Privileged Access Security System Requirements
Privileged Access Security System Requirements
System Requirements
Version 10.9
Including:
Privileged Identity Management Suite
Privileged Session Management Suite
Table of Contents
The following tables summarize the recommended hardware and software specifications
for the required servers when implementing CyberArk’s Privileged Access Security
(PAS) solution. These hardware specifications are based on the entry level industry
standard for small to mid-range servers.
For installation on a VM based environment, the requirements can be customized based
on customer needs, according to the CyberArk server requirements.
Specifications
Hardware specifications
Software prerequisites
______________________________
[1] For more information, refer to Privileged Session Manager®, page 41.
[2] Contact your CyberArk support representative for the most recent supported service pack
requirements.
Specifications
Very large
Mid-range Large
Small implementation
implementation implementation
implementation (more than
(1,000-20,000 (20,000 – 100,000
(<1,000 managed 100,000
managed managed
passwords) managed
passwords) passwords)
passwords)
Hardware specifications
Software prerequisites
Very large
Mid-range Large
Small implementation
implementation implementation
implementation (more than
(1,000-20,000 (20,000 – 100,000
(<1,000 managed 100,000
managed managed
passwords) managed
passwords) passwords)
passwords)
Note:
Cluster Nodes must be installed only on physical servers.
Specifications
Hardware specifications
PSM servers
The following table lists the recommended specifications for PSM servers.
Specifications
Mid-range
Small implementation Large implementation
implementation
(1-10 concurrent (51-100 concurrent
(11-50 concurrent
RDP/SSH sessions) RDP/SSH sessions)
RDP/SSH sessions)
General Notes:
■ The concurrency of 100 sessions per PSM server should not be exceeded.
■ The concurrent sessions ranges are based on the RDP and SSH connections
performance measurements.
■ Running resource-intensive applications like Toad, vSphere Client and so on, on the
PSM server will result in lower concurrency.
■ The concurrent session’s ranges assume PSM is running on a dedicated server.
■ The concurrent session’s ranges are based on performance measurements while
video recording user’s activities in HD resolution (one screen). Note that video
recording resolution is affected by the desktop resolution of the client machine from
which the connection was made. This means that performing connections from
client machines with more than one HD screen, or with a higher resolution screen,
will result in lower concurrency.
Server Virtualization Note:
■ Installing the PSM server on a virtual machine requires allocating virtual hardware
resources that are equivalent to the physical hardware specifications. For details,
refer to the recommended settings for installing PSM on a virtual machine in the
Privileged Access Security Installation Guide.
■ The maximum concurrency is lower (up to 40%) when installing the PSM server on a
virtual machine.
Software Prerequisites
Mid-range
Small implementation Large implementation
implementation
(1-10 concurrent (51-100 concurrent
(11-50 concurrent
RDP/SSH sessions) RDP/SSH sessions)
RDP/SSH sessions)
Specifications
Mid-range
Small implementation Large implementation
implementation
(<100 concurrent (>200 concurrent
(100-200 concurrent
sessions) sessions)
sessions)
Software Prerequisites
Red Hat Enterprise Linux 5.x versions (5.6 and above), 6.x versions (6.4 and above)
and 7.x versions.
CentOS Linux 5.x versions (5.6 and above), 6.x versions (6.4 and above) and 7.x
versions.
Note:
Security patches, and OS vendor recommended minor 5.x, 6.x or 7.x
RHEL and CentOS upgrades can be applied on the server without
reinstalling PSM for SSH.
The following system requirements list the most up-to-date supported platforms,
including service packs. Unless otherwise specified, new service packs are not
automatically supported.
CyberArk may choose not to provide maintenance and support services for the CyberArk
Privileged Access Security (PAS) solution with relation to any of the platforms and
systems listed below which have reached their formal End-of-Life date, as published by
their respective vendors from time to time. For more details, contact your CyberArk
support representative.
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk Digital Vault Server with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Minimum requirements
The Digital Vault server requires an Intel Pentium IV (or compatible) processor or later.
To ensure maximum protection for the sensitive data inside the Digital Vault Server, the
server is designed to be installed on a dedicated computer in a clean environment that
does not have any additional software installed on it.
Supported platforms
The Digital Vault server is currently supported on the following platforms:
■ Windows 2016 English Edition
■ Windows 2012 R2 Standard Edition
■ Windows 2012 R2 English/German Edition
■ Windows 2008 R2 with Service Pack 1 (64-bit) English/German Edition (for
upgrades of existing deployments only)
Software requirements
■ .NET Framework 4.5.2
Note:
As a result of Microsoft’s backward compatibility, Vault can run on servers with .NET
Framework 4.6.* (excluding .NET Framework 4.6.1) or .NET Framework 4.7.*.
