Guia para acesso WEB no PSM - CyberArk
Download arquivo: in-progress
1.) Install the 32bit version of Chrome on the server.
2.) I downloaded and copied the chrome-driver from the same browser version and pasted C:\Program Files (x86)\CyberArk\PSM\Components.
3.) Set "$SUPPORT_WEB_APPLICATIONS" to true in the hardening script. (PSMHardening.ps1)
4.) I downloaded WebAppDispatcher (Secure Web Application Connectors Framework), unzipped and pasted all the folders into C:\Program Files (x86)\CyberArk\PSM, replacing
5.) I uncommented the chrome line in PSMConfigureApplocker.xml and ran hardening again.
6.0) I duplicated the "Amazon Web Services - AWS" platform, added the PSM and imported the plugin to access the AWS account. I used this one: https://cyberark.my.site.com/mplace/s/# ... 000jjSMAAY
6.1) I duplicated the "Amazon Web Services - AWS Access Keys" platform
7.) In the connection components > PSM-AWS-IAM-User I adjusted the following:
- Set the field to 60000: ConnectionComponentInitTimeout
- Set the field to 45: PageLoadTimeout
- Set the “RunValidations” field to “No”
- Adjust BrowserPath: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
8.) I onboarded the AWS account and key. I linked the key to the account.
This way, access worked, after setting App-Locker to audit-only. I need to see this adjusted.
Guia para acesso WEB no PSM - CyberArk
-
- Site Admin
- Mensagens: 122
- Registado: quinta nov 09, 2017 11:35 am