Contents Now Platform Capabilities Previous Topic Next Topic Configure the CyberArk vault and install the AIM API Subscribe Log in to subscribe to topics and get notified when content changes. ... SAVE AS PDF Selected Topic Topic & Subtopics All Topics in Contents Share Configure the CyberArk vault and install the AIM API Configure the CyberArk vault to allow MID Server access and install the CyberArk AIM API on the MID Server machine. Before you beginRole required: adminBefore starting this procedure, ensure that the External Credential Storage plugin is activated. Procedure Configure the CyberArk vault with the application ID and authentication details that all MID Servers requesting credentials will use. For details, refer to the CyberArk Credential Provider and ASCP Implementation Guide. Ensure that CyberArk is configured to allow the MID Server to access the vault by creating an App-ID in CyberArk called ServiceNow_MID_Server. Make sure that every credential the MID Server needs is granted access to the ServiceNow_MID_Server App-ID. Note: You can override the default ServiceNow_MID_Server App-ID in the MID Server config.xml file using the ext.cred.app_id parameter. If you change the value in this parameter, make sure to configure a matching value in the vault. Install the CyberArk Credential Provider, including the AIM API, on each machine that hosts a MID Server service that is used to access the credential store. Provision CyberArk accounts and set permissions for application access. For details, refer to the CyberArk Privileged Account Security Implementation Guide. In the CyberArk Password Safe, create the privileged accounts required by Discovery, Orchestration, or Service Mapping to access different devices and ensure that these accounts are members of the safes in which the necessary credentials are stored. Add the Credential Provider and application users as members of the Password Safes where the application passwords are stored. Next TopicImport the CyberArk JAR file On this page Send Feedback Previous Topic Next Topic
Configure the CyberArk vault and install the AIM API Configure the CyberArk vault to allow MID Server access and install the CyberArk AIM API on the MID Server machine. Before you beginRole required: adminBefore starting this procedure, ensure that the External Credential Storage plugin is activated. Procedure Configure the CyberArk vault with the application ID and authentication details that all MID Servers requesting credentials will use. For details, refer to the CyberArk Credential Provider and ASCP Implementation Guide. Ensure that CyberArk is configured to allow the MID Server to access the vault by creating an App-ID in CyberArk called ServiceNow_MID_Server. Make sure that every credential the MID Server needs is granted access to the ServiceNow_MID_Server App-ID. Note: You can override the default ServiceNow_MID_Server App-ID in the MID Server config.xml file using the ext.cred.app_id parameter. If you change the value in this parameter, make sure to configure a matching value in the vault. Install the CyberArk Credential Provider, including the AIM API, on each machine that hosts a MID Server service that is used to access the credential store. Provision CyberArk accounts and set permissions for application access. For details, refer to the CyberArk Privileged Account Security Implementation Guide. In the CyberArk Password Safe, create the privileged accounts required by Discovery, Orchestration, or Service Mapping to access different devices and ensure that these accounts are members of the safes in which the necessary credentials are stored. Add the Credential Provider and application users as members of the Password Safes where the application passwords are stored. Next TopicImport the CyberArk JAR file
Configure the CyberArk vault and install the AIM API Configure the CyberArk vault to allow MID Server access and install the CyberArk AIM API on the MID Server machine. Before you beginRole required: adminBefore starting this procedure, ensure that the External Credential Storage plugin is activated. Procedure Configure the CyberArk vault with the application ID and authentication details that all MID Servers requesting credentials will use. For details, refer to the CyberArk Credential Provider and ASCP Implementation Guide. Ensure that CyberArk is configured to allow the MID Server to access the vault by creating an App-ID in CyberArk called ServiceNow_MID_Server. Make sure that every credential the MID Server needs is granted access to the ServiceNow_MID_Server App-ID. Note: You can override the default ServiceNow_MID_Server App-ID in the MID Server config.xml file using the ext.cred.app_id parameter. If you change the value in this parameter, make sure to configure a matching value in the vault. Install the CyberArk Credential Provider, including the AIM API, on each machine that hosts a MID Server service that is used to access the credential store. Provision CyberArk accounts and set permissions for application access. For details, refer to the CyberArk Privileged Account Security Implementation Guide. In the CyberArk Password Safe, create the privileged accounts required by Discovery, Orchestration, or Service Mapping to access different devices and ensure that these accounts are members of the safes in which the necessary credentials are stored. Add the Credential Provider and application users as members of the Password Safes where the application passwords are stored. Next TopicImport the CyberArk JAR file