Directories:
Directory Platforms
Directory Platforms
■ Windows 2012 R2
■ Windows 2016
This list may be updated frequently as additional directories are certified. Please contact
CyberArk Customer Support for information about additional directories that are not
mentioned in the list above.
Compatible
CyberArk component
versions
High Availability
Requirement Description
Both nodes must have the same If the two nodes do not have the same amount of
amount of physical memory. physical memory, update the innodb_log_file_
size parameter in the my.ini file of the second
node and specify the same value as in the first
node.
Both nodes must be connected This network must contain only the Vault Cluster
directly via a private network or machines in order to keep the Vault Cluster
cross-over cable. isolated and secure.
Requirement Description
Shared storage that supports the CyberArk recommends using SAN with
SCSI3 protocol. Fibre channel, which is faster and more
reliable.
Use GPT and MBR disks, not dynamic
disks.
NIC configuration You must use crossover cables for the private
network. NIC teaming in load balancing mode is
not allowed. Only an Active-Passive
configuration is allowed. For details on
configuring the NIC teaming, refer to
https://docs.microsoft.com/en-us/windows-
server/networking/technologies/nic-
teaming/create-a-new-nic-team.
PrivateArk Client
The PrivateArk Client is the Windows interface for performing administrative operations
in the Privileged Access Security solution, such as user management.
Note:
CyberArk may choose not to provide maintenance and support services for the
PrivateArk Client with relation to any of the platforms and systems listed below which
have reached their formal End-of-Life date, as published by their respective vendors
from time to time. For more details, contact your CyberArk support representative.
Minimum requirements
Supported platforms
The PrivateArk Client is currently supported on the following platforms:
Windows 2016
Windows 2012 R2
Windows 10
Windows 2008 R2 with Service Pack 1 (64-bit)
Windows 2008 (32-bit)
Windows 7 with Service Pack 1 (32-bit and 64-bit)
Reports that are generated in the PrivateArk Client can either be saved to a text file, or to
any of the following Office applications:
Excel XP, Excel 2003, Excel 2007, Excel 2010
NT Authentication Agent
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk NT Authentication Agent with relation to any of the platforms and systems
listed below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Minimum requirements
Windows 2012 R2
Windows 2008 R2 with Service Pack 1
Windows 2003 with Service Pack 2 (32-bit)
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk Vault Backup Utility with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Minimum requirements
Windows 2016
Windows 2012 R2
Windows 2008 R2 with Service Pack 1 English Edition
Windows 2003 with Service Pack 2 (32-bit)
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk Remote Control Client with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Minimum requirements
Windows 2012 R2
Windows 2008 R2 with Service Pack 1
Windows 2003 with Service Pack 2 (32-bit)
Windows XP with Service Pack 3 (32-bit)
Note:
CyberArk may choose not to provide maintenance and support services for the
Password Vault Web Access with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Minimum requirements
Note:
Password Vault Web Access can be installed on virtual hosts such as VMWare, Hyper-
V and KVM.
Supported browsers
PVWA v10 interface
The PVWA interface is supported on the following browsers:
Chrome 56 and higher
Internet Explorer 11.0 on Windows
Prerequisites:
In Internet Options à Security Settings à Downloads and select the
following:
File download à Enable
Font download à Enable
Microsoft Edge version 38 and higher
Note:
For IE 9.0, the PVWA requires IE 8 compatibility mode.
For IE 10.0, install hotfix KB2836943 on the PVWA server.
Note:
Make sure that Firefox includes the Java plug-in.
Supported connections
■ PSM connections to remote machines are supported with IPv4 and IPv6 addresses.
RDP ActiveX Client 5.2 or later for environments set up to use an ActiveX
connection method for PSM connection)
CyberArk PSM codec For viewing high compression session recordings with an
external player (e.g. Windows Media Player). The
PSMCodec.exe is included in the PSM installation package
and is required to enable users to view PSM recordings with a
regular media player (not PSM Direct Playback).
JRE (Java Runtime JRE 1.4, or later (for SSH transparent connections)
Environment)
Adobe Flash player 10.0 browser add-on, or later (for PSM Direct Playback with
IE browser)
Note:
For PSM Connections make sure that your
CyberArk license includes the relevant a license for
an external tool that will support these connections.
Currently this external tool doesn’t support
connections when RD Gateway is configured in the
environment. For more information, refer to
Configuring PSM Connections in the Privileged
Access Security Implementation Guide.
Supported languages
PVWA supports the following languages:
■ English ■ Japanese
■ French ■ Korean
■ Spanish ■ Simplified Chinese
■ German ■ Traditional Chinese
■ Russian ■ Brazilian Portuguese
■ Polish ■ Turkish
Note:
New functionality for which texts have not yet been translated will be shown in English.
