CyberArk Integration with ServiceNow
ServiceNow CyberArk Integration Steps to follow
The MID Server obtains the credential identifier from the instance, and then uses a customer-provided JAR file to resolve the identifier from the repository into a usable credential.
Note: Customer provided JAR file will be kept in MID Server
- Activate external credential storage for Discovery and Orchestration
- Configure the CyberArk vault and install the AIM API
- Install the CyberArk AIM API on the MID Server machine. API should be provided by client
- Configured CyberArk to allow the MID Server to access the vault by creating an App-ID in CyberArk called
- Every credential should be granted access to APP-ID ServiceNow_MID_Server.
- Install the CyberArk AIM API on the MID Server machine. API should be provided by client
- Provision CyberArk accounts and set permissions for application access.
- In the CyberArk Password Safe, create the privileged accounts required by Discovery, to access different devices and ensure that these accounts are members of the safes in which the necessary credentials are stored.
- Import the CyberArk JAR file
- Import the CyberArk JavaPasswordSDK.jar file into the instance to make it accessible to the MID Server.
- Use this process even if the JavaPasswordSDK.jar file already exists on the MID Server.
- Use this process even if the JavaPasswordSDK.jar file already exists on the MID Server.
- Navigate to MID Server > JAR Files.
- Click New. And complete the form
- Attach the JAR file to this record
- The AIM JavaPasswordSDK.jar file comes with the AIM SDK installation files and is typically located on the MID Server in the AIM installation directory at/CyberArk/ApplicationPasswordSdk.
- The AIM JavaPasswordSDK.jar file comes with the AIM SDK installation files and is typically located on the MID Server in the AIM installation directory at/CyberArk/ApplicationPasswordSdk.
- Restart the MID Server service.
- Import the CyberArk JavaPasswordSDK.jar file into the instance to make it accessible to the MID Server.
- Configure MID Server for CyberArk
- xmlfile to grant the MID Server access to the CyberArk vault
- We should have “JavaPasswordSDK.jar” inside MID Server
- We should have “JavaPasswordSDK.jar” inside MID Server
- Required configuration parameters
- ext.cred.safe_folder
1. NameOfFolder : Folder to use for all credential lookups. For example, root. - ext.cred.use_cyberark
1. True : Boolean parameter indicating that this MID Server is integrated with CyberArk. - Optional configuration parameters
1. ext.cred.safe_timeout
1. 5 Sec : Timeout of each credential lookup in the vault, specified in seconds.
2. ext.cred.safe_name
1. NameOfSafe : Default safe name used for all credential lookups. If parameters are in multiple safes, the credential ID may be specified in the format :.
- ext.cred.safe_folder
- xmlfile to grant the MID Server access to the CyberArk vault
- ext.cred.app_id
- ServiceNow_MID_Server : Specifies the App-ID used to grant permission to the MID Server to access the CyberArk vault. The default value, ServiceNow_MID_Server, must be defined in the CyberArk vault.
- ext.cred.type_specifier
- true : Forces an IP address lookup to return credentials that match both the CyberArk platform ID and the IP address.
- ext.cred.check_ssh_type
- False : When set to true, requires that the type of SSH credential returned from CyberArk matches the type of credential requested.
- Configure Cyber Ark for SNMP V2 Credential
Note: If the community string appears in the password field of the CyberArk credential, it is not necessary to perform this procedure.
- If we have system that uses SNMPv2, we need to create a special file to map the attribute in a credential to the community string.
- In a text editor, create a file called CredMap.properties, containing this code:
- Save the file to the /agentdirectory of your MID Server installation
- In a text editor, create a file called CredMap.properties, containing this code:
- Configure The CyberArk Credential Identifier
Credential identifier configured:
- Discovery > Credentials or Orchestration > Credentials.
- Credential ID
- Enter the unique key configured for external credentials in the JAR file uploaded to the MID Server for an external credential system. This is the ID passed to the Java class in the parameter map.
- Credential ID
- Select the External credential store check box.
- The User name and Password fields disappear, and the Credential ID field appears.
- In Credential ID, enter the unique key configured for these credentials in the external repository. This is the identifier defined in the JAR file.
In the Credential ID field, enter an expression using one of these formats:
- * If all your credentials are in the same safe, configure this safe name in the MID Server config.xml file using the ext.cred.safe_name parameter, and then specify the credential ID by name only, as .
- To name credentials for a given platform that reside is a specific safe, define the credential ID as ::.
- If your credentials are in multiple safes, specify the credential ID in this format: :.
- If you want CyberArk to look up the credential by IP address, using an alternate safe, specify the credential ID in this format: :.
- If you want CyberArk to look up the credential for an alternate platform ID in the same safe, use this format: ::
- If you want CyberArk to look up the credential in a configured safe by the IP address rather than the credential ID, leave this field blank. This is the best practice for handling installations in which each server has a unique credential. Without this type of lookup, you must create a credential ID record in your instance for every server in your environment.
- To name credentials for a given platform that reside is a specific safe, define the credential ID as ::.
Note: The credential ID must match the value in the Name field of the credential in the CyberArk vault. The Credential ID field has a limit of 40 characters.
Configure AWS Credential on CyberArk Vault
- Store the credentials as an SSH key on the CyberArk vault.
- When you configure access to the vault on your instance, the name you give to the SSH key must also be used as the credential ID.
Property: A property called Enable External Credential Storage
com.snc.use_external_credentials
- enables or disables the External Credential Storage plugin after it is activated
- The property is located
- Discovery Definition > Properties and Orchestration > MID Server Properties,
JAR File to resolve Credentials:
JAR file to resolve credential identifiers sent from the MID Server into actual credentials from the repository
Template to create JAR file
Note: Customer would be providing JAR file to resolve credential.
Important: You cannot manage credentials stored on a CyberArk vault and a custom external credential storage system using the same MID Server. To use both types of external storage, install and configure a dedicated MID Server for each. The MID Server must be installed on the same machine as the CyberArk AIM API/client
Credential Process Flow:
Property: A property called Enable External Credential Storage
com.snc.use_external_credentials
- enables or disables the External Credential Storage plugin after it is activated
- The property is located
- Discovery Definition > Properties and Orchestration > MID Server Properties,
Supported Credential Type:
The CyberArk integration supports these ServiceNow credential types:
- CIM
- JMS
- SNMP Community
- SSH
- SSH Private Key (with key only)
- VMware
- Windows
Orchestration activities that use these network protocols support the use of credentials stored on a CyberArk vault:
Important: You cannot manage credentials stored on a CyberArk vault and a custom external credential storage system using the same MID Server. To use both types of external storage, install and configure a dedicated MID Server for each. The MID Server must be installed on the same machine as the CyberArk AIM API/client
Please hit like or mark as Bookmark if this article helps you.
Regards
Sandeep
Labels:
https://www.servicenow.com/community/developer-articles/cyberark-integration-with-servicenow/ta-p/2330129
