02-PAS-ADMIN EPV Administration
02-PAS-ADMIN EPV Administration
CyberArk Training
1
OBJECTIVES
• The various encryption methods used and how to protect the keys
• The tools available to administrators
2
SYSTEM ARCHITECTURE
3
THE VAULT AND ITS COMPONENTS
Vault
Password Vault
Web Access
• Each Component has a Central Policy
Manager
User ID and password
PACli and SDKs
Vault
Unix/Windows
PrivateArk Client
Application
Provider
Unix/Windows
Privilege
Provider
4
COMPONENT COMMUNICATION – CPM AND PVWA
1858 Vault
Password Vault
Using the PVWA, Administrators
Web Access update policies in the Vault.
HTTPS
Vault administrators
5
VAULT CLIENTS Unmanaged
Target Account
and Servers
End Users:
IT Staff, Auditor, etc. Privileged Session
Manager
Password Vault
Web Access
Central Policy Managed
Manager Target Account
Custom Applications, and Servers
Reporting Tools, etc.
Vault
Unix/Windows
PrivateArk Client
Application
Vault Provider Target Databases
Administrators Unix/Windows
Privilege
Provider
Unix/Windows Users
6
ARCHITECTURE – BASIC DEPLOYMENT, ONE SITE
COMP01a
*nix 22
1858
192.168.23.31
Password Vault
Web Access
Vault
443
End Users:
IT Staff, Auditor, etc.
7
ARCHITECTURE – BASIC DEPLOYMENT, MULTIPLE SITES
COMP01b VAULT01a COMP01a
Vault
192.168.23.19 1858 10.0.1.30
1858
Target Target
Systems Systems
192.168.23.20 Central Policy Central Policy 10.0.1.31
Manager Manager
1858
192.168.23.31 10.0.1.60
Password Vault
Web Access
8
CYBERARK’S SCALABLE ARCHITECTURE
Auditors
IT IT Environment
Vault (HA Cluster)
Auditors/IT Auditors/IT
IT Environment IT Environment
9
SAMPLE ARCHITECTURE DIAGRAM WITH DR
• End users communicate to:
• PVWA – HTTPS
• PSM – RDP
10
VAULT SECURITY
11
THE VAULT: END TO END SECURITY
Stored
Vault User Credential
Discretionary Mandatory
Session File
Firewall Authentication Access Access Auditing
Encryption Encryption
Control Control
12
THE VAULT: AN ISLAND OF SECURITY
13
VAULT ENCRYPTION KEYS
16
VAULT OBJECT ENCRYPTION
AES-256
AES-256
17
FILE ENCRYPTION PROCESS
RecPub Key
• Each Credential is stored as an encrypted file
on the Vault Server Key
• The File key is a unique symmetric key is generated
for each file
• The File Key is then encrypted with the Safe key, AES-256
which is a symmetric key unique to the Safe
RSA 2048
• The Safe key is then encrypted with the symmetric
Server key, which is unique to the Vault Safe Key
• Server Key
• The Server Key is loaded into memory when the AES-256
Vault starts
• RecPub Key
• A copy of the relevant Safe Key is encrypted with File Key
the RecPub Key and stored in each password object
18 18
NORMAL FILE DECRYPTION PROCESS
• The Safe key is used to decrypt the File Key Server Key
Safe Key
AES-256
File Key
19 19
SECURE RECOVERY MECHANISM
20
HOW ENCRYPTION KEYS ARE DISTRIBUTED
• Operator CD
• Operator CD contains:
• Server Key
• Recovery Public Key
• Operator CD keys are required to install and start the vault server.
• Master CD
• The Master CD contains:
• Server Key
• Recovery Public Key
• Recovery Private Key
• Master CD keys are to be used for emergencies.
• Login as Master, recover the Vault, or re-key the Vault.