Component Version
Accounts Feed
Note:
When scanning a specified domain, the discovery automatically retrieves information
about discovered accounts that is stored in trusted domains, without requiring
additional permission. Specifically, the discovery only retrieves information about
Windows Services dependencies and Scheduled Tasks dependencies that derive from
trusted domains.
Note:
The Discovery does not support scanning Active Directory domain controllers
Note:
In Windows Vista or newer, the domain
user must belong to the Administrators
group or to a group nested within the
Administrators group.
In older versions of Windows, the
domain user can be a member of any
privileged group
Supported servers
■ Windows 2003
■ Windows 2008
■ Windows 2012
■ Windows 2016
Note:
To discover Scheduled Tasks on Windows 2012, the CyberArk Scanner (CPM) must be
installed on Windows 2012.
To discover IIS Application Pools accounts, IIS Directory Security (Anonymous Access)
accounts and COM+ Applications accounts, IIS7.5 or 8.5 must be installed.
Supported protocols
Protocols that are supported when accessing the Active Directory
■ LDAPS (default)
Note:
To support LDAPS in discoveries, this protocol must be configured in the Active
Directory
■ LDAP
Network protocols
■ Windows File and Print Sharing
■ Windows (WMI)
For details about how to enable the Windows (WMI) Protocol in your environment, see
Appendix G: Enabling WMI Ports on Windows Client Machines in the Privileged Access
Security Implementation Guide.
For more information about the ports that EPV uses to access remote machines, refer to
Standard Ports used for Accounts Discovery, page 90.
Note:
Domain users that are used to authenticating to Unix machines (using AD Bridge
integration) are currently not discovered
sudoers for the "cat The minimum details required to create a pending
/etc/passwd" command account (user name and address)
Note:
In order to scan Unix machines for SSH keys, your CyberArk license must include
SSHKM. For more information, contact your CyberArk representative.
sudoers for the "cat /etc/passwd" command The minimum details required
to create a pending account
(user name and address)
Note:
CyberArk may choose not to provide maintenance and support services for the Central
Policy Manager with relation to any of the platforms and systems listed below which
have reached their formal End-of-Life date, as published by their respective vendors
from time to time. For more details, contact your CyberArk support representative.
Minimum requirements
Disk space: 15MB free disk space for installation, and additional space for log
files
Minimum 4 GB
memory:
For specific system requirements of the different plug-ins of the Central Policy Manager,
see the Privileged Access Security Implementation Guide.
Note:
Central Policy Manager can be installed on virtual hosts such as VMWare, Hyper-V and
KVM.
Operating Systems
Automatic password management is supported on the following platforms on IPv4
and IPv6:
Note:
In order to manage Windows Scheduled
Tasks on Windows 7, Windows 2008
Server, and Windows Vista, the CPM must
be installed on Windows 2008 R2 with
Service Pack 1 or 2012 server.
In order to manage Windows Scheduled
Tasks on Windows 10, the CPM must be
installed on Windows 2012 server.
Note:
Automatic password management is only
supported on IPv4.
Note:
For higher versions, additional
customizations may be required.
■ Ubuntu 12.04, 16
■ Fedora 18, 22, 23, 27, 28
■ CentOS 6 (32-bit and 64-bit), 7
■ SUSE Linux 10, 11, 12
■ OpenSUSE 42
■ Cygwin
Note:
Automatic password management is only
supported on IPv4.
Note:
Automatic password management is only
supported on IPv4.
Databases
Automatic password management is supported on the following platforms on IPv4
and IPv6:
Databases that support ■ All databases that support ODBC version 2.7 and
ODBC Connections higher
Note:
For higher versions, additional customizations
may be required.
Note:
For higher versions, additional customizations
may be required.
Microsoft SQL Server ■ Microsoft SQL Server 7, 2010, 2012, 2014, 2016
passwords
Note:
For higher versions, additional customizations
may be required.
Note:
For higher versions, additional customizations
may be required.
Note:
For higher versions, additional customizations
may be required.
Remote Access
Automatic password management is supported on the following platforms:
Security Appliances
Note:
For higher
versions,
additional
customizations
may be
required.
Network Devices
Cisco Router Cisco Routers that support IOS 12.3 or later through Telnet, for
passwords: the following modes:
■ regular user
■ enable
■ terminal
Note:
For higher versions, additional customizations may
be required.
Cisco PIX Cisco PIX machines, version 6.3 or later, for the following
passwords: modes:
■ enable
■ terminal
Note:
For higher versions, additional customizations may
be required.
