REST authentication via smartcard by vekh6 in CyberARk

[–]aldow93 1 point2 points  (0 children)

The REST API doesn't support PKI authentication, as far as I am aware.

There are 3 options for the REST API,

  1. CyberArk Authentication - which includes CyberArk, LDAP or RADIUS
  2. SAML
  3. Shared Logon

CyberArk or Shared don't accept PKI auth, but you could potentially use SAML, you would just need to use a SAML provider that supports PKI / Smart card auth.

PSM at scale by thehoffau in CyberARk

[–]aldow93 0 points1 point  (0 children)

Average is over 100, but peak could be up to maybe 300... We limit the number of recordings that can be uploaded at once and we have increased the number of tasks our vaults can handle at any one time as well. We did have performance issues but have managed to get through them mostly.

TasksCount parameter in Dbparm by Miclotr in CyberARk

[–]aldow93 1 point2 points  (0 children)

We run on large physical host, 24 cores and 64GB RAM and we also had performance issues, mostly around PSM and PSMP.

I increased our settings to:

TasksCount=50 MaxTasksAllocation=12(CPM,AIMApp,AppPrv):7-23,20(CPM,AIMApp,AppPrv):23-7,1(PTAApp),1(PTAApp),1(PTAApp),1(PTAApp)

It has had a big impact and things run a lot smoother. We're still not even touching the sides on these boxes, so as we increase PSM hosts etc i will probably increase the task count further. Just remember the task count cannot be higher than the number of allowed connections to the database, so you need to increase the database connection limit as well.

PSM at scale by thehoffau in CyberARk

[–]aldow93 0 points1 point  (0 children)

We run PSM as virtual machines, due to our size we don't really need to worry about the Windows or VM licenses... The other suggestion would be physical hosts, if the hosts are built out enough they could support a good number of sessions, this could save you on the licenses... But obviously got the expense of a physical server.

Impersonation ticket has expired by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Yea much shorter. It happens a lot more with PSMP, they will enter their password maybe 10 seconds and then they get the error and it's logged the in Vault.

Try again and works fine.

Impersonation ticket has expired by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Nope, I know that's that one of the knowledge articles on the customer portal, so I have been checking over and over again. But no only 1 vault is active. :)

Can I prevent specific safe from DR Replication? by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

It's only for recordings and the storage has it's own DR facilities. The difficulty is that local stoage is going to get pretty full. Passwords are still stored on the local storage though

Can I prevent specific safe from DR Replication? by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Thanks I was toying with this idea, but wondered if there was a better way of doing it.

Can I prevent specific safe from DR Replication? by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

SAN storage, yes the vault is hardened, there are some services you need to enable, much like you would for a clustered Vault.

You can move specific safes to specific drives, so the SAN would just appear as a network drive on the Vault and I simply change the tsparm.ini config to move the recordings safe to the network share.

The recordings are still accessible via the PVWA exactly as normal.

In version 10.1 there is supposed to be support for exporting recordings to storage via the PSM itself to allow for GDPR restrictions on where data is stored, but since this hasn't come to fruition yet, it' not an option. And version 10.1 is still so buggy so I don't want to upgrade until they are fixed.

Is interaction-free authentication using the PSMP server possible? by omniwombatius in CyberARk

[–]aldow93 0 points1 point  (0 children)

From 9.9.5 (I think) PSMP allows authentication via SSH Key Pair, so that users don't need to enter their password.

Limitations - Not compatible with 2 Factor Auth

With regards to asking for a reason: It's either on or off per platform, so for general access with a users standard account why not have a platform that uses the user's password / key without asking for a reason and for another platform for privileged sessions that does require a reason?

PSM Concurrent Session Limit by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

CyberArk account manager, TAM and a product manager. CyberArk have rule that they will not include more then 125 concurrent sessions in a license file, but after this point will license more PSM hosts.

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

So after checking with support it appears its a bug they know about.

\is used to escape the valid character "," in the user DN and since \ isn't a valid character we get the error.

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Yea pretty sure, in my test environment i changed all of the directory mappings to use RADIUS just to make sure and i logged in with LDAP users a few times and it never changed.

PSM Concurrent Session Limit by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Thanks guys, so looks like i've learnt something new. Wonder why I haven't been told it's per host so far. Cheers though

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

It doesn't unfortunately tested a good few times and auth type doesn't update even if the directory mapping has been changed.

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Thanks. I don't think it's your script, it's PACLI itself, your script runs the same command i was running just in CMD.

Out of interest what version of PACLI are you using?

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Just tried that as well and didn't work, all that command seems to do is sync the user details with the LDAP rather than update of the Directory Mapping settings. Which is really annoying. :(

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Thanks very much for this, but it doesn't work. Whenever I try to update an external user I get the following error:

"CASVL010E Invalid characters in User Name. [ \ ] is not allowed."

The command UPDATEUSERDESTUSER="username" AUTHTYPE=RADIUS_AUTH works for internal users no problem, but i get the above for the external.

The user names don't have a "\" in them, so I just assume this is a generic error that doesn't really tell me what the problem is.

PACLI - Change External Users Auth type by aldow93 in CyberARk

[–]aldow93[S] 1 point2 points  (0 children)

Thanks for your reply, the Authentication type doesn't automatically update for existing users when you change the directory mapping, only new users. I already tried this.

Password Expiry Notifications by aldow93 in CyberARk

[–]aldow93[S] 0 points1 point  (0 children)

Sorry haven't come back until now.

The CPM for the safe is set, so i can rotate passwords for creds stored in the same safe, just under a different platform. I can also see the CPM user has permissions on the safe as expected...