Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

CyberArk 12.1 Lab - 3. PVWA Installation

6/21/2022

0 Comments

 
CyberArk 12.1 Lab - 3. PVWA Installation

This post summarizes some steps to install PVWA (Password Vault Web Access) component. 




Diagram




Installation Tasks Overview:



System Requirements

Refer to this doc:

1 Recommended server specifications

2 Components version compatibility

3 Software requirements
OS: 2019. 2016 (Preferred by installation guide), 2012 (Special requirements)
Application: Multi-language, Certificate, HSM, LDAP, Cipher suites for Syslog, SMTP over SSL
Protocols: RDP 

4 Ports and Protocols (Network Firewall might need to open those ports)

PVWA should close to end users who should sign into it. 


Architecture 





Pre-Installation Tasks

1 Clean installation of Windows 2016 standard. Update windows system to latest with all patches. 



2 Log on Windows as the administrator users

3 Run PVWA server prerequisitesscript
  1. Copy the PVWA folder from the installation package to the component server, and unzip the folder.

  2. In the InstallationAutomation folder, locate the PVWA_Prerequisites.ps1 file.

  3. Open the PowerShell window, and run the PVWA_Prerequisites.ps1 file as an administrator.


Installation Steps

The PVWA can be automatically installed and deployed using scripts, or installed by using the Installation wizard. CyberArk recommend that you use the automated scripts.

1 In the PVWA\InstallationAutomation\Installation folder, locate and open the InstallationConfig.xml file.


2 
  1. In the InstallationConfig.xml file, specify the following parameters

    Parameter

    Description

    Username

    The name of the user running the installation.

    Valid values: Username

    Company

    The name of the company running the installation.

    Valid values: Company name

    PVWAApplicationDirectory

    The location of the PVWA IIS web application.

    Valid values: Pathname

    Default value: C:\inetpub\wwwroot\PasswordVault\

    PVWAInstallDirectory

    The path where PVWA is installed.

    Valid values: Pathname

    Default value: C:\CyberArk\Password Vault Web Access\

    PVWAApplicationName

    The name of the PVWA IIS web application.

    Valid values: Application name

    Default value: PasswordVault

    PVWAAuthenticationList

    The authentication types that PVWA supports. Separate multiple values with semicolons (;).

    Valid values: CyberArk, Windows, Radius, PKI, LDAP, Oracle SSO, SAML

    Default value: CyberArk;

     
    • Some of the selected authentication types must be installed and configured on the Vault before they can be configured for the PVWA. For more information, see Authenticate to Privileged Access Manager .

    • Make sure that the administrator user for testing can authenticate to the Vault with one of the selected authentication methods so that you will be able to test the installation.

    • To customize third-party authentication servers, see Set up customized authentication modules.

    pvwaUrl

    The URL of the default PVWA to access.

    Valid values: URL

    Default value: https://127.0.0.1/PasswordVault

    isUpgrade

    Indicates whether the registration is for an upgrade or a clean installation.

    Default value: False

    Valid values: True\False

3 In a PowerShell window, run the PVWAInstallation.ps1 script as Administrator.


Option: You also can install PVWA using the installation wizard as shown fromthis doc. 


Registration

The registration process connects the PVWA to the Vault.

  1. In the PVWA\InstallationAutomation\Registration folder, locate and open the PVWARegisterComponentConfig.xml file.

  2. In the PVWARegisterComponentConfig.xml file, specify the following parameters

    Parameter

    Description

    accepteula

    Acceptance of the end user License agreement.

    Valid values: Yes/No

    vaultIP

    The IP address or hostname of the Vault server.

    When you register PVWA to a DR Vault environment, specify vaultip with <vault ip>,<DR ip>

    Valid values: IP address or hostname

    vaultport

    The Vault’s configured communication port.
    Recommended default Vault port: 1858

    Valid values: Port number

    vaultuser

    The name of the Vault user performing the installation.

    Valid values: Username

     

    We recommend using the Vault administrator user to install PVWA as this user has the appropriate Vault authorizations, and is created in the appropriate location in the Vault hierarchy.

