sion

Oracle Fusion Middleware : Oracle Identity and Access Management Suite 10g/11gR1/11gR2PS1,PS2,PS3 : OIM | OAM,OAAM,OIF | OID, OVD, DIP | OUD/ ODSEE | Microsft AD | OpenLDAP | ADF | EBS R12 | OECMCCR4 | Business Intelleigence - Bi Publisher | Banking | Demo Applications | Core Java | SQL | PLSQL | Web services | Weblogic | Tomcat | JBoss | OHS | WebGate | WebCenter | In any Queries please Contact Me : info@oratechsoft.com

Search This Blog

Saturday, 2 August 2025

CyberArk: Windows Authentication in PVWA

When CyberArk Vault is deployed in a Windows environment, Windows Authentication enables seamless access to the Password Vault Web Access (PVWA) interface. Users already authenticated to the Windows domain are automatically logged in to PVWA without needing to enter their credentials again.


Phase 1: Enable Windows Authentication in Classic PVWA Interface

Step 1: Log in to PVWA

  • Use the predefined Administrator account to log into the PVWA interface.

Step 2: Open System Configuration

  • Navigate to the ADMINISTRATION section.

  • Open the System Configuration page.

  • Click on Options to access the system configuration editor.

Step 3: Enable the Windows Authentication Method

  • Expand the Authentication Methods section.

  • Select windows from the list of supported authentication methods.

  • Set the Enabled property to Yes.

Step 4: Save the Configuration

Choose one of the following:

  • Click Apply to save and apply the changes immediately.

  • Click Save to save the changes and apply them after the duration defined in the RefreshPeriod parameter.


Phase 2: Enable Windows Authentication in PVWA V10 Interface

Note: This method is supported from CyberArk version 9.8 and above.

Step 1: Open IIS Configuration File

  • Open applicationHost.config located in:

%WinDir%\System32\Inetsrv\Config\applicationHost.config
  • Use Notepad (not Notepad++) with administrative privileges.

Step 2: Add Windows Authentication Configuration

At the end of the configuration file, add the following block:


<location path="Default Web Site/PasswordVault/api/auth/windows/logon"> <system.webServer> <security> <authentication> <windowsAuthentication enabled="true" /> </authentication> </security> </system.webServer> </location>

Step 3: Restart IIS

  • Open a Command Prompt as Administrator.

  • Run the following command:

iisreset

This restarts the IIS server and applies the updated configuration.


Phase 3: Test Windows Authentication in PVWA

  1. Open the PVWA in a browser.

  2. From the list of available authentication methods, select Windows.

  3. If configured correctly, PVWA will automatically authenticate you using your current Windows session without prompting for credentials.


Screenshots for your reference: 

1. Enable the Windows Authentication via PVWA 

2. Configure the windows authentication on ApplicationHost.config 

Using Notepad (not Notepad++), open the IIS configuration file. By default, this is %WinDir%\System32\Inetsrv\Config\applicationHost.config. 
 
2) At the end of the file, add the following lines: 
******************** 
<location path="Default Web Site/PasswordVault/api/auth/windows/logon"> 
<system.webServer> 
<security> 
<authentication> 
<windowsAuthentication enabled="true" /> 
</authentication> 
</security> 
</system.webServer> 
</location> 
******************** 
 



3) Perform an IISRESET. 
 


3. Enable the Windows Authentication for User/group. 




4. Update the Internet option to enable user windows logon with current username and password. 



After doing this Windows Authentication should be working as expected through the new UI.

 
https://cyberarkpam.corp.com/PasswordVault/v10/logon/windows



Happy learning!!



CyberArk: CA Certificate Request & install on Vault Server

Purpose: CA Certificate Request & install on Vault Server

The CACert utility is used to manage and prepare SSL certificates for the CyberArk Vault server. These certificates establish secure channels for Vault communications, allowing secure authentication of clients and third-party systems. The utility helps generate certificate signing requests (CSR), import and install certificates, view or verify certificate details, and manage trusted certificate authorities (CAs).


Phase 1: Pre-requisites and Planning

  • Ensure Vault is already installed and configured.

  • Certificate requirements must align with your organizational policies and CyberArk prerequisites.