Directories
Applications
Cloud Services
■ Amazon Web Services (AWS)
■ Microsoft Azure
Others
■ Passwords stored in Windows Registry
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk SSH Key Manager with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
The SSH Key Manager (SSHKM) supports SSH Keys lifecycle management and helps
organizations eliminate risks that are inherent in using SSH Keys. In addition, it enables
organizations to meet their audit requirements by simplifying and automating SSH Keys
management. The SSH Key Manager is built on top of the Privileged Account shared
Platform Technology and benefits from the suite infrastructure, including the Digital
Vault, Master Policy, integrations and more. The SSH Key Manager doesn’t have a
dedicated component to install; it requires the installation of the CPM and PVWA and a
relevant license.
Compatible
Component
Version
Operating systems
Compatible
Operating System
Versions
RHEL 4-7.1
SUSE 10
OpenSUSE 42
CentOS 6, 7
Oracle Linux 5, 6, 7
HP-UX 11.x
Ubuntu 12.04, 16
FreeBSD 11
Enables user to
Privilege
retrieve …
sudoers for the following commands:Linux: uname, ls, test, cat, All account details
lastlog, getent, grep, wc, find, xargs, ssh-keygen, echo, rm,
date, hostname, ifconfigAIX: uname, ls, test, cat, lsdev, grep,
wc, ssh-keygen, echo, rm, istat, hostname, ifconfigSolaris:
uname, echo, test, cat, getent, grep, psrinfo, wc, find, xargs,
ssh-keygen, ls, rm, truss, hostname, ifconfig
Note:
CyberArk may choose not to provide maintenance and support services for the
CyberArk Privileged Session Manager® with relation to any end-user client machine or
target platforms which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
The Privileged Session Manager® (PSM) is a CyberArk component that enables you to
initiate, monitor, and record privileged sessions and usage of administrative and
privileged accounts. The PSM does not require a dedicated machine. However, it must
be installed on a machine that is accessible to the network.
Note:
To achieve optimal concurrency it is recommended to install PSM on a dedicated
machine.
Note:
Make sure you have the required number of RDS CALs to
enable you to access the RDS server. For more information, refer
to Connecting to the PSM server with Microsoft Remote Desktop
Services (RDS) Session Host in the Privileged Access Security Installation
Guide.
Unix, Linux and Network for Support using the following protocols:
any SSH-based devices SSH (including file-transfer capabilities)
Telnet
AS400 (iSeries)
OS/390 (Z/OS)
PSM for Databases PSM can monitor Oracle DBA sessions through the
following DBA tools:
Toad
SQL*Plus
To monitor Oracle DBA sessions, install the following
software on the PSM machine:
Toad for Oracle Base Edition v10.5.1.3 , v10.6.1.3
and v12.10(32 bit)
Toad Admin Module v10.5.1.3 and 10.6.1.3
PSM can monitor Microsoft SQL Server DBA sessions
through the following DBA tools:
SQL Server Management Studio 2008,2012, 2016,
and 2017
HTML5 Gateway
A Web server, such as Tomcat, that can support Java 1.6 or above
Note:
The PSM Gateway supports Tomcat v 7 or above.
Hardware specifications
Small + Mid-range Mid-range + Large
Very large implementation
implementation implementation
(101-200 concurrent
(1-50 concurrent RDP/SSH (51-100 concurrent
RDP/SSH sessions)
sessions) RDP/SSH sessions)
Note:
Tests are based on 40% SSH and 60% RDP concurrent sessions running with full HD
resolution.
These requirements are based on a dedicated machine for HTML5 Gateway.
Note:
CyberArk may choose not to provide maintenance and support services forPSM for
SSH with relation to any end-user client machine or target platforms which have
reached their formal End-of-Life date, as published by their respective vendors from
time to time. For more details, contact your CyberArk support representative.
PSM for SSH is a CyberArk component that enables you to secure, control and monitor
privileged access to Linux and Unix systems, network devices and any other SSH-based
devices. PSM for SSH requires a dedicated machine which is accessible to the network.
Note:
Security patches, and OS vendor recommended minor 6.x
or 7.x RHEL and CentOS upgrades can be applied on the
server without reinstalling PSM for SSHP.
Note:
OpenSSH 7.7 requires that Open SSL V1.01 or above be installed.
Supported connections
■ PSM for SSH supports connections to remote machines using IPv4 and IPv6
addresses.
CPM Any CPM that is compatible with the above Digital Vault server
and Password Vault Web Access.
AD Bridge capabilities
AD Bridge connections are supported on the following platforms:
CentOS 6.4
Fedora 18
RHEL 4, 5, 6, 7
HP-UX 11.x
Debian 8.2
Ubuntu 14.04
General
PSM for Cloud is delivered in the form of an OVA image, suitable for import into a
hypervisor host. The OS installed in the image is Ubuntu 16.04 LTS.
