Blue Prism 6 Cyberark Integration User Guide
Blue Prism 6 Cyberark Integration User Guide
Blue Prism 6 Cyberark Integration User Guide
Contents
Trademarks and Copyright
Contents 2
3
Introduction 4
CyberArk IntegrationSolution Overview 5
Configuring the CyberArk AIM Server 6
Defining the Application ID (AppID) and Authentication Details 6
Provisioning Accounts and Setting Permissions for Application Access 9
Configuring Blue Prism for CyberArk Integration 11
Create a CyberArk VBO 14
CyberArk GetPassword input parameters
CyberArk GetPassword output parameters
1516
Introduction
Blue Prism can easily receive credentials stored in CyberArk by utilising CyberArk's SOAP Web Service
interface to Application Identity Manager. This guide outlines the steps required to configure AIM and
integrate the CyberArk credential workflow into a Business Object.
4. Select the Allow extended authentication restrictions check box. This enables you to specify an
unlimited number of machines and Windows domain OS users for a single application.
5. Specify the application’s Authentication details. This information enables the Credential Provider to
check certain application characteristics before retrieving the application password. Blue Prism will
expect to authenticate either via IP white-list or via certificate, and does not provide credentials
during the Web Service call.
• In the Authentication tab, click Add; a drop-down list of authentication characteristics
displays.
• Select the authentication characteristic to specify.
6. Specify the OS user:
• Select OS user; the Add Operating System User Authentication window displays.
• Specify the name of the OS user who will run the application, then click Add; the OS user is
listed in the Authentication tab.
7. Specify the application path:
3. Add the Provider user as a Safe Member with the following authorizations.
• List accounts
• Retrieve accounts
• View Safe Members
When installing multiple Providers for this integration, it is recommended to create a group for
them, and add the group to the Safe once with the above authorization.
4. Add the application(the APPID) as a Safe Member with the Retrieve accounts authorizations.
2. Enter the WSDL URL for the CyberArk Web Service that you want to consume and click Next.
3. Enter any HTTP or SLL Authentication details if required by the SOAP Web Service.
4. You can configure the timeout when interacting with the service. It is recommended this is left at
the default value of 10000 milliseconds unless there is a known problematic latency issue.
5. Blue Prism will import the web service definitions from the WSDL. Click Next.
6. Select the Web Service from the WSDL that you want to include. There should be one CyberArk
Web Service, select it and click Next.
7. You will be given the option of selecting the Web Service methods you want to use, the
GetPassword method should exist and already be ticked. Click Next.
8. Blue Prism will give a Blue Prism object name to the Web Service based upon the name provided
within the WSDL. Click Finish.
The CyberArk Web Service will now be registered within the Blue Prism product. You will be able to call
the GetPassword function in your Process or Object studio flow diagrams using an action stage.
For any system or application where CyberArk is used as the credential store instead of Blue Prism, this
action can be called from the process to retrieve the credentials from CyberArk.
An enhancement request has been raised with Blue Prism so that optional input parameters are
omitted from web service requests. That enhancement, when delivered, will mean that only the
AppID and Object input parameters will need to be set.
Original logic
Modified Logic
An example of this modified logic is distributed alongside this guide. The main points of note are:
• A Blue Prism credential is still created and used. This allows a mix of CyberArk and Blue Prism
credentials to be stored depending upon solution design requirements. It also allows the use of
Roles and Permissions in Blue Prism to continue to dictate what Process, Resource, and User can
use the credential.
• If the Blue Prism credential includes a Property called CyberArk App ID, then the credentials are
stored in CyberArk rather than in the Blue Prism credential.
• If the CyberArk App ID property exists it and a CyberArk Object Property are used as input
parameters to the CyberArk VBO object, which was described earlier in this guide.
• If the CyberArk App ID property does not exist it signifies that credentials are not stored in
CyberArk.