Skip to main content

CyberArk Integration

Nopesight Scanner integrates with CyberArk Privileged Access Management (PAM) to securely retrieve scan credentials on demand from CyberArk's vault, instead of storing passwords locally on the scanner machine. This enables centralized credential rotation, full audit trails, and enterprise PAM compliance.

Why use CyberArk integration?

  • Eliminate local password storage — With CCP mode, no target-system passwords are stored on the scanner machine at all
  • Automatic credential rotation — When CyberArk rotates a password, the scanner automatically retrieves the new one on the next scan
  • Full audit trail — Every credential retrieval is logged in CyberArk with reason, timestamp, and source
  • Enterprise compliance — Meets PAM requirements for SOX, HIPAA, PCI-DSS, and other frameworks
  • Zero scanner changes — All existing scan protocols (WMI, SSH, SNMP, vCenter) work transparently with CyberArk credentials

How it works

Architecture overview

CyberArk integrates at the Credentials Manager level inside the scanner. All scanners (WMI, SSH, SNMP, vCenter) already request credentials through the Credentials Manager. By adding CyberArk as a credential source, all scanners benefit automatically with no code changes.

Credential resolution flow

All credential rules — both local and CyberArk — participate in a single priority-ordered pipeline:

  1. Load rules — All credential rules are loaded from the encrypted credential store
  2. Filter — Rules are filtered by scan protocol (WMI, SSH, etc.) and target IP address
  3. Sort by priority — Lower priority number = tried first. Tie-breaks use IP specificity (exact IP > CIDR range > wildcard)
  4. Resolve — Local rules return stored credentials directly. CyberArk rules query the vault in real time
  5. Fallback — If a CyberArk lookup fails, the scanner tries the next matching rule (typically a local fallback)
Priority configuration

Assign CyberArk rules lower priority numbers (e.g., 10) and local rules higher numbers (e.g., 100) so CyberArk-managed passwords take precedence. This ensures rotated passwords from CyberArk are always tried first, with local credentials as fallback.

Supported API modes

Nopesight Scanner supports two CyberArk API modes:

FeatureCCP (Recommended)PVWA
AuthenticationClient certificate or IP whitelistingUsername + password
Local secret storageNone (certificate files only)Single encrypted CyberArk service account password
Session managementStateless (single request)Token-based (logon/logoff)
CyberArk component requiredCCP/AIM on IISPVWA (standard component)
API calls per credential13–4
CyberArk recommendationRecommended for applicationsRecommended for interactive use

CCP (Central Credential Provider) is the recommended mode for scanner integrations. It is stateless, requires no passwords, and authenticates via client certificates or IP whitelisting.

PVWA (Password Vault Web Access) is supported for organizations that don't have CCP deployed. It requires a CyberArk service account password (stored encrypted on the scanner).

Session caching

During a scan, the scanner caches retrieved credentials in memory to minimize API calls. If the same credential is needed for multiple hosts (e.g., a domain admin account), it is retrieved from CyberArk once and reused for the entire scan session. The cache is automatically cleared when the scan completes, and PVWA sessions are logged off.

Circuit breaker

If CyberArk becomes unreachable during a scan, the scanner automatically disables CyberArk lookups after 3 consecutive failures and falls back to local credentials for the remainder of the scan. This prevents slow scans when CyberArk is temporarily unavailable.

Configuration

Configuration is done in two places within the Nopesight Scanner GUI:

  1. Integrations tab — Define the CyberArk vault connection (URL, API type, authentication)
  2. Credentials tab — Create credential routing rules that tell the scanner which CyberArk Safe to query for each protocol and IP range

Step 1: Configure the CyberArk connection

The first step is to set up the connection to your CyberArk vault in the Integrations tab. This tells the scanner where your CyberArk server is, how to authenticate, and which API to use.