21
MASTER KEY STORAGE STRATEGIES
22
OPERATOR KEY STORAGE STRATEGIES
STRONG &
STRONG CONVENIENT
CONVENIENT
• Store the Operator CD • Copy the contents of the • Store the Server Key in
in a secure location and Operator CD to direct a Hardware Security
insert the CD whenever attached storage of the Module (HSM).
starting/restarting the Vault server(s) and
vault. secure with NTFS
Permissions
23
VAULT ADMINISTRATION TOOLS
24
VAULT SERVER CENTRAL ADMINISTRATION STATION
25
REMOTE CONTROL AGENT
• The Remote Control Agent allows you to perform several Vault admin tasks (without restarting the
Vault) and view machine statistics
Note: The Remote Control Agent is also required to send out SNMP traps
26
PRIVATEARK CLIENT
27
VAULT CONFIG FILES AND LOGS
28
VAULT CONFIGURATION FILES
29
DBPARM.INI
30
VAULT LOG FILES
31
VAULT CONFIGURATION FILES AND LOGS - PRIVATEARK CLIENT
32 32
CPM
CENTRAL POLICY MANAGER
33
CENTRAL POLICY MANAGER
Policy
The CPM performs password changes and
SSH Key rotations on devices based on the
policies set by Vault Administrators
y7qeF$1
Im7yT%w
Tojsd$5fh
gviNa9%
X5$aq+p
Central Policy
Manager
34
CPM PASSWORD CHANGE PROCESS
When the CPM needs to change a password the following process is executed:
Success or failure
Success or failure
Store new credentials
35
CPM SERVICES
36
CPM DIRECTORIES
37
LOG FILES
• pm.log – contains all the log messages, including general and informative
Activity Logs messages, errors, and warnings.
(Logs folder)
• pm_error.log – contains only warning and error messages.
• After a log file has been uploaded into the Safe, it is renamed and moved into
History the History subfolder.
log files • The file is marked with a time stamp and renamed as follows:
(Logs\History folder)
<filename> (<date>-<time>).log
38
PVWA
PASSWORD VAULT WEB ACCESS
39
PVWA SERVICE (IIS SERVICES)
iisreset /restart
or
iisreset /status
40 40
PVWA DIRECTORIES (IIS FOLDER)
41
PVWA LOG LOCATION
42
PVWA LOG LOCATION
43
PVWA – LOGGED IN AS A VAULT ADMIN – V10
44
SYSTEM HEALTH
• In V10.2, drill-down
windows were added for
each component
45
ON-LINE HELP
46
ON-LINE HELP CONT.
• At the bottom of the online help window, there are links to other resources.
• Learn about additional resources that can be found at the Resource Center:
• Webinars, Case Studies, Brochures and Datasheets, videos, and more
47
CYBERARK RESOURCE CENTER
48
INSIDE THE VAULT
49
VAULT INITIAL SAFES – PRIVATEARK CLIENT
50 50
VAULT BUILT-IN USERS AND GROUPS – PRIVATEARK CLIENT
Tools->Administrative
Tools->Users and Groups
51 51
CPM SAFES – PRIVATEARK CLIENT
The remaining four safes will be duplicated for each CPM in the CyberArk
environment and named after the user for that CPM, e.g.
• PasswordManager
• PasswordManager_ADInternal
• PasswordManager_info
• PasswordManager_workspace
52 52
CPM VAULT USER – PRIVATEARK CLIENT
Tools->Administrative
Tools->Users and Groups
53
PVWA SAFES – PRIVATEARK CLIENT
54 54
PVWA VAULT USERS AND GROUPS – PRIVATEARK CLIENT
Tools->Administrative
Tools->Users and Groups
• PVWAAppUser is used by
the Password Vault Web
Access for internal
Processing
• PVWAGWUser is the
Gateway user through
which other users will
access the Vault
55
PVWA GATEWAY USER
Rotem PVWA PVWAGWUser (Rotem)
IT
Administrator
IT Environment
56
SUMMARY
57
SUMMARY
• The various encryption methods used and how to protect the keys
58
ADDITIONAL RESOURCES
Documentation
59
THANK YOU
60