Preparing CyberArk to Work with Keyfactor Command

Configuring the CyberArk Credential Provider to interoperate with Keyfactor Command and store Keyfactor Command credentials in the CyberArk vault involves these preparatory steps before configuration in Keyfactor Command can begin:

  • Install required software on the Keyfactor Command server.
  • Create a safe for the Keyfactor Command credentials in the CyberArk PrivateArk (or identify an existing safe).
  • Create passwords in your CyberArk safe for use with your Keyfactor Command certificate stores.
  • Create an application user for Keyfactor Command use in the CyberArk PrivateArk.
  • Grant the application user and Keyfactor Command provider account in CyberArk appropriate permissions in PrivateArk to the safe.
  • Create a credential file on the Keyfactor Command server for use with CyberArk.
  • Register the CyberArk software assembly file with Keyfactor Command.