Licensing
If you are using the older CyberArk licensing model, you must obtain a separate
license to use PSM for Cloud. For more information, contact your CyberArk
sales representative.
If you are using the newer CyberArk Core PAS licensing model, you must have
a Core PAS user seat available per PSM for Cloud account.
You can utilize your existing Core PAS user seats, or purchase additional seats
for additional users.
Hardware Requirement
RAM 16 GB
Disk 256 GB
Network requirements
IP A static IP assignment is required for the proxy appliance. Assign the IP in one
assignment of the following ways:
Allocating a Static IP
Use a DHCP server. Make sure that the DHCP server is configured to
serve a static, non-changing IP address to the appliance
DNS entries Reverse proxy: If the product is configured to use the reverse proxy,
your organization's DNS server must be configured to resolve all host
names under the reverse proxy domain with the appliance's IP address.
Use a wildcard DNS A record entry to achieve this.
For example, if the reverse proxy domain is psmc.organization.com,
add
*.psmc.organization.com
to return the appliances' IP addresses.
Explicit proxy: If the product is configured to use the explicit proxy, it is
recommended to add an A record in the DNS for the appliance's IP
address.
Certificate The proxy requires a CA or intermediate certificate to generate and sign TLS
for signing certificates for all resources (web applications) accessed through it. This
downstream certificate must be trusted by the end stations.
traffic
Tip:
The certificate should be a .crt file, and the key should be a .pem
or .key file.
Alternatively, if you are using only a reverse proxy for all your applications, you
can issue and use a certificate for the domain *.psmc.organization.com.
This should match the DNS A record entry domain.
Firewall and Inbound: The following ports must be accessible on the appliance:
ports 80 - HTTP for reverse proxy, accessed by end users
443 - HTTPS for reverse proxy, accessed by end users
8080 -Explicit proxy, accessed by end users
9000 - PSM for Cloud Portal & Kibana, accessed by administrators only
22 - Remote access to host OS, accessed by administrators only
Outbound: The following ports are used by the appliance for outside
communication:
53 - Both TCP and UDP, used for DNS
80 - HTTP. Destination: all protected services
443 - HTTPS. Destination: all protected services
1858 - CASOS. Destination: all the Vault instances
Other. If your application is accessed by a port other than those
mentioned above, make sure that it is open for outbound communication.
Supported Platforms
PTA can be installed on the following platforms:
■ VMWare Player 6.x and above
■ VMWare Workstation 10.x and above
■ VMWare ESX/i 5.5 and above
■ Microsoft Hyper-V
Note:
Microsoft Hyper-V can be installed on Windows Server 2008R2, Windows Server
2012R2, or Windows Server 2016.
Supported Browsers
Users viewing PTA data displayed in the Security module of PVWA UI can use the
PVWA supported browsers shown in Password Vault Web Access, page 22.
The classic PTA interface supports the following browsers:
■ Internet Explorer 11.0
■ Chrome - latest version
■ Firefox - latest version
Network Requirements
IP Requirements
PTA requires an IP in one of the following forms:
■ Static Address: A static IP address.
■ DHCP: If the organization has a DHCP server which dynamically allocates IP
addresses, verify with the organization’s IT that the PTA machine’s IP address is
locked.
DNS Requirements
■ DNS: A DNS address record that maps the host name PTAServer to the IP
address of the PTA machine. The DNS configured in PTA must recognize all the
machines from which PTA will receive syslog messages. PTA requires both the
Forward (A record) and Reverse (PTR record) lookup.
Note:
All blocked communication is logged to /var/log/iptables.log .
Source Destination
# Protocol Description
Port Port
2. UDP 514,
11514
2. UDP 514
a specific IP address
Enable outgoing SSH connection in a disaster recovery
environment
Domain Requirements
LDAP/S Requirements
LDAP: PTA can integrate with LDAP to:
■ Broaden and increase the accuracy of PTA detections
■ Enable LDAP authentication to the classic PTA interface
In order to integrate PTA with LDAP, define a group name in PTA which has the same
name as the group sAMAccountName, which appears in Active Directory.
Note:
To integrate with LDAP over SSL, create a dedicated security Base-64 encoded X.509
certificate.
LDAP login and query permission are required for the bind user.
Currently, PTA only integrates with Microsoft Active Directory LDAP.
Certificate Requirements
It is highly recommended that you use your organization's SSL certificate. Otherwise, you
can use the self-signed certificate created during PTA installation.
