For Bot auto-login use case, Automation 360 retrieves credentials from BeyondTrust Password Safe.

Retrieve auto-login credentials

Note: This use case applies only to Automation 360 Cloud deployments.

Auto-login credentials are used to authenticate to an Automation 360 Bot Agent device and start an active Windows Server session. This requires an active Windows Server session to function. Auto-login occurs before automations are launched from a remote Bot Agent device.

To enable auto-login, each automation runtime user must be mapped to a target device. This requires mapping of the Control Room username with the secret names so that during runtime, the Bot Runner user can retrieve the device credentials from the BeyondTrust Password Safe.

To map the Control Room username with the secret names:

  1. Navigate to Administration > Settings > External key vault > Device auto login.
  2. Click Edit and select Manage custom secrets mappings.
  3. Download the Custom Secrets Name Mapping Template.csv template and add the following entries in the format specified:
    • Username
    • System name
    • Account name
  4. Click Import .csv and browse to select the Custom Secrets Name Mapping Template.csv template file to map the Control Room usernames with the secret names.Manage custom secrets mapping
  5. Click Import and save. The custom secrets mapping table is populated with the updated entries.Import and save custom secrets mapping

After mapping the Control Room usernames with secret names, you can enable the device auto login settings to retrieve auto-login credentials from the BeyondTrust Password Safe, using the following procedure:

  1. Log in to the Automation 360 Control Room with View Settings > Manage Settings permission.
  2. From the Control Room, navigate to Administration > Settings > External key vault > Device auto login.
  3. Click Edit.
  4. Click Enabled to retrieve the auto-login credentials from that external key vault. Sample screen of BeyondTrust Device auto login
  5. Click Save changes to save the configuration.

Custom secrets mapping management options

Following actions can be performed on the custom secrets mapping information from the Control Room:
  • Export mapping Export mapping: Exports the current configuration of mappings into a .csv file.
  • Delete rows Delete rows: Allows removal of selected rows from the current mapping.
  • Import mapping Import mapping: Enables the import of mappings from a prepared .csv file.
  • Search option: Filters for easier access to specific mappings in the table. Search mapping
  • Customize mapping Customize mapping: Allows you to customize the mapped columns using show/hide option.
  • Refresh mapping Refresh mapping: Refreshes the mapped entries.

Audit logs

For information about audit log events for external key vault, see External key vault audit log.