- Windows Server 2016+ or Windows 10+
- PowerShell 5.1+ (included with Windows)
- Administrator privileges
- CyberArk Identity and Secrets Hub credentials
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
kubectl create ns cyberark-poc | |
kubectl create sa -n cyberark-poc cyberark-poc-app-sa |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Parameters": { | |
"PolicyName": { | |
"Type": "String", | |
"Description": "Meaningful policy name" | |
}, | |
"CyberArkSecretsHubRoleARN": { | |
"Type": "String", | |
"Description": "The Secrets Hub tenant role ARN which will be trusted by this role" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import getpass | |
from ark_sdk_python import ArkClient | |
from ark_sdk_python.auth import ArkISPAuth | |
def interactive_platform_auth(): | |
"""Interactive platform token authentication setup""" | |
# Gather credentials interactively | |
tenant_url = input("Enter your CyberArk tenant URL: ") | |
client_id = input("Enter your Service User client ID: ") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Requires: Az PowerShell Module | |
# Install with: Install-Module -Name Az -Scope CurrentUser | |
# ------------------------ | |
# VARIABLES - EDIT THESE | |
# ------------------------ | |
$ManagementGroupId = "<YourManagementGroupID>" # e.g. "mg-root" | |
# ------------------------ | |
# CONNECT TO AZURE |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Version = 13.6.0.4-release/13.6 | |
#----------------------------------------- | |
# This script installs the Vault-Conjur Synchronizer | |
#------------------------------------------ | |
#Requires -Version 4.0 | |
param([switch] $silent, [switch] $forceNoPVWAApiUse, [switch] $trustPVWAAndConjurCert, [switch] $automationTests) | |
#region [Variables] |
This guide demonstrates how to authenticate to CyberArk's Self-Hosted Privileged Access Management (PAM) REST API using PingFederate SAML authentication with PowerShell.
The script implements a complete SAML authentication flow that:
- Initiates SAML authentication with CyberArk
- Redirects to PingFederate for authentication
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function New-SAMLInteractive { | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory = $true)] | |
[string] $LoginIDP | |
) | |
Begin { | |
# Regular expression to extract SAML Response | |
$RegEx = '(?i)name="SAMLResponse"(?: type="hidden")? value=\"(.*?)\"(?:.*)?\/>' |
Overview:
This documentation demonstrates how to use GitHub's OpenID Connect (OIDC) as an authentication method in Conjur Cloud & Self-Hosted Enterprise using the authn-jwt
authenticator. The process involves configuring the JWT authenticator, mapping claims from the GitHub OIDC token to annotations in Conjur Cloud, and finally authenticating a workload.
- Plan the Configuration:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Import the AWS module | |
Import-Module AWSPowerShell.NetCore | |
# Define the region | |
$region = "YOUR_AWS_REGION" | |
# Function to get temporary security credentials from EC2 instance's IAM role | |
function Get-TemporaryCredentials { | |
param ( | |
[string]$region |
NewerOlder