CyberArk Vault - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide
This article describes how to integrate Authentication Manager (AM) with CyberArk Vault using RADIUS.
Configure CAS
Perform these steps to configure AM using RADIUS.
Procedure
- Sign in to Security Console as an administrator.
- Go to RADIUS > Radius Client and click Add New.
- Provide the following details.
- Client Name.
- IP Address Type: IPV4.
- IPV4 Address: IPAddress of the Vault server
- Make/Model: Standard Radius
- Shared Secret: Secret of valid format, which will be used in the Vault configuration.
- Click Save & Create Associated RSA Agent.
Configure CyberArk Vault
Perform these steps to configure the Cyberark Vault.
Procedure
- Log in to the machine where CyberArk Vault server and client are installed.
- Stop the instance of CyberArk Vault if it is running using Run > services.msc >PrivateArk Server.
- Open the command prompt as an administrator and run the following command after replacing the content between angle brackets:
"C:\Program Files (x86)\PrivateArk\Server\CAVaultManager.exe" SecureSecretFiles /SecretType Radius /Secret <myradiussecret> /SecuredFileName "C:\Program Files (x86)\PrivateArk\Server\myradiussecret.dat"
- Navigate to C:\Program Files (x86)\PrivateArk\Server\conf and make the changes to DBParm.ini.
- Add the following line to the bottom of the page after replacing the content between angle brackets.
RadiusServersInfo=<Management IP address of the identity router>;1812;<IPAddress of the vault server >;myradiussecret.dat
- (Optional) Change the DefaultTimeout value to 60. This will allow more time for users to complete out-of-band authentication challenges.
- Add the following line to the bottom of the page after replacing the content between angle brackets.
- Go to Run > services.msc and restart the PartnerArk service. Ensure the CyberArk Event Notification service is also started.
Configure a RADIUS user on Vault
- Log in to the Vault client as an administrator (created during setup) and go to Tools > Administrative Tools > Users and Groups.
- Create or update a user.
- Under the Authentication tab, select RADIUS Authentication as the Authentication method and click OK.
Configure PrivateArk Client to Use RADIUS Authentication
- Open the PrivateArk client, right-click the Vault, and click Properties.
- Click Advanced.
- Choose the RADIUS authentication option and click OK.
The configuration is complete.
Related Articles
CyberArk Vault - RSA Ready Implementation Guide 14Number of Views CyberArk Password Vault Web Access - SAML Relying Party Configuration - RSA Ready Implementation Guide 43Number of Views CyberArk Vault - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 2Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 69Number of Views CyberArk Password Vault Web Access - RSA Ready Implementation Guide 202Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle Provisioning-Termination Rule fails to filter on Custom Attributes that have the same Display Names across Multiple Object… RSA MFA Agent 2.4 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?