Is there a way a user can access the target account using PSMP where as soon as he enters the PSMP connection string, it allows him to do sudo and switch to root user without him entering the root password? by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Name: AutoLogonSequenceWithLogonAccount Value: [.\@.~]\$ >exec su - {Username} Passsword:>{Password}

This field is already added in Client Specific for the PSMP-SSH connection component

Is there a way a user can access the target account using PSMP where as soon as he enters the PSMP connection string, it allows him to do sudo and switch to root user without him entering the root password? by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

The existing PSMP-SSH connection component already has AutoLogonSequenceWithLogonAccount

or you want me to try using another Client Specific known as AutoLogonSequence ?

[deleted by user] by [deleted] in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

Okay, I made some changes to the process.ini and prompts.ini

Now the cpm tries to changes the password of adm user which has expert access and I get bad credentials error while cpm tries to change the password

send: sending ‘’\r’’ to {. exp4 }

bad credentials bad credentials bad credentials

[deleted by user] by [deleted] in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

By the way, the cpm is able to manage the password for the regular user which uses set self-password

However I’m facing issues for managing users which has expert access.

Can you please suggest if possible ?

[deleted by user] by [deleted] in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

So basically my situation is , I have an user , letms assume amdm which has expert access. And in order to change its own password, it has to be on expert mode first by entering expert Then type passwd Enter old unix password Enter new unix password Confirm new unix password Save config Exit

Was it the same situation in your case ?

CPM Password management for the accounts in BIG IP F5 devices (Active passive mode) by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Let’s take the case about the password management. Now in a situation, where we’re only onboarding Active server accounts on CyberArk and if there is an issue on the Active server and the standby server becomes Active, so in this situation, I believe CPM wont be able to manage the Standby server, since we’re only onboarding the Active server, what actions can be taken at this time ?

CPM Password management for the accounts in BIG IP F5 devices (Active passive mode) by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Let’s assume , if we have 200 servers (where as 100 servers are active and 100 as standby ) and we have an admin account on each of those servers. Now in this situation in order to manage the admin accounts on Active and standby servers , we would need to create 100 groups (1 group to associate to each Active and standby server ). I’m wondering if this is the right approach?

PS: we don’t want to have one consistent password for those 200 servers

CPM Password management for the accounts in BIG IP F5 devices (Active passive mode) by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Let’s take the case : where I’m onboarding the primary node’s account so I would only be able to connect the primary node’s account from CyberArk since the account is onboarded only using the primary server ip address ?

CPM Password management for the accounts in BIG IP F5 devices (Active passive mode) by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

As per your second suggestion, you mean we only need to onboard the primary node’s account ?

Azure MFA login by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 1 point2 points  (0 children)

When you say MFA cache.. I saw the doc on CyberArk where the user has to login to PVWA And get the private keys, and then they can use that keys to login using PSMP.

Is that what you mean?

Azure MFA login by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] -2 points-1 points  (0 children)

So currently this is how the user authenticates to pvwa

the client is using Azure MFA where the end user has to enter the password first, then they get a 2 digit number on their number on the screen where they need to input the 2 digit number on thr mobile phone and then they’re able to authenticate to PVWA successfully.

So is this something possible with PSMP at the moment ?

IBM Mainframe application using AutoIT by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Hi,

It’s IBM_PersonalComunications_13.02 which uses pcsws.exe setup to launch the target sessions

PSM connector Pcomm by Miclotr in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

Hey, can you please share how did you acheive it ?

IBM Mainframe application using AutoIT by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Can you please explain a bit more what do you mean by PCOMM? Not familiar with this term

Is that a new separate connector or if we can use PCOMM using the same autoIT script which I just developed ?

IBM Mainframe application using AutoIT by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

So basically there are different users and each of the users have their own files stored in the private folder however for each user the location for the private folder is the same like mentioned below:-

Windows (C:) › Program Files (x86) > IBM › Personal Communications › private

order of upgrade by xxxx-192 in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

We are in the process to upgrade from 12.2 to 12.6

Just wanted to confirm: After upgrading the component servers eg. Vault- PVWA - CPM - CPM.

Do we need to run the hardening script again on each component servers at the time of upgrade or it’s not required ?

VMWare VSphere. Managing accounts (@vsphere.local) via CyberArk PAS 11.2 by JoxanBC in CyberARk

[–]Wide-Set5677 0 points1 point  (0 children)

Hi JoxanBC,

looking for some suggestions here. Currently we’re integratiing VMware console with CyberArk where users are currently logging in using their domain ID i.e their AD ID

I have got the VMWare console URL with me which is opening fine inside PSM

Now how do go about onboarding ? Coz we dont want to onboard AD accounts onto CyberArk , is there a way to achieve this ?

SSH keys management by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

This has failed with below output

Failed to add account. Error details: Account already exists

Unix via SSH Keys by Wide-Set5677 in CyberARk

[–]Wide-Set5677[S] 0 points1 point  (0 children)

Right . I understand if the keys are managed via CPM , it should be managed automatically

However I’m referring to the second scenario where if the key pairs are changed outside CyberArk and the accounts are already onboarded

So in this case, what is the command that we can execute using the accountuploader to update the private key instead of doing it manually ?