On-Premises integration using CyberArk Password Vault

As an Automation 360 administrator, you can configure the CyberArk On-Premises integration using one of these methods: initial installation or post-installation using a command-line interactive key vault utility.

Within the On-Premises installation wizard, bootstrap credential retrieval from external key vault configuration options are only available if you first configure the key vault connection. The configuration options vary based on the external key vault you select.

Note: If you are using CyberArk in an Automation 360 Cloud deployment, then the CyberArk external key vault must be reachable from the Cloud Control Room through the network perimeter firewall rules. For external firewall rules configuration details, see Control Room IP addresses for external integrations.