Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Configuring CyberArk

Updated on October 19, 2022

To keep your company and client information safe and secure, use an external credential provider, such as CyberArk, to authenticate with Pega Robot Manager, Windows, and other applications.

Note: Before you begin, you should have a working knowledge of CyberArk. For information about purchasing CyberArk products, go to the CyberArk website.

Use this section to plan how to integrate CyberArk in your process for storing and retrieving credentials. The tasks involved in configuring CyberArk for use with Pega Robotic Automation, include the following tasks:

  • Previous topic Using Pega Access to control integration behavior
  • Next topic Understanding how credentials are retrieved from CyberArk

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us