If you use your organization's SSL certificate:
■ The SSL Certificate requires a Base-64 encoded X.509 SSL certificate
■ The SSL Certificate requires both Server authentication and Client authentication
Enhanced Key Usage values
■ The SSL Certificate Chain requires a Base-64 encoded X.509 SSL certificate
■ The SSL Certificate Issuer Chain requires a Base-64 encoded X.509 SSL certificate
■ The Signature Algorithm of the SSL Certificate cannot be RSASSA-PSS.
Note:
PTA does not support the CASOS over TLS protocol.
Integrate the Vault with SIEM and PTA CyberArk Vault version
7.2.5 or higher
Note:
Privileged
Session
Management
integration
works with
lower
versions of
CyberArk
Vault, but
without the
ability to
report
Privileged
Session
Analysis
results to
PVWA.
Support the reconcile password for Suspicious Password CyberArk Vault version
Change 9.10 or higher
Note:
In order for PTA to monitor activity of privileged accounts in Windows machines,
Windows security events 4624, 4723, and 4724 from each monitored Windows
machine must be forwarded to the SIEM and from the SIEM to PTA.
■ Unix: When collecting syslogs directly from Unix machines, PAM Unix is supported.
PAM Unix is supported by multiple Unix flavors, such as Red Hat Linux, HP-UX, and
Solaris.
Supported PAM Unix events include accepted public key, accepted password, and
session open.
■ Database: Oracle logon events are supported.
■ Network Sensor: Traffic is received from domain controllers in the environment.
■ Vault: Specific events are accepted. Supported device types are operating system
and database. You can also install a generic plugin to monitor additional accounts for
additional platforms. For details, see the Privileged Access Security Implementation
Guide.
■ Applications: Successful logon events are accepted when you install a generic
plugin. For details, see the Privileged Access Security Implementation Guide.
Note:
Create a dedicated Base-64 encoded X.509 SSL certificate.
Note:
Create a dedicated Base-64 encoded X.509 SSL certificate.
VM: Support VMware ESXi version 5.5 and higher, hardware version 8
and higher.
Support Microsoft Hyper-V
Note:
These are the minimum mandatory requirements. You must follow these requirements
when installing the PTA Network Sensor.
Physical
Requirement
Hardware
RAM 8GB
CPU 8 cores
Traffic The physical or virtual network interface that listens to the network traffic.
Monitoring Must have a static IP address.
NIC
Physical
Requirement
Hardware
Note:
These are the minimum mandatory requirements. You must follow these requirements
when installing the PTA Network Sensor.
Physical
Requirement
Hardware
RAM 4GB
CPU 4 cores
Traffic The physical or virtual network interface that listens to the network traffic.
Monitoring Must have a static IP address.
NIC
Note:
These are the minimum mandatory requirements. You must follow these requirements
when installing the PTA Network Sensor.
Virtual
Requirement
Machine
RAM 8GB
CPU 8 cores
VM ■ Use the ESXi or Hyper-V host setup to define the PTA Network
Sensor VM as High Priority.
■ Configure promiscuous mode or port mirroring on the ESXi or
HyperV host.
VM Network VMXNET3
Driver
Note:
It is recommended to run the PTA Network Sensor in the Standard recommended
configuration, in order to allow PTA to scale up to the expected network traffic load.
Note:
These are the minimum mandatory requirements. You must follow these requirements
when installing the PTA Network Sensor.
Virtual
Requirement
Machine
RAM 4 GB
CPU 4 cores
Hard Disk 40 GB
Storage (SSD is recommended).
VM ■ Use the ESXi or Hyper-V host setup to define the PTA Network
Virtual
Requirement
Machine
VM Network VMXNET3
Driver
Note:
It is recommended to run the PTA Network Sensor in the Standard recommended
configuration, in order to allow PTA to scale up to the expected network traffic load.
Note:
CyberArk may choose not to provide maintenance and support services for CyberArk's
Application Identity Management with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Credential Provider
The Credential Provider is currently supported on the following platforms:
AIX 10.5
Solaris 10.5
Linux 10.5
Windows 10.5
zLinux 6.0
HP-UX 4.5
This section contains documentation for the latest releases of the Credential Provider,
including the latest releases of all Application Password SDKs. Please remember that
the Credential Provider is supported on different platforms, as described in the table
above, and the information in this document is relevant to the most recent released
version for each platform. For more information about previous versions, refer to the
Application Identity Management Implementation Guide for that version.
Note:
This section does not contain documentation for the Credential Provider on HP-UX. The
Credential Provider on HP-UX is currently released as controlled availability only as
v4.5. For more information, contact your CyberArk representative.
Note:
Solaris 9 (both Intel and SPARC) are no longer supported as they have reached their
End of Life. Customers using this OS may continue using Credential Provider v9.6.
Note:
Windows 2003 is no longer supported. Customers using this OS may continue using
Credential Provider v9.7.1.
