Skip to content

Add To Vault

Add to Vault automation enables Hydden Discovery to automatically onboard discovered privileged accounts to Privileged Access Management (PAM) systems. Use classification-triggered workflows to vault accounts as soon as they're discovered, reducing manual administrative overhead and improving security posture.

Overview

Add to Vault workflows automatically create or discover accounts in PAM systems when classification rules are applied. This closed-loop integration enables:

  • Automatic Account Onboarding: Vault newly discovered privileged accounts without manual intervention
  • Classification-Based Vaulting: Trigger vaulting based on account classification rules
  • Multi-PAM Support: Integrate with CyberArk Privilege Cloud, CyberArk Self-Hosted, and BeyondTrust Password Safe
  • Rate Limiting: Controlled account creation (30 accounts per minute per collector) to prevent overwhelming PAM systems
  • Template-Based Configuration: Use variables to dynamically populate vault fields from discovered account data

Supported PAM Systems

Hydden Discovery integrates with the following PAM platforms:

CyberArk

  • CyberArk Privilege Cloud (SaaS):

    • REST API integration via /PasswordVault/API/Accounts
    • Discovered accounts API via /api/discovered-accounts
    • Account reconciliation and password management
    • Platform and safe-based organization
  • CyberArk Self-Hosted (On-Premises):

    • REST API integration (same endpoints as Cloud)
    • Credential Provider (CCP) integration for password retrieval
    • Platform and safe-based organization
    • Custom platform support

BeyondTrust

  • BeyondTrust Password Safe:
    • REST API integration via /BeyondTrust/api/public/v3/
    • Managed accounts and managed systems
    • Automatic password management
    • Password check-out and check-in workflows

Prerequisites

Before configuring Add to Vault workflows:

  • PAM System Integration: Configure CyberArk or BeyondTrust integration in Hydden Discovery (see CyberArk Integration or BeyondTrust Integration)
  • PAM Credentials: Create credentials for PAM API access in Configuration > Settings > Credentials
  • Classification Rules: Configure classification rules to identify accounts that should be vaulted (see Classification Rules)
  • PAM Platforms: Ensure target platforms (e.g., Windows Domain, Unix) and safes/vaults exist in the PAM system
  • Permissions: Verify PAM API credentials have permission to create accounts and access target safes

Add to Vault Provider Configuration

To add an Add to Vault provider:

  1. In Hydden, navigate to Configuration > Automate.
  2. On the Providers tab, click + Add New.
  3. From the Type drop-down, select Add To Vault.
  4. For Name, enter a descriptive provider name (e.g., "CyberArk Production Vault", "BeyondTrust PAM").
  5. For Description, provide an optional description of the provider's purpose.
  6. From the Credential drop-down, select the pre-configured PAM integration credential:
    • For CyberArk: Select the CyberArk API credential
    • For BeyondTrust: Select the BeyondTrust API credential
    • The credential type determines which PAM provider is used
  7. Click Save.

The provider references the configured PAM integration (CyberArk or BeyondTrust) via the credential type. All vault connection details (endpoints, authentication) are configured in the PAM integration settings.

Add to Vault Workflow Configuration

Add to Vault workflows are typically triggered by classification rules. When a classification is applied to an account, the workflow automatically vaults the account.

To create an Add to Vault workflow:

  1. In Hydden, navigate to Configuration > Automate.
  2. On the Workflows tab, click + Add New.
  3. For Name, enter a descriptive workflow name (e.g., "Auto-Vault Linux Root Accounts", "Vault Windows Admins to CyberArk").
  4. For Description, provide an optional workflow purpose description.
  5. From the Trigger drop-down, select Classification Added.
  6. From the Classification Rule drop-down, select the classification that should trigger vaulting:
    • Add to Vault: Default classification for general vaulting
    • Auto Add to CyberArk: Default classification for CyberArk-specific vaulting
    • Custom classification rules you've created
    • See Classification Rules for creating custom rules
  7. From the Action drop-down, select your configured Add to Vault provider (e.g., "Add to CyberArk Production").
  8. From the Select Vault Connection drop-down, select your configured PAM integration:
    • Lists available CyberArk and BeyondTrust integrations
    • Integration must match the provider's credential type
  9. Configure workflow fields based on your PAM system (see platform-specific sections below).
  10. Click Save.
  11. Toggle the workflow switch to on to activate it.

NOTE

Under Configuration > Identify > Classification Rules, verify that the classification rule has the Allow Workflow Trigger option checked. Without this, the workflow will not execute when the classification is applied.

