Skip to content

CyberArk Integration

What It Is

The CyberArk integration connects Hydden Discovery to the CyberArk Identity Security Platform. Hydden collects account, group, and vault data from CyberArk, then combines it with identity data from all other connected systems. This gives your security team a single view of every privileged account, whether it is vaulted or not.

Why It Matters

Privileged accounts are a top target for attackers. Organizations that use CyberArk protect credentials through vaulting, but gaps remain when accounts exist outside the vault. Hydden closes those gaps by discovering all accounts across your environment and showing which ones CyberArk already manages and which ones still need protection.

Without this integration, security teams must manually compare account lists across systems. With it, Hydden automates that comparison and provides clear actions to close coverage gaps.

How It Works

The integration operates in three layers: data collection, identity correlation, and vault onboarding.

Diagram description: A left-to-right flow diagram showing how the CyberArk integration works. The CyberArk Platform and Other Data Sources feed data via collectors to Hydden Discovery. Discovery performs identity mapping to create a Unified Identity View, then checks vault status. If an account is vaulted, it is monitored. If not vaulted, it is onboarded to CyberArk.

Data collection — The CyberArk collector connects to your CyberArk instance and retrieves user accounts, service accounts, vaulted accounts, groups, group memberships, MFA status, and account status. Hydden supports both cloud and on-premises CyberArk deployments.

Identity correlation — Hydden maps CyberArk accounts to identities discovered from other platforms such as Active Directory, Azure, AWS, and Linux hosts. This mapping reveals which people and services have privileged access and where that access overlaps.

Vault onboarding — When Hydden finds unvaulted accounts, you can add them to a CyberArk safe or the CyberArk discovery pipeline. This action is available directly from the Hydden interface, turning a manual process into a streamlined workflow.

What You Can Do

After you set up the integration, you can:

  • View vault coverage — Open the Vaulted Account Management report in the Search Library to see which accounts are vaulted, which are discovered, and which need attention.
  • Search by platform — Use Global Search to filter accounts and groups by the CyberArk platform, review account types, and check identity mappings.
  • Onboard accounts — Add unvaulted accounts to a CyberArk safe or the CyberArk discovery pipeline with a few clicks, directly from search results.
  • Use vaulted credentials — Store credentials for other Hydden data sources inside CyberArk safes and retrieve them securely during collection runs.
  • Sign in with CyberArk — Use CyberArk as your OpenID Connect provider for single sign-on to the Hydden platform.
  • Detect threats — Apply Hydden threat detection rules to privileged accounts. Identify unusual access patterns, dormant service accounts, and accounts with excessive permissions.

Key Capabilities

CapabilityDescription
Account discoveryCollects user, service, and vaulted accounts with MFA and status details
Group visibilityDiscovers groups and group memberships from the CyberArk platform
Vault status trackingShows which discovered accounts are vaulted and which are not
Safe onboardingAdds accounts to a CyberArk safe directly from Hydden
Discovery pipelineAdds accounts to the CyberArk discovered accounts list
Credential providerRetrieves credentials from CyberArk safes for use in Hydden collections
SSO via OIDCAuthenticates Hydden users through the CyberArk identity platform

Set Up the Integration

The following steps outline the full CyberArk integration setup. Complete them in order.

Set up single sign-on to Hydden from CyberArk using OpenID Connect. Refer to How to Configure a CyberArk OpenID Provider.

Data Collector

The CyberArk collector discovers internal and external user accounts, service accounts, vaulted accounts, groups, group memberships, MFA settings, and account status.

  1. Create a CyberArk credential in Hydden. Refer to Creating a CyberArk Credential.
  2. For on-premises deployments only: Configure the CyberArk service account. Refer to On-Prem PAM Service Account.
  3. Add the CyberArk collector module to a client. Refer to Adding the CyberArk Module.
  4. Create a CyberArk data source. Refer to How to Configure a CyberArk Data Source.

CyberArk Credential Provider

  1. Set up the CyberArk Central Credential Provider (CCP). Refer to Configure a CCP with SSL.
  2. Create a vaulted credential in Hydden. Refer to Adding a Vaulted Credential.

Next Steps

After the integration is configured and a collection has run:

Hydden Documentation and Training Hub