Configuring CyberArk
To keep your company and client information safe and secure, use an external credential provider, such as CyberArk, to authenticate with Pega Robot Manager, Windows, and other applications.
Use this section to plan how to integrate CyberArk in your process for storing and retrieving credentials. The tasks involved in configuring CyberArk for use with Pega Robotic Automation, include the following tasks:
- Understanding how credentials are retrieved from CyberArk
Credentials within the CyberArk Vault are stored as accounts in a safe. To retrieve a credential, the provider (the user assigned to the CyberArk Application Access Manager instance) and the application ID must have access to the safe. For more information, see Assigning safe access.
- Install Application Access Manager on client computers
The CyberArk integration uses the Application Access Manager (AAM) to retrieve credentials. This CyberArk software installs as a service on each client computer and handles all communication between the client computer and CyberArk.
- Defining the application ID for credential retrieval
Define an application ID to access credentials from CyberArk.
- Assigning safe access
To access credentials in a safe, the application ID and the provider must both have permission to the safe. For more information, see the CyberArk Privileged Access Security Implementation Guide.
- Testing the local credential provider
Determine if everything is property configured by performing isolated testing with CyberArk.
- Configure robots with CyberArk
To prepare a robot for integration with CyberArk, edit Pega Robotic Automation configuration files.
Previous topic Using Pega Access to control integration behavior Next topic Understanding how credentials are retrieved from CyberArk