Common Workflow Fields

The following fields are common across all PAM platforms:

FieldDescriptionRequiredTemplate Support
UsernameAccount usernameYesYes (typically {Principal.Name} or {Name})
Account NameDisplay name for the account in PAMNoYes (pre-populated with template)
SystemOperating system typeYesNo (select from dropdown)
PlatformPAM platform identifierYesNo (select from dropdown)
Safe / VaultTarget safe or vault nameYesYes (can use variable for dynamic safe assignment)
AddressTarget system address (hostname, IP, domain)YesYes (typically {Address} or domain name)
PasswordAccount password (optional)NoYes
Automatic Password ManagementEnable CPM/automatic password rotationNoN/A (checkbox)

CyberArk Workflow Configuration

CyberArk-Specific Fields

FieldDescriptionExample ValueTemplate Variable
UsernameAccount usernameroot, admin{Principal.Name} or {Name}
Account NameDisplay name in CyberArkroot@prod-server-01Pre-populated template
SystemOperating systemWindows, Unix, LinuxSelect from dropdown
PlatformCyberArk Platform IDUnixSSH, WinDomainSelect from dropdown
SafeCyberArk Safe nameLinux-Servers, Windows-Admins{classification} or fixed value
AddressTarget system addressprod-server-01.corp.local{Address} or domain
Allow Automatic Password ManagementEnable CPMChecked/UncheckedN/A

CyberArk Platform Selection

CyberArk workflows require selecting a Platform ID that defines how CyberArk manages the account. Common platforms:

  • Unix/Linux:

    • UnixSSH: SSH-based Unix/Linux accounts
    • UnixSSHKeys: Unix accounts with SSH key authentication
    • UnixViaSSHTunnel: Unix accounts accessed through SSH tunnel
  • Windows:

    • WinDomain: Windows domain accounts
    • WinServerLocal: Local Windows server accounts
    • WinDesktopLocal: Local Windows desktop accounts
  • Database:

    • Oracle: Oracle database accounts
    • MSSQLServer: Microsoft SQL Server accounts
    • MySQL: MySQL database accounts
  • Cloud:

    • AWS: AWS IAM accounts
    • Azure: Azure service principals
    • GCP: Google Cloud service accounts

TIP

If your required platform isn't listed, create it in CyberArk first, then it will appear in the dropdown.

CyberArk Safe Assignment

You can use template variables to dynamically assign accounts to safes:

  • Fixed Safe: Enter a safe name directly (e.g., Linux-Privileged-Accounts)
  • Dynamic Safe: Use classification variable (e.g., {classification} resolves to the classification name)
  • Custom Logic: Use other variables (e.g., {Platform}-Accounts creates platform-specific safes)

CyberArk Unix/Linux Additional Options

For Unix and Linux platforms, additional options are available:

  • Use SUDO on Reconcile: Enable if the account requires sudo for password changes
  • Fetch SSH Keys: Enable to retrieve SSH keys for the account

Example CyberArk Workflow

Auto-Vault Linux Root Accounts:

Name: Auto-Vault Linux Root Accounts
Trigger: Classification Added
Classification Rule: Linux Privileged
Action: Add to CyberArk Vault
Vault Connection: CyberArk Production
Username: {Principal.Name}
System: Unix
Platform: UnixSSH
Safe: Linux-Privileged-Accounts
Address: {Address}
Allow Automatic Password Management: Checked

BeyondTrust Workflow Configuration

BeyondTrust-Specific Fields

FieldDescriptionExample ValueTemplate Variable
UsernameAccount usernameroot, administrator{Principal.Name} or {Name}
Account NameDisplay name in BeyondTrustroot@server-01Pre-populated template
SystemManaged System identifierSystem ID from BeyondTrustSelect from dropdown
PlatformAccount typePassword, SSH KeySelect from dropdown
AddressTarget system addressprod-server-01.corp.local{Address}
AutoManagementFlagEnable automatic password managementTrue/FalseCheckbox

BeyondTrust System Selection

BeyondTrust workflows require selecting a Managed System that represents the target server or device. Managed Systems must be pre-configured in BeyondTrust Password Safe before they appear in the dropdown.

