Add system users and roles
This section covers all steps required to add and authenticate your users in Identity Administration and assign them the relevant permissions to access and use CyberArk shared services on ISPSS.
User types
There are two main types of users in ISPSS.
User type | Description |
---|---|
Interactive users - for end user access to the User Portal and to any supported CyberArk service. |
Any user who signs in to CyberArk to interact with a Interactive users are defined manually, or are imported from the following sources:
|
Service users, for non-interactive API |
A ISPSS service user, dedicated to API and automation tasks. This user has least privilege access permissions, is not assigned MFA policies, and cannot access Identity Administration. To create a Service user, see and the client credentials it describes. To run API requests, see API Authentication for CyberArk Identity Security Platform Shared Services. |
User roles
Roles determine which service the assigned users can access and the set of permissions that they have in that specific service.
After users are provisioned on CyberArk Identity Security Platform Shared Services, either from external directories or manually, the users, or groups, must be assigned to at least one role.
After assigning roles to users, you can invite them to sign in to ISPSS and access the specific service.
To learn about supported roles per service, see CyberArk Identity Security Platform Shared Services user roles.
User provisioning workflow
The following work flow illustrates the steps required to add and authenticate your users, then authorize them to securely access relevant services.
Prepare for deployment
-
Receive the CyberArk Welcome email to the CyberArk Identity Security Platform Shared Services portal. The email contains a link to your CyberArk Identity Security Platform Shared Services cloud tenant, access credentials and your customer ID.
-
Check necessary setup details and sign in to the ISPSS user portal. See Collect setup details and sign in to the ISPSS user portal.
-
If possible, sign in to the ISPSS portal from the Connector machine. If there is no internet access, sign in from a server that will allow to easily copy over the necessary installation files.
-
Ensure you log into the Connector machine with a user account that is a domain user with local admin and installation permissions on the machine.
-
-
Check system prerequisites:
-
For user provisioning using on-prem authentication services, you will need to install the CyberArk Identity Connector. See CyberArk Identity Connector requirements.
-
Set up your installeruser password for use in all connector installations. See Set the Installeruser password
-
Add users and roles
In CyberArk Identity tenant:
-
Add users from any of the following sources:
Authentication services
CyberArk Cloud Directory
-
Set up federation with external identity providers, see Set up federation with external identity providers.
This step is optional and may not apply to all services.
-
Configure multi-factor authentication. See Configure MFA for CyberArk Identity.
Multi-factor authentication applies to shared services on ISPSS, excluding Secure Cloud Access and Cloud Entitlements Manager
Applies to CyberArk shared services on ISPSS, excluding Secure Cloud Access and Cloud Entitlements Manager.
-
Add users and assign roles to your groups and users. See Assign users to roles and manage roles
-
Ensure all required groups and users are issued an invitation to connect to CyberArk Identity Security Platform Shared Services to access the necessary services.