  1. Open the Nopesight Scanner application
  2. Navigate to the Integrations tab
  3. In the Add/Edit Integration section, select CyberArk from the Type dropdown
  4. Enter a Name for this integration (e.g., "CyberArk Production Vault")

The form dynamically changes based on the API Type you select. Below are both configurations:

CCP mode — shows Connection, CCP Authentication, and Credential Settings:

Integrations tab with CyberArk CCP mode selected, showing App ID, Cert File, and Cert Key fields

PVWA mode — shows Connection, PVWA Authentication, and Credential Settings:

Integrations tab with CyberArk PVWA mode selected, showing Auth Type, Username, and Password fields

Fill in each section based on your CyberArk deployment.

Connection section

These settings define how the scanner connects to your CyberArk server.

FieldDescription
API TypeChoose between CCP and PVWA (see comparison above). The form dynamically shows the appropriate authentication fields based on your selection.
URLYour CyberArk server's base URL (e.g., https://cyberark.company.com). This is the hostname of the server hosting either the CCP web service or the PVWA portal.
PortThe HTTPS port (default: 443). Only change this if your CyberArk server runs on a non-standard port.
Verify SSLWhen checked, the scanner verifies the CyberArk server's SSL certificate against trusted Certificate Authorities. Keep this enabled in production. Only disable for testing with self-signed certificates.
CA CertIf your CyberArk server uses a certificate signed by an internal Certificate Authority (not publicly trusted), browse to your CA's root certificate file here. This allows the scanner to trust your internal CA while keeping SSL verification enabled.

CCP Authentication section

This section appears when API Type is set to CCP. CCP (Central Credential Provider) is CyberArk's recommended method for application-to-application credential retrieval. It is stateless — each credential lookup is a single HTTPS GET request with no session management required.

FieldDescription
App IDThe Application Identity registered in your CyberArk vault for this scanner. Your CyberArk administrator creates this in the CyberArk portal under Applications. The App ID acts as the scanner's identity when requesting credentials. Example: NopeSightScanner.
Cert File(Optional) Path to a client certificate file (.pem or .crt) used for mutual TLS authentication. When provided, the scanner presents this certificate during the TLS handshake, and CyberArk verifies it against the certificates registered for the App ID. Click Browse to select the file.
Cert Key(Optional) Path to the private key file (.pem or .key) corresponding to the client certificate above. Click Browse to select the file.

How CCP authentication works:

CyberArk CCP supports multiple authentication methods that can be combined for stronger security. Your CyberArk administrator configures which methods are required for your App ID:

  • Client certificate — The scanner presents a TLS client certificate. CyberArk validates it against the certificate registered for the App ID. This is the most secure option and eliminates any need for passwords.
  • IP whitelisting — CyberArk only accepts requests from specific source IP addresses registered for the App ID. If this is your only authentication method, leave the Cert File and Cert Key fields empty.
  • Combined — Your administrator can require both certificate and IP whitelisting for maximum security.
When to use which CCP authentication method
  • Certificate authentication is preferred for production environments — it provides strong cryptographic identity verification.
  • IP whitelisting is simpler to set up and works well when the scanner runs on a fixed IP address. However, it provides weaker security since IP addresses can be spoofed on compromised networks.
  • Both combined provides defense in depth and is recommended for high-security environments.

PVWA Authentication section

This section appears when API Type is set to PVWA. PVWA (Password Vault Web Access) is CyberArk's web portal API. It uses username/password authentication and token-based sessions.

When to use PVWA

PVWA is designed primarily for interactive (human) use. CyberArk recommends CCP for application integrations. However, PVWA is supported for organizations that do not have the CCP component deployed. If you have CCP available, prefer it over PVWA.

FieldDescription
Auth TypeThe authentication method for the CyberArk service account. Choose based on how the account is configured in your CyberArk environment:
- CyberArk — Local CyberArk user account (created directly in the CyberArk vault)
- LDAP — Active Directory / LDAP-authenticated account (the account exists in AD and CyberArk authenticates against your LDAP directory)
- RADIUS — RADIUS-authenticated account (used when CyberArk is configured with a RADIUS server, often for multi-factor authentication)
UsernameThe CyberArk service account username. This account must have permission to retrieve passwords from the Safes you plan to use. Example: svc_nopesight.
PasswordThe service account password. This is the only secret stored locally when using PVWA mode — it is automatically encrypted with Fernet encryption when saved and stored in the integration configuration file. The password is never stored in plaintext.