To prepare BeyondTrust for auto-vaulting:

  1. In BeyondTrust Password Safe, create Managed Systems for target servers
  2. Configure system details (hostname, IP address, platform type)
  3. Set up auto-management policies
  4. Verify Managed Systems appear in Hydden workflow dropdown

BeyondTrust Password Management

BeyondTrust supports automatic password management:

  • AutoManagementFlag: Enable to allow BeyondTrust to automatically rotate passwords
  • Change Frequency: Configured in BeyondTrust (default: first of month at 23:30)
  • Release Duration: 10 minutes default
  • Max Release Duration: 60 minutes default

Example BeyondTrust Workflow

Auto-Vault Windows Administrator Accounts:

Name: Auto-Vault Windows Admins
Trigger: Classification Added
Classification Rule: Windows Privileged
Action: Add to BeyondTrust Vault
Vault Connection: BeyondTrust Password Safe
Username: {Principal.Name}
System: [Select Managed System]
Platform: Password
Address: {Address}
AutoManagementFlag: Checked

Template Variables for Vaulting

Add to Vault workflows support template variables from the Classification Added trigger. Common variables:

VariableDescriptionExample Value
{Name}Account nameroot, administrator
{Principal.Name}Principal usernamejsmith, admin_prod
{Address}System addressprod-server-01.corp.local
{Platform}Source platformLinux, Windows, ActiveDirectory
{Site}Site identifierprod-datacenter-01
{classification}Classification nameAdd to Vault, Linux Privileged
{classification_id}Classification rule IDauto-vault-linux
{Collector.name}Collector nameLinux Prod Collector

See Triggers for complete variable lists.

Variable Usage Examples

Dynamic Safe Assignment:

Safe: {Platform}-{classification}
Result: Linux-Privileged-Accounts

Account Name Template:

Account Name: {Principal.Name}@{Address}
Result: root@prod-server-01.corp.local

Address with Domain:

Address: {Address}.corp.example.com
Result: server01.corp.example.com

Rate Limiting

Add to Vault workflows include rate limiting to prevent overwhelming PAM systems with account creation requests:

  • Default Rate: 30 accounts per minute per collector
  • Scope: Rate limit applies per collector (multiple collectors can vault in parallel)
  • Implementation: Token bucket algorithm with configurable rate
  • Backpressure: Workflows wait when rate limit is reached, then resume

Rate Limit Behavior

When the rate limit is reached:

  1. Workflow Pauses: Add to Vault workflow waits for available tokens
  2. Queuing: Pending vault requests are queued in order
  3. Resumption: Workflow resumes when tokens are available
  4. No Failures: Rate limiting does not cause workflow failures

Rate Limit Configuration

Rate limits are configured at the system level and cannot be modified per workflow. Contact your Hydden administrator if rate limits need adjustment.

Classification-Triggered Auto-Vaulting

Auto-vaulting is triggered by classification rules. When an account matches a classification rule with Allow Workflow Trigger enabled, the workflow executes.

Classification Rule Requirements

For auto-vaulting to work:

  1. Classification Rule Exists: Create classification rule in Configuration > Identify > Classification Rules
  2. Allow Workflow Trigger: Enable Allow Workflow Trigger checkbox on the classification rule
  3. Workflow Configured: Create Add to Vault workflow with the classification as trigger
  4. Workflow Enabled: Toggle workflow to "on" state

Common Classification Patterns

Linux Root Accounts:

Classification Name: Linux Privileged
Pattern: Name = "root" AND Platform = "Linux"
Allow Workflow Trigger: Checked

Windows Local Administrators:

Classification Name: Windows Admin
Pattern: Name CONTAINS "admin" AND Platform = "Windows"
Allow Workflow Trigger: Checked

Service Accounts:

Classification Name: Service Accounts
Pattern: Name STARTS WITH "svc_" OR Name CONTAINS "service"
Allow Workflow Trigger: Checked

SQL SA Accounts:

Classification Name: SQL SA
Pattern: Name = "sa" AND Platform = "MSSQL"
Allow Workflow Trigger: Checked

Manual vs. Auto-Vaulting

Auto-Vaulting (Classification-Triggered)

Accounts are automatically vaulted when classification rules match:

  • Trigger: Classification Added
  • Execution: Automatic when classification is applied
  • User Interaction: None required
  • Use Case: Continuous discovery and vaulting of privileged accounts

Manual Vaulting (User-Initiated)

Users manually vault accounts from the Hydden Discovery UI:

  • Trigger: User action in UI
  • Execution: User selects accounts and initiates vaulting
  • User Interaction: Required
  • Use Case: Ad-hoc vaulting or exceptions to auto-vaulting rules

Workflow Execution and Monitoring

Execution Flow

  1. Account Discovered: Data source collection discovers account
  2. Classification Applied: Account matches classification rule
  3. Workflow Triggered: Add to Vault workflow is initiated
  4. Rate Limit Check: Workflow checks available token capacity
  5. Preprocessing: Account data is enriched with collector and entity metadata
  6. Template Rendering: Workflow fields are rendered with variable substitution
  7. API Call: PAM system API is called to create/discover account
  8. Result Logging: Success or failure is logged

Success Criteria

A vault operation is considered successful when:

  • PAM API returns HTTP 200/201 status code
  • Account is created or discovered in PAM system
  • No API errors occur

Failure Handling

When a vault operation fails:

  • Logged: Failure is logged with error details
  • No Retry: Vault operations are not automatically retried (to prevent duplicate accounts)
  • Manual Retry: Users can manually re-apply classification to retry
  • Investigation: Check logs for error details (authentication, permissions, etc.)

