- Windows Server 2016+ or Windows 10+
- PowerShell 5.1+ (included with Windows)
- Administrator privileges
- CyberArk Identity and Secrets Hub credentials
{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Parameters": { | |
"PolicyName": { | |
"Type": "String", | |
"Description": "Meaningful policy name" | |
}, | |
"CyberArkSecretsHubRoleARN": { | |
"Type": "String", | |
"Description": "The Secrets Hub tenant role ARN which will be trusted by this role" |
import getpass | |
from ark_sdk_python import ArkClient | |
from ark_sdk_python.auth import ArkISPAuth | |
def interactive_platform_auth(): | |
"""Interactive platform token authentication setup""" | |
# Gather credentials interactively | |
tenant_url = input("Enter your CyberArk tenant URL: ") | |
client_id = input("Enter your Service User client ID: ") |
# Requires: Az PowerShell Module | |
# Install with: Install-Module -Name Az -Scope CurrentUser | |
# ------------------------ | |
# VARIABLES - EDIT THESE | |
# ------------------------ | |
$ManagementGroupId = "<YourManagementGroupID>" # e.g. "mg-root" | |
# ------------------------ | |
# CONNECT TO AZURE |
# Version = 13.6.0.4-release/13.6 | |
#----------------------------------------- | |
# This script installs the Vault-Conjur Synchronizer | |
#------------------------------------------ | |
#Requires -Version 4.0 | |
param([switch] $silent, [switch] $forceNoPVWAApiUse, [switch] $trustPVWAAndConjurCert, [switch] $automationTests) | |
#region [Variables] |
This guide demonstrates how to authenticate to CyberArk's Self-Hosted Privileged Access Management (PAM) REST API using PingFederate SAML authentication with PowerShell.
The script implements a complete SAML authentication flow that:
- Initiates SAML authentication with CyberArk
- Redirects to PingFederate for authentication
function New-SAMLInteractive { | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory = $true)] | |
[string] $LoginIDP | |
) | |
Begin { | |
# Regular expression to extract SAML Response | |
$RegEx = '(?i)name="SAMLResponse"(?: type="hidden")? value=\"(.*?)\"(?:.*)?\/>' |
Overview:
This documentation demonstrates how to use GitHub's OpenID Connect (OIDC) as an authentication method in Conjur Cloud & Self-Hosted Enterprise using the authn-jwt
authenticator. The process involves configuring the JWT authenticator, mapping claims from the GitHub OIDC token to annotations in Conjur Cloud, and finally authenticating a workload.
- Plan the Configuration:
# Import the AWS module | |
Import-Module AWSPowerShell.NetCore | |
# Define the region | |
$region = "YOUR_AWS_REGION" | |
# Function to get temporary security credentials from EC2 instance's IAM role | |
function Get-TemporaryCredentials { | |
param ( | |
[string]$region |
To send data from a flat-file log on a server to QRadar, you need to set up a log source in QRadar to collect and process the logs. Here’s a step-by-step guide to accomplish this:
WinCollect is a Windows-based agent provided by IBM for QRadar to collect logs. Here are the steps to install and configure it:
- Download and Install WinCollect: Download the WinCollect agent from IBM's website and install it on your server.
- Configure the WinCollect Agent: During installation, configure the agent to point to your QRadar instance.