CyberArk Cookbook - Lesson 1a

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Cyber-Ark lesson

Vault
Objectives

• What is the Vault Server


• Terminology: Safes, Owners, Users…
• PrivateArk client
• In the Box – Master and Operator CD
• Vault Environment
• Software vs. Appliance
• Exercise

2
Digital Vault – The Concept

A safe haven, highly


secured regardless of
overall network security

3
Tightly Coupled Layers of Security

• US Patent #6,356,941
• Unparalleled centralized secure storage and sharing platform
• Securing data from end-to-end using multiple security layers

Cyber-Ark
LAN, WAN,
Vault Server INTERNET

4
Terminology - Users

Vault Server

Location Location Location

Location User User Group

User

5
Terminology - Safes

Vault Server Owner Owner

Safe Safe Safe

Folder Folder Folder

Password/File Password/File

Password/File Password/File

• Users can be owners of safes with different


level of permissions (read only, read/write..)
6
Terminology

Vault Server

Network Area Network Area Network Area

Examples:
• London Office - 192.168.x.x
• Administrator room – 192.168.42.12 -
192.168.42.19
• Backup Server – 192.168.47.6
7
Vault Management’s client

• PrivateArk Client
• End-to-end Security, High-Performance,
Worldwide Accessibility

8
Why I need it?

• Administer The Vault

9
How to install

Two Methods :
• Windows Install (Normal Or silence Installation)
• ActiveX

10
Vault Environment
Vault Environment

12
Vault Config Files

• DBParm.ini
–Main Configuration file of the vault

• Passparm.ini
–Configure password policy of the vault

• PARagent.ini
–Configure Remote Control in the vault

13
Vault Log Files

• Italog.log
–Main log file of the vault server
–It is detailed according to the debug level
configured in the dbparm.ini

• PARAgent.log
–Log file of the remote control agent

14
In the Box

• Software CD
• Unique Operator CD (2 sets)
–Encryption Keys for the
Vault server to start
–Should be kept in a physical safe
• Unique Master CD (2 sets)
–Encryption Keys for the
Vault server to start
–Encryption Keys for the Master User to logon
–Should be used only in case of a disaster
–Should be kept in a physical safe

15
Installing the Vault Server

• Make all preparations:


–Backup decisions
–Authentication decisions
–Static IP
–Encryption keys
–Make sure the hardware and SW requirements
were met (Clean OS, no anti-virus etc.)
• Installation
–Make sure the customer keeps Master password
• Following Installation
–Check that Vault is up and running

16
Software vs. Appliance

• Cyber-Ark is a software company


• Based on DELL hardware which are pre-
installed and configured with the Cyber-
Ark Enterprise Password Vault
• Basic/Advanced Appliance specs
• Vault Appliance only (not all-in-one)

17
Hands on Lab

• Cyber-Ark Vault Exercise

18
Summary

• Vault – “Island of Security”


• Terminology: Vault , Safes, User,
Network Area
• Powerful Management Client
• Enterprise Password Vault Box
• Appliance (Pre Installed Server)
• Additional Info can be found in the
Implementation Guide.

19
Q&A

You might also like