Note:
The Credential Provider on HP-UX is currently released as controlled availability only
as v4.5. For more information, contact your CyberArk representative.
7.2 Digital Vault v7.x, v8.x ,v9.x, and v.10.x GA versions for
Application
Password SDK
v4.5, v5.0, v5.5,
v6.0, v7.0, v7.1 and
v7.2.
7.1 Digital Vault v7.x, v8.x ,v9.x, and v.10.x GA versions for
Application
Password SDK
v4.5, v5.0, v5.5,
v6.0, v7.0, and v7.1.
7.0 Digital Vault v7.x, v8.x ,v9.x, and v.10.x GA versions for
Application
Password SDK
v4.5, v5.0, v5.5,
v6.0, and v7.0
Credential
Provider Works with Supports
version
Application
Password SDK
v4.5, v5.0, v5.5, and
v6.0.
Latest CP
SDK Platform Notes
version
Solaris 10.5
Linux 10.5
Windows 10.5
zLinux 6.0
HP-UX 4.5
(Risc/Itanium)
Latest CP
SDK Platform Notes
version
Linux 10.5
Windows 10.5
zLinux 6.0
HP-UX 4.5
(Risc/Itanium)
This section contains documentation for the latest release of all Application Password
SDKs. The Credential Provider is supported on different platforms, as described in the
table above, while the information in this document is relevant to the most recent
released version for each platform. For details about previous versions of Application
Password SDKs, see the Application Identity Management Implementation Guide for
that version.
For information about upgrading from an existing PVToolkit implementation to the
Credential Provider, contact your CyberArk support representative.
WebSphere - V7.1
Tomcat V5.5 -
WebSphere - V9.8
Liberty
Application
JBoss WebLogic Tomcat
Server
Platform Details
Platform Details
7.x, 8.0, To use ASCP on WebSphere for version 7.x with fix PK75609 or
8.5, and 9.0 version 8.x, additional configuration is required. For more information,
refer to step 7 in WebSphere Application Server Classic.
JBoss AS Instructions for JBoss AS 7.x and JBoss EAP 6.x are identical.
4.x, 5.x, 6.x
and 7.x,
EAP 6.x,
and WildFly
8 and 9
Tomcat
6.0, 7.0 and Note:
8.0 The Tomcat ASCP data source does not currently support the
org.apache.tomcat.dbcp.dbcp.BasicDataSourceFactory factory
when used with:
Non-pooled data source connections to Oracle
Pooled or XA data source connections to Oracle or MySQL
Supported environments
The Application Server Credential Provider is currently supported in the following
environments:
Solaris
Linux
Windows
AIX
For more details about the specific operating systems, refer to Credential Provider
above.
Note:
Windows 2003 is no longer supported. Customers using this OS may continue using
Credential Provider v9.7.1.
CyberArk Compatibility
The Central Credential Provider works with the Digital Vault, v7.x, v8.x, v9.x. and v10.x
Prerequisites
To authenticate applications using Windows domain users, the Central Credential
Provider must be in the same domain as the requesting application machines.
Alternatively, the requesting application domain must be trusted by the Central
Credential Provider domain. For more information about authenticating applications
with the Windows domain users, refer to Authenticate Applications on the Central
Credential Provider.
Make sure Windows has IIS 6, 7.5, or 10 installed and supports IIS 6.0 compatibility
mode.
Client Requirements
The Central Credential Provider works with application on any operating system,
platform or framework that can invoke REST or SOAP web service requests.
.NET Framework
Support for v. 4.5.2
Note:
CyberArk may choose not to provide maintenance and support services for CyberArk's
On-Demand Privileges Manager with relation to any of the platforms and systems listed
below which have reached their formal End-of-Life date, as published by their
respective vendors from time to time. For more details, contact your CyberArk support
representative.
Supported platforms
The OPM is currently supported on the following platforms:
AIX V10.4
Solaris V10.4
Linux V10.4
HPUX V9.9
Windows V10.4
OPM on AIX (v10.4) ■ AIX 6.1 and 7.1 TL1, TL2, and TL3
(64-bit)
Note:
The AIX version must include
the Linux Toolbox for AIX.
This is built-in for AIX.
OPM Compatibility
OPM Version Compatible Digital Vault Versions
AD Bridge capabilities
AD Bridge connections are supported on the following platforms:
■ RedHat Linux
■ CentOS
■ AIX
■ Solaris
The following CyberArk component versions are required:
■ Digital Vault Server, version 9.8 or later
■ Password Vault Web Access, version 9.8 or later
■ OPM, version 9.8 or later
PAM on AIX (v10.4) ■ AIX 6.1 and 7.1 TL1, TL2, and TL3 (64-
bit)
Note:
The AIX version must include the
Linux Toolbox for AIX. This is
built-in for AIX.