    For more information about the required authorizations, see Vault user authorizations.

    pocmode

    Whether or not PVWA is installed in POC mode.

    Valid values: True/False

    authenticationlist

    The authentication types that PVWA supports. Separate multiple values with semicolons (;).

    Valid values: CyberArk, Windows, Radius, PKI, LDAP, Oracle SSO, SAML

    installpackagedir

    The full path to the installation package directory (the directory that includes setup.exe).

    Edit this parameter only when pocmode is set to true.

    Do not edit if pocmode is set to false.

    Valid values: Pathname

    vaultname

    The name of the Vault where the PVWA configuration files will be stored.

    Valid values: Vault name

    virtualDirectoryPath

    The root path of the web application.

    Specify the same value as the PVWAApplicationDirectory parameter value in the InstallationConfig.xml file.

    Default value: C:\inetpub\wwwroot\PasswordVault

    Valid values: Pathname

    configFilesPath

    The path where the PVWA configuration files are installed.

    Specify the same value as the PVWAInstallDirectory value in the InstallationConfig.xml file.

    Default value: C:\CyberArk\Password Vault Web Access

    Valid values: Pathname

    pvwaUrl

    The URL of the default PVWA to access.

    Valid values: URL

    isUpgrade

    Indicates whether the registration is for an upgrade or a clean installation.

    Default value: False

    Valid values: True\False

    PVWAApplicationName

    The name of the PVWA IIS web application.

    Default value: PasswordVault

    Valid values: Application name

  3. In PowerShell window run the PVWARegisterComponent.ps1 script as Administrator, and provide the Vault password in one of the following ways:

    Method

    Command

    As a secure string (recommended) 

    CD “<installation package Path>InstallationAutomation\Registration” .\PVWARegisterComponent.ps1 -spwdObj <vaultpassword>

    Using a Windows authentication window (recommended for manual runs)

    CD “<installation package Path>InstallationAutomation\Registration” .\PVWARegisterComponent.ps1

    As clear text (not recommended)

    CD “<installation package Path>InstallationAutomation\Registration” .\PVWARegisterComponent.ps1 -pwd <vaultpassword>





Post-Installation

 
1 Check the installation log files

2 Check the user permissions on the web server

3 Configure additional authentication methods to log into PVWA

4 Replace self-signed certificate

5 For high availability, specify multiple vault ip addresses 

Hardening

 
You can harden the PVWA server automatically using a script file (if PSM is going to be on the same machine, the script may affect the PSM installation). 

  • Before you run the hardening script, in the PVWA\InstallationAutomation folder, locate and open the PVWA_Hardening_Config.xml file, and set the IsPSMInstalled parameter to True.
  • In a PowerShell window, run the PVWA_Hardening.ps1 script as Administrator.


Multiple PVWA installations

Multiple PVWAs in a single Vault environment

A single Vault can work with multiple instances of PVWA that are installed on different machines and which access the same Vault. This is true for a single Vault environment and for a Disaster Recovery Vault environment, and enables you to work with high availability or load balancing scenarios. In both scenarios, the same PVWA version must be installed on all machines.

Load balancer requirements

  • The load balancer must not alter page content, or it should include a mechanism to prevent pages from being altered.

  • The load balancer must not alter the application path hierarchy (leave the default application path as it is).

  • The load balancer must support 'sticky sessions'.

Configure the PVWA to work with the load balancer

  • In the web.config file, for the LoadBalancerClientAddressHeader parameter, enter the HTTP Header field name from which the PVWA reads the client IP. For more information, see the LoadBalancerClientAddressHeader parameter in PVWA Parameter File (Web.config).





References

  • Install AD & CS (Certification Service) on Windows Server 2016 to Deploy Enterprise PKI
  • Logo Privileged Access Manager Version 12.2 - Installation








via Blogger http://blog.51sec.org/2022/06/cyberark-121-lab-4-cpm-installation.html
June 21, 2022 at 11:25AM
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org