file may be in DAT, INI, or TXT format. The following example will encrypt the secret RADIUS/Vault password, which is VaultSecret, and store it in a file called radiusauth.dat in the current folder:
CAVaultManager SecureSecretFiles /SecretType Radius /Secret VaultSecret /SecuredFileName radiusauth.dat
- Navigate to /Server/Conf and open DBParm.ini.
- Set the RadiusServersInfo parameter. All the details are specified in the same parameter, separated by semicolons.
RadiusServersInfo=1.1.1.250;1812;vaulthostname;radiusauth.dat
In the preceding example, the IP address of the RADIUS server is 1.1.1.250, and its port is 1812. The name of the RADIUS client (Vault machine as entered in the RADIUS server) is vaulthostname, and the name of the file that contains the secret password is radiusauth.dat. The file is stored in the current folder, and therefore, the full path is not specified. - (Optional) Extend the DefaultTimeoutvalue to 60 seconds. This will allow more time for users to complete out-of-band authentication challenges.
- Start the Vault server.
Configure a RADIUS User on Password Vault Server
- Log in to the PrivateArk Client as an Administrator user.
- Browse to Tools > Administrative Tools > Users and Groups and Add or Update an account to use with RADIUS authentication.
- Choose a username for the user.
- Navigate to the Authentication tab of the user profile, select RADIUS Authentication in the Authentication method drop-down list, and click OK.
Configure Access Through PVWA
- Log in to the PVWA as an Administrator.
- Click Administration > Configuration Options to display the System Configuration page.
- Click Options.
- Open the Authentication Methods menu and click radius.
- Configure the RADIUS properties and click OK.
- DisplayName: Enter the value for the display name for this authentication method.
- Enabled: Set to Yes.
- UseVaultAuthentication: Set to Yes.
- UseRadius: Set to Yes.
The configuration is complete.
Related Articles
Microsoft Outlook Web Access 2013 - SecurID Access Implementation Guide 25Number of Views ZPE Nodegrid 4.1 - Configure User sign in Configuration - RSA Ready SecurID Access Implementation Guide 6Number of Views Microsoft Outlook on the Web 2016 - RSA Ready SecurID Access Implementation Guide 35Number of Views CyberArk Vault - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 3Number of Views CyberArk Vault - RSA Ready Implementation Guide 14Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Supported On-Demand Authentication (ODA) SMS providers for use with RSA Authentication Manager 8.x Deploying RSA Authenticator 6.2.2 for Windows Using DISM
Don't see what you're looking for?