  • You must have access to a Certificate Authority (CA) to sign CSR files or an externally generated PFX certificate (if importing).

  • Know the hostname and IP details for use in the Subject Alternative Name (SAN) field.


Phase 2: Create the Vault SSL Certificate

Option A: Generate a CSR and Install a Signed Certificate

Step 1: Generate Certificate Signing Request (CSR)

  1. Navigate to the Vault server installation folder (default: C:\Program Files (x86)\PrivateArk\Server).

  2. Open Command Prompt as Administrator.

  3. Run the following command:

CACert.exe request

You will be prompted for:

  • Request output file path and name

  • Private key output file path and name

  • Common Name (Vault hostname)

  • Subject Alternative Names (e.g., DNS:vault.company.com, IP:10.0.0.1)

Step 2: Sign the CSR with Your Organization's CA

  • Submit the generated CSR to your organizational CA.

  • Ensure the returned certificate and its chain are in Base-64 format.

Step 3: Install the Signed Certificate

  1. Transfer the signed certificate and certificate chain to the Vault server.

  2. Back up the existing private key, as defined in the ServerPrivateKey field in DBParm.ini.

  3. Replace the current private key with the new one if needed.

  4. Run the following command to install the certificate:

CACert.exe install

Specify the full path to the new certificate file.

  1. Restart the Vault service.


Option B: Import an Existing Certificate (.pfx)

  1. Transfer the .pfx certificate file and its chain to the Vault server.

  2. Back up the current private key (from DBParm.ini).

  3. Navigate to the Vault installation folder.

  4. Open Command Prompt as Administrator.

  5. Run the following command:

CACert.exe import

Specify the full path of the .pfx file when prompted.

  1. Restart the Vault service.


Phase 3: Certificate Verification

View Installed Certificate

  1. Go to C:\Program Files (x86)\PrivateArk\Server\Conf.

  2. Open DBParm.ini and locate the ServerCertificateFile entry.

  3. Copy that file and rename it to .cer format (e.g., server.cer).

  4. Double-click to view it or use certificate tools like Crypto Shell Extensions.

Verify TLS Certificate and Chain

  1. Open Command Prompt as Administrator.

  2. Navigate to the Vault installation folder.

  3. Run:

CACert.exe verify

This verifies the installed Vault server certificate and its full trust chain.


Phase 4: CA Certificate Store Management (Optional)

You can manage trusted CA certificates for Vault clients using the following command:

CACert.exe setCA

Options include:

  • /certstore to specify which certificate store to use

  • /list to list current CA certs

  • /add and /remove to manage cert files



Screenshots for your Reference:

1. How to request the CSR using CACert.exe 


2. How to Install the vault.cer using CACert.exe


Happy learning!!





CyberArk : Cyberark PAM integration with PKI Authentication.

Phase 1: Overview & Purpose

Public Key Infrastructure (PKI) allows CyberArk PVWA to authenticate users based on client certificates issued by a trusted Certificate Authority (CA). During login, a secure SSL/TLS handshake ensures:

  • The client presents a valid certificate.

  • The server verifies the certificate’s trust chain and details (Subject/UPN).

  • Optional: Multi-factor support (certificate + password).


Phase 2: Prerequisites

2.1 Vault & PVWA Environment

  • CyberArk Vault and PVWA must be fully installed and accessible.

  • PVWA must be HTTPS-enabled with a CA-signed SSL certificate (not self-signed).

  • Vault must also be TLS-enabled with trusted CA certs.

2.2 LDAP/S Integration (Recommended)

  • LDAP integration must be configured.

  • Vault users must be:

    • Mapped to LDAP users.

    • AuthMethod set to PKI or PKIPN as appropriate.

2.3 Client Certificate Requirements

Each end-user certificate must:

  • Be issued by the same trusted CA configured in PVWA.

  • Include the UPN or sAMAccountName in:

    • Subject or SAN (Subject Alternative Name).

  • Contain the full chain (Root + Intermediates).

  • Be present in the user’s Personal Certificate Store (certmgr.msc > Personal > Certificates).

