@itentialopensource/adapter-cyberark 0.4.6 → 0.4.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AUTH.md +25 -0
- package/TAB2.md +25 -0
- package/entities/.system/action.json +3 -3
- package/entities/.system/schemaTokenReq.json +33 -0
- package/entities/.system/schemaTokenResp.json +1 -1
- package/metadata.json +6 -2
- package/package.json +1 -1
- package/report/adapterInfo.json +1 -1
- package/report/auto-adapter-openapi.json +30066 -0
package/AUTH.md
CHANGED
|
@@ -48,6 +48,31 @@ you can leave all of the other properties in the authentication section, they wi
|
|
|
48
48
|
|
|
49
49
|
4. Restart the adapter. If your properties were set correctly, the adapter should go online.
|
|
50
50
|
|
|
51
|
+
### OAuth Authentication
|
|
52
|
+
The CyberArk adapter also supports OAuth Authentication. If you change authentication methods, you should change this section accordingly and merge it back into the adapter repository.
|
|
53
|
+
|
|
54
|
+
STEPS
|
|
55
|
+
1. Ensure you have access to a CyberArk server and that it is running
|
|
56
|
+
2. Follow the steps in the README.md to import the adapter into IAP if you have not already done so
|
|
57
|
+
3. Use the properties below for the ```properties.authentication``` field
|
|
58
|
+
```json
|
|
59
|
+
"authentication": {
|
|
60
|
+
"auth_method": "request_token",
|
|
61
|
+
"token_timeout": 1800000,
|
|
62
|
+
"token_cache": "local",
|
|
63
|
+
"invalid_token_error": 401,
|
|
64
|
+
"auth_field": "header.headers.Authorization",
|
|
65
|
+
"auth_field_format": "{token}",
|
|
66
|
+
"auth_logging": false,
|
|
67
|
+
"client_id": "<client_id>",
|
|
68
|
+
"client_secret": "<client_secret>",
|
|
69
|
+
"grant_type": "client_credentials"
|
|
70
|
+
}
|
|
71
|
+
```
|
|
72
|
+
you can leave all of the other properties in the authentication section, they will not be used for CyberArk OAuth authentication.
|
|
73
|
+
|
|
74
|
+
4. Restart the adapter. If your properties were set correctly, the adapter should go online.
|
|
75
|
+
|
|
51
76
|
### Troubleshooting
|
|
52
77
|
- Make sure you copied over the correct username and password.
|
|
53
78
|
- Turn on debug level logs for the adapter in IAP Admin Essentials.
|
package/TAB2.md
CHANGED
|
@@ -59,6 +59,31 @@ you can leave all of the other properties in the authentication section, they wi
|
|
|
59
59
|
|
|
60
60
|
4. Restart the adapter. If your properties were set correctly, the adapter should go online.
|
|
61
61
|
|
|
62
|
+
#### OAuth Authentication
|
|
63
|
+
The CyberArk adapter also supports OAuth Authentication. If you change authentication methods, you should change this section accordingly and merge it back into the adapter repository.
|
|
64
|
+
|
|
65
|
+
STEPS
|
|
66
|
+
1. Ensure you have access to a CyberArk server and that it is running
|
|
67
|
+
2. Follow the steps in the README.md to import the adapter into IAP if you have not already done so
|
|
68
|
+
3. Use the properties below for the ```properties.authentication``` field
|
|
69
|
+
```json
|
|
70
|
+
"authentication": {
|
|
71
|
+
"auth_method": "request_token",
|
|
72
|
+
"token_timeout": 1800000,
|
|
73
|
+
"token_cache": "local",
|
|
74
|
+
"invalid_token_error": 401,
|
|
75
|
+
"auth_field": "header.headers.Authorization",
|
|
76
|
+
"auth_field_format": "{token}",
|
|
77
|
+
"auth_logging": false,
|
|
78
|
+
"client_id": "<client_id>",
|
|
79
|
+
"client_secret": "<client_secret>",
|
|
80
|
+
"grant_type": "client_credentials"
|
|
81
|
+
}
|
|
82
|
+
```
|
|
83
|
+
you can leave all of the other properties in the authentication section, they will not be used for CyberArk OAuth authentication.
|
|
84
|
+
|
|
85
|
+
4. Restart the adapter. If your properties were set correctly, the adapter should go online.
|
|
86
|
+
|
|
62
87
|
#### Troubleshooting
|
|
63
88
|
- Make sure you copied over the correct username and password.
|
|
64
89
|
- Turn on debug level logs for the adapter in IAP Admin Essentials.
|
|
@@ -4,13 +4,13 @@
|
|
|
4
4
|
"name": "getToken",
|
|
5
5
|
"protocol": "REST",
|
|
6
6
|
"method": "POST",
|
|
7
|
-
"entitypath": "{base_path}/{version}/
|
|
7
|
+
"entitypath": "{base_path}/{version}/oauth2/platformtoken",
|
|
8
8
|
"requestSchema": "schemaTokenReq.json",
|
|
9
9
|
"responseSchema": "schemaTokenResp.json",
|
|
10
10
|
"timeout": 0,
|
|
11
11
|
"sendEmpty": false,
|
|
12
|
-
"requestDatatype": "",
|
|
13
|
-
"responseDatatype": "",
|
|
12
|
+
"requestDatatype": "URLENCODE",
|
|
13
|
+
"responseDatatype": "JSON",
|
|
14
14
|
"headers": {},
|
|
15
15
|
"sso": {
|
|
16
16
|
"protocol": "",
|
|
@@ -36,6 +36,39 @@
|
|
|
36
36
|
},
|
|
37
37
|
"external_name": "password"
|
|
38
38
|
},
|
|
39
|
+
"client_id": {
|
|
40
|
+
"type": "string",
|
|
41
|
+
"description": "client id to log in with",
|
|
42
|
+
"parse": false,
|
|
43
|
+
"encode": false,
|
|
44
|
+
"encrypt": {
|
|
45
|
+
"type": "AES",
|
|
46
|
+
"key": ""
|
|
47
|
+
},
|
|
48
|
+
"external_name": "client_id"
|
|
49
|
+
},
|
|
50
|
+
"client_secret": {
|
|
51
|
+
"type": "string",
|
|
52
|
+
"description": "client secret to log in with",
|
|
53
|
+
"parse": false,
|
|
54
|
+
"encode": false,
|
|
55
|
+
"encrypt": {
|
|
56
|
+
"type": "AES",
|
|
57
|
+
"key": ""
|
|
58
|
+
},
|
|
59
|
+
"external_name": "client_secret"
|
|
60
|
+
},
|
|
61
|
+
"grant_type": {
|
|
62
|
+
"type": "string",
|
|
63
|
+
"description": "grant type being used",
|
|
64
|
+
"parse": false,
|
|
65
|
+
"encode": false,
|
|
66
|
+
"encrypt": {
|
|
67
|
+
"type": "AES",
|
|
68
|
+
"key": ""
|
|
69
|
+
},
|
|
70
|
+
"external_name": "grant_type"
|
|
71
|
+
},
|
|
39
72
|
"token": {
|
|
40
73
|
"type": "string",
|
|
41
74
|
"description": "token returned by system",
|
package/metadata.json
CHANGED
package/package.json
CHANGED
package/report/adapterInfo.json
CHANGED