How PVWA authentication works:

When the scanner needs a credential during a scan, it follows this sequence:

  1. Authenticate — The scanner sends the username/password to CyberArk's logon endpoint and receives a session token
  2. Search — Using the session token, the scanner searches for the target account in the specified Safe
  3. Retrieve — The scanner retrieves the actual password for the matched account
  4. Logoff — After the scan completes, the scanner logs off the PVWA session

The session token is cached for the duration of the scan, so the scanner only authenticates once per scan session regardless of how many credentials it retrieves.

Credential Settings section

These settings apply to both CCP and PVWA modes.

FieldDescription
Default Safe(Optional) A fallback Safe name. If a credential routing rule in the Credentials tab does not specify a Safe, the scanner uses this default. Leave empty if all your credential rules explicitly specify their Safe.
Reason(Optional) An audit reason string sent with every credential retrieval request. This appears in CyberArk's audit logs, making it easy to identify which retrievals came from the scanner. Example: NopeSight Discovery Scan.
EnabledMaster toggle for this integration. When unchecked, all CyberArk credential rules are skipped during scans and the scanner falls back to local credentials only. Useful for temporarily disabling CyberArk without deleting the configuration.
  1. Click Test Connection to verify the scanner can reach your CyberArk server and authenticate successfully
  2. Click Save to store the integration
Test before scanning

Always use Test Connection before running a scan. For CCP, this verifies the App ID and certificate are accepted. For PVWA, this performs a full authentication and logoff cycle. If the test fails, check the error message and review the Troubleshooting section.

Step 2: Create credential routing rules

After configuring the CyberArk connection, create credential routing rules in the Credentials tab. These rules tell the scanner which CyberArk Safe and lookup parameters to use for each scan protocol and IP range combination.

The Credentials tab shows all saved credentials in a table with columns: Source, Protocol, IP Range, Username / Safe, Pri (priority), and Active.

Credentials tab showing saved local credentials

To add a CyberArk credential rule:

  1. In the Add/Edit Credential section at the bottom, open the Source dropdown
  2. Select CyberArk (other options: Local, Delinea, BeyondTrust)

Source dropdown showing CyberArk, Delinea, and BeyondTrust options

  1. The form changes to show CyberArk-specific lookup fields:

CyberArk credential rule fields — Provider, Safe, Policy ID, Folder, Object, Username

  1. Configure the rule fields:
FieldRequiredDescription
ProtocolYesScan protocol: WMI, SSH, SNMP, or vCenter
IP RangeYesTarget IP range (CIDR notation, single IP, or * for any)
PriorityNoLower number = higher priority (default: 100)
ProviderYesSelect the CyberArk integration you configured in Step 1
SafeYesCyberArk Safe containing the target credentials
Policy IDNoCyberArk Platform/PolicyID filter (e.g., WinDomain, UnixSSH)
FolderNoFolder within the Safe (default: Root)
ObjectNoSpecific account object name in CyberArk
UsernameNoFilter by specific username in CyberArk

The last four fields (Policy ID, Folder, Object, Username) are optional CyberArk lookup filters — use them to narrow down the account if a Safe contains multiple credentials for the same target IP.

  1. Click Add New to save the rule

Example credential rules setup

A typical enterprise configuration might look like:

SourceProtocolIP RangeSafePriorityNotes
CyberArkWMI10.0.0.0/8WindowsAdmins10Primary: Domain admin from CyberArk
CyberArkSSH172.16.0.0/12LinuxRoot10Primary: Root credentials from CyberArk
CyberArkWMI*GeneralWin50Catchall: Any Windows system
LocalWMI10.0.0.0/8100Fallback: Local credential if CyberArk fails
LocalSSH*100Fallback: Local SSH credential

With this setup:

  • Scanning a Windows server at 10.1.1.5 tries the CyberArk WindowsAdmins Safe first (priority 10), then the GeneralWin Safe (priority 50), and finally the local fallback (priority 100)
  • Scanning a Linux server at 172.16.5.20 tries the CyberArk LinuxRoot Safe first, then the local SSH fallback