2.4 Server Certificate Trust Setup

On each PVWA server:

  • Import the Root CA and Intermediate CA certificates into:

    • Trusted Root Certification Authorities

    • Intermediate Certification Authorities (Local Computer store)


Phase 3: PVWA Configuration Steps

3.1 IIS Setup for SSL + Client Certificates

  • Open IIS ManagerDefault Web Site > Bindings.

  • Bind HTTPS to port 443 using the PVWA SSL certificate.

  • In PasswordVault > SSL Settings:

    • Check Require SSL

    • Set Client Certificates to Accept (testing) or Require (production)

3.2 Enable PKI / PKIPN in PVWA UI

  • Log in to PVWA as an Admin.

  • Go to: Administration > Authentication Methods

  • Enable:

    • PKI (Distinguished Name matching)

    • PKIPN (UPN matching from certificate)

3.3 Configure LDAP for PKIPN

In PVWA Admin UI:

  • Go to: Administration > LDAP Integration

  • Under the appropriate profile (e.g., Microsoft AD):

    • Set UserLogonName = userPrincipalName

    • Under LDAP User Mapping, ensure Vault users can be matched by UPN

In web.config under <appSettings>:

<add key="UsePKIPNAlternateUserName" value="yes"/>

🔹 Phase 4: Advanced Configuration (Optional but Recommended)

4.1 Enable Extended Certificate Validation

  • In PVWA UI: Administration > Configuration Options > General

  • Set ValidatePKICertificate = Yes

Conditions required for validation:

  • No Elliptic Curve keys

  • Client cert includes Client Authentication in Extended Key Usage

  • CA has CA=True in Basic Constraints

  • No SHA1/MD5 used in signature

  • Cert is not self-signed

4.2 Configure web.config for PKI/PKIPN

Location: C:\inetpub\wwwroot\PasswordVault\web.config

For PKI:
No changes needed in the handler if already using:

xml

<add name="PKIAuth" type="CyberArk.Authentication.PKIAuthentication, CyberArk.Authentication.PKI" preCondition="managedHandler"/>

For PKIPN:
Replace with:

xml

<add name="PKIAuth" type="CyberArk.Authentication.PKIPNAuthentication, CyberArk.Authentication.PKIPN" preCondition="managedHandler"/>

 Also, copy CyberArk.Authentication.PKIPN.dll into:
C:\inetpub\wwwroot\PasswordVault\bin

4.3 Validate Certificate Issuer (Restrict Allowed CA)

In web.config under <appSettings>:

xml

<add key="PKIAuthorizedIssuer" value="CN=Your-CA-Name, DC=domain, DC=com" />

Use either:

  • Full Distinguished Name (DN), or

  • Simple Common Name (CN)

Examples:

xml

<add key="PKIAuthorizedIssuer" value="CN=corp-DC01-CA, DC=corp, DC=com" /> <add key="PKIAuthorizedIssuer" value="corp-DC01-CA" />

Phase 5: Testing & Validation

5.1 Test Login via PVWA

  • URL: https://pvwa.domain.com/PasswordVault

  • Attach Smart Card or ensure client cert is installed.

  • Browser behavior:

    • Either auto-authenticates the user

    • Or prompts user to select a valid certificate

5.2 Troubleshooting

If login fails:

  •  Check certificate trust chain

  • Verify UPN/DN matches Vault user

  • Confirm AuthMethod = PKI or PKIPN

  • Ensure IIS client cert mode is correct

  • Use supported browsers (Chrome, Edge, IE)

  • Review logs:

    • C:\inetpub\wwwroot\PasswordVault\Logs


Step by step screenshots for your reference:
--------------------------------------------

1. Vault Configured with CA Certificate 





2. Update the Domain Issuer details in the Webcomic file. 



3. update the applicationHost.config

Location: %WinDir%\System32\Inetsrv\Config\applicationHost.config.



4. Import the user (Username) certificate on PVWA and Client Machine (Testing Machine) 



5. Verify the installed certificate is updated in Brower level. 



6. Update the PKI Enable on PVWA Configuration Console

A. General Level 



B. Authentication Level 




7. User Group Mapping with External Authentication Like PKI (On Top-up LDAP) 




8. Login user PVWA with PKI authentication Method









Happy learning!!