Monitoring Workflows

Monitor vault workflow execution through:

  • Hydden Discovery Logs: Check application logs for vault API calls and responses
  • PAM System Logs: Review PAM audit logs for account creation events
  • Workflow Status: Verify workflows are enabled and executing
  • Classification Application: Confirm classifications are being applied to accounts

Common Use Cases

Continuous Privileged Account Discovery

Scenario: Automatically vault all newly discovered privileged accounts

Configuration:

  • Classification: "Privileged Account" rule matching admin patterns
  • Workflow: Auto-vault to CyberArk safe "Discovered-Privileged"
  • Platform: Multiple platforms (Linux, Windows, SQL)

Benefit: Immediate vaulting of privileged accounts as they're discovered

Platform-Specific Vaulting

Scenario: Vault accounts to different safes based on platform

Configuration:

  • Classification: Platform-specific rules (Linux Privileged, Windows Privileged)
  • Workflows: Separate workflows for each platform
  • Safe Assignment: Dynamic using {Platform}-Privileged variable

Benefit: Organized account management by platform type

Compliance-Driven Vaulting

Scenario: Vault accounts that require compliance controls

Configuration:

  • Classification: "Requires Compliance" rule based on business criteria
  • Workflow: Auto-vault with automatic password management enabled
  • PAM Policy: Enforced password rotation and access logging

Benefit: Automated compliance control application

Service Account Management

Scenario: Vault discovered service accounts for credential rotation

Configuration:

  • Classification: "Service Account" rule matching naming patterns (svc_, app_, etc.)
  • Workflow: Auto-vault to "Service-Accounts" safe
  • Platform: Application-specific platforms

Benefit: Centralized service account credential management

Troubleshooting

IssueSolution
Workflow not triggeringVerify classification rule has "Allow Workflow Trigger" enabled, check workflow is enabled, confirm classification is being applied
Authentication failureVerify PAM credentials are valid, check API endpoint is accessible, confirm credential type matches PAM system
Platform not foundVerify platform exists in PAM system, check platform ID spelling, create platform in PAM if missing
Safe not foundVerify safe/vault exists in PAM system, check safe name spelling, create safe in PAM if missing
Permission deniedVerify PAM user has permission to create accounts in target safe, check PAM ACLs and policies
Rate limit delaysThis is normal behavior - workflow will resume when capacity available, consider adjusting rate limits if needed
Duplicate accountsCheck if workflow triggered multiple times, review classification rule logic, implement deduplication in PAM
Variables not substitutingVerify variable names match trigger type (see Triggers), check syntax uses {Variable} format
Wrong safe/vault assignedVerify template variable resolves correctly, check safe name template syntax, test with fixed safe name first

Best Practices

Workflow Design

  • Platform-Specific Workflows: Create separate workflows for each platform type (Linux, Windows, SQL, etc.)
  • Safe Organization: Use logical safe names that reflect account categories
  • Naming Conventions: Use consistent account naming templates across workflows
  • Test First: Test workflows with a small set of accounts before broad deployment

Classification Strategy

  • Specific Rules: Create targeted classification rules that match specific account types
  • Avoid Over-Classification: Don't create rules that match too many accounts at once
  • Incremental Rollout: Enable auto-vaulting for one account type at a time
  • Review Regularly: Periodically review classification rules for accuracy

PAM System Preparation

  • Pre-Create Safes: Create target safes/vaults in PAM before enabling workflows
  • Platform Configuration: Configure all required platforms in PAM
  • Test Connectivity: Verify Hydden can connect to PAM APIs
  • Monitor Capacity: Ensure PAM system can handle account creation rate

Operational Management

  • Monitor Workflows: Regularly check workflow execution logs
  • Review Vaulted Accounts: Periodically audit accounts vaulted by automation
  • Handle Exceptions: Have a process for accounts that shouldn't be auto-vaulted
  • Document Configuration: Maintain documentation of workflows and classification rules

Hydden Documentation and Training Hub