CyberArk prerequisites

Before configuring the integration, ensure the following CyberArk-side setup is complete:

For CCP mode

  1. Install CCP/AIM on an IIS server (if not already deployed)
  2. Register an Application (AppID) for the scanner (e.g., NopeSightScanner)
  3. Configure authentication on the AppID:
    • Client certificate: Issue a certificate for the scanner machine and register it with the AppID
    • IP whitelisting: Register the scanner machine's IP address(es) with the AppID
  4. Grant Safe access: Authorize the AppID to access the required Safes

For PVWA mode

  1. Create a service account in CyberArk (e.g., svc_nopesight)
  2. Grant Safe access: Authorize the service account to retrieve passwords from the required Safes
  3. Enable password retrieval permission on the account's Safe membership

Protocol-to-PolicyID mapping

CyberArk uses PolicyID (Platform ID) to categorize accounts. Common mappings:

Scanner ProtocolCyberArk PolicyIDDescription
WMIWinDomain, WinLocalAdminWindows domain or local admin accounts
SSHUnixSSH, UnixSSHKeysLinux/Unix accounts
SNMPCiscoSNMP, NetworkDeviceNetwork device community strings
vCenterVMwareVCenterVMware vCenter admin accounts

These are configurable per CyberArk deployment and can be specified in credential rules using the Policy ID field.

Security considerations

Credential storage by mode

DataCCP ModePVWA Mode
Target system passwordsNever stored locallyNever stored locally
CyberArk connection config (URL, AppID)Stored in integrations.json (non-sensitive)Stored in integrations.json (non-sensitive)
Client certificate + keyStored on filesystemNot applicable
CyberArk service account passwordNot applicableStored encrypted (Fernet)
Retrieved passwordsIn-memory only, cleared after scanIn-memory only, cleared after scan

Best practices

  • Prefer CCP over PVWA — CCP eliminates local password storage entirely
  • Use client certificates — Stronger authentication than IP whitelisting alone
  • Set audit reasons — Configure the "Reason" field so credential retrievals are traceable in CyberArk logs
  • Use specific Safe rules — Avoid wildcard IP ranges with broad Safes; use targeted rules for better security
  • Keep local fallbacks — Maintain local credentials as fallback to prevent scan failures during CyberArk outages
  • Restrict certificate file permissions — Ensure client certificate and key files are readable only by the scanner service account

Troubleshooting

Connection test fails

ErrorCauseSolution
SSL errorCertificate verification failedCheck CA certificate path, or ensure CyberArk certificate is trusted
Connection failedCannot reach CyberArk serverVerify URL, port, and firewall rules
Authentication failed (CCP)AppID not authorizedVerify AppID is registered and scanner IP/cert is allowed
Authentication failed (PVWA)Invalid credentialsVerify service account username and password

Credential retrieval fails during scan

ErrorCauseSolution
"No safe specified"Rule missing Safe field and no default Safe configuredAdd Safe to the credential rule or set a Default Safe
CCP 403AppID not authorized for the SafeGrant AppID access to the Safe in CyberArk
CCP 409Multiple accounts matchAdd PolicyID, Username, or Object filter to narrow the match
CCP 404No matching account in CyberArkVerify the account exists in the specified Safe with the correct Address
"Disabled for this scan session"3+ consecutive failures triggered circuit breakerCheck CyberArk connectivity; scanner will retry on next scan

Scanner log messages

CyberArk-related log entries use the CyberArk: prefix. Check the scanner logs for:

  • CyberArk CCP: GET ... — CCP API call details
  • CyberArk PVWA: Searching accounts ... — PVWA search activity
  • CyberArk: Retrieved credential ... — Successful credential retrieval
  • CyberArk: Cache hit ... — Credential served from session cache
  • CyberArk: Disabled for this scan session ... — Circuit breaker activated

Other PAM integrations

The scanner's credential provider framework also supports Delinea (formerly Thycotic Secret Server) and BeyondTrust integrations using the same architecture. Each vendor has its own integration type in the Integrations tab and vendor-specific fields in the Credentials tab, but the priority-based resolution pipeline works identically across all providers.