Note:
CyberArk may choose not to provide maintenance and support services for CyberArk's
Password Upload Utility with relation to any of the platforms and systems listed below
which have reached their formal End-of-Life date, as published by their respective
vendors from time to time. For more details, contact your CyberArk support
representative.
Supported platforms
The Password Upload utility can be run on the following platforms:
Windows 2008 R2 (64-bit)
Windows 7 (64-bit)
Windows 2003 (32-bit)
Windows XP (32-bit)
CyberArk components
The Password Upload utility requires the following CyberArk components:
PrivateArk Command Line Interface (PACLI), version 4.1 or later – PACLI must be
installed in the same folder as the Password Upload utility or in a folder specified in
the Path.
CyberArk SDKs
The CyberArk SDKs enable Privileged Access Security users and applications/scripts to
access the Digital Vault server from any location, in an extremely intuitive command line
environment.
Note:
CyberArk may choose not to provide maintenance and support services for CyberArk's
SDKs with relation to any of the platforms and systems listed below which have reached
their formal End-of-Life date, as published by their respective vendors from time to time.
For more details, contact your CyberArk support representative.
Minimum requirements
The minimum requirements for all the SDK interfaces are as follows:
Authentication
PrivateArk Client
Authentication methods
Password
Windows
Radius
PKI
LDAP
Part 1:
Target
________________________________
û – Not relevant
[1] Default port. This can be changed, e.g. to TCP/443.
[2] Remote Administration Boards, e.g. like HP iLO, IBM RSA, Dell DRAC, etc., for
virtualized environments allow access to VM Server.
[3] Refer to Standard Ports and Protocols, page 85.
[4] Depending on devices managed through direct access (Administrators'
Workstations to target devices).
Part 2:
Target
SMTP Manage/Acce
Credenti Server ss Target
OP
Source PSM al (for Event Devices, e.g.
M
Provider Notificatio Server,
n) Router, …
Vault û û û TCP/25 û
Disaster û û û TCP/25 û
Recovery
Vault (DR)
Password û û û û û
Vault Web
Access
(PVWA)
Privileged û û û û TCP/3389 or
Session TCP/22
Manager
(PSM)
Privileged û û û û TCP/80,
Session TCP/443
Manager for
Cloud (PSM
for Cloud)
Privileged TCP/33 û û û û
Session 89
Manager
HTML5
gateway
Target
SMTP Manage/Acce
Credenti Server ss Target
OP
Source PSM al (for Event Devices, e.g.
M
Provider Notificatio Server,
n) Router, …
Credential û û û û û
Provider
On-Demand û û û û û
Privileges
Manager
(OPM)
_________________________________
û – Not relevant
[1] Default port. This can be changed, e.g. to TCP/443.
[2] Remote Administration Boards, e.g. like HP iLO, IBM RSA, Dell DRAC, etc., for
virtualized environments allow access to VM Server.
[3] Refer to Standard Ports and Protocols, page 85.
[4] Depending on devices managed through direct access (Administrators'
Workstations to target devices).
Part 1:
Optional Target
Credential Provider û û û
User (Administrator) û û û
Part 2:
Optional Target
Privileged Session û û û û
Manager for Cloud
(PSM for Cloud)
Credential Provider û û û û
On-Demand û û û û
Privileges Manager
(OPM)
User (Administrator) û û û û
The Privileged Access Security solution uses standard ports and protocols to
communicate with different devices.
In this section:
Standard CPM Ports and Protocols
Standard Ports used for Accounts Discovery
Standard Vault Ports and Protocols
Standard PVWA Ports and Protocols
Operating Systems
Windows 445
Windows 49154
Windows 445
UNIX SSH 22
Telnet 23
OS/390 FTP 21
SSH 22
Telnet 23
ESXi HTTP 80
HTTPS 443
Databases
Unix SSH 22
Unix Telnet 23
Unix SSH 22
Unix Telnet 23
Windows 445
Remote Access
HP iLO SSH 22
Telnet 23
Security Appliances
Netscreen
Netscreen SSH 22
Telnet 23
Network Devices
CISCO SSH 22
Telnet 23
Directories
Applications
SAP 3342
SSL 636
389 To connect to target machines using the LDAP service (only relevant to
domain controllers).
This port must be accessible both through network-based and host-based
firewalls.
636 To connect to target machines using the LDAPS service (only relevant to
domain controllers).
This port must be accessible both through network-based and host-based
firewalls.
49154 This port is used to view and administrate Scheduled Tasks on the
remote machine.
49155, 49156 This port is used to get the list of services from the remote machine.
SSL 636
SSL 636