Skip to content

Commit fbc2e75

Browse files
authored
Merge pull request #15 from Keyfactor/update-to-bootstrap
Update to bootstrap/starter@v2
2 parents 19e4b5d + 7c2aaed commit fbc2e75

File tree

3 files changed

+108
-129
lines changed

3 files changed

+108
-129
lines changed
Lines changed: 16 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,19 @@
1-
name: Starter Workflow
2-
on: [workflow_dispatch, push, pull_request]
1+
name: Keyfactor Bootstrap Workflow
32

4-
jobs:
5-
call-create-github-release-workflow:
6-
uses: Keyfactor/actions/.github/workflows/github-release.yml@main
7-
8-
get-manifest-properties:
9-
runs-on: windows-latest
10-
outputs:
11-
update_catalog: ${{ steps.read-json.outputs.prop }}
12-
steps:
13-
- uses: actions/checkout@v3
14-
- name: Read json
15-
id: read-json
16-
shell: pwsh
17-
run: |
18-
$json = Get-Content integration-manifest.json | ConvertFrom-Json
19-
echo "::set-output name=prop::$(echo $json.update_catalog)"
20-
21-
call-dotnet-build-and-release-workflow:
22-
needs: [call-create-github-release-workflow]
23-
uses: Keyfactor/actions/.github/workflows/dotnet-build-and-release.yml@main
24-
with:
25-
release_version: ${{ needs.call-create-github-release-workflow.outputs.release_version }}
26-
release_url: ${{ needs.call-create-github-release-workflow.outputs.release_url }}
27-
release_dir: cyberark-credentialprovider-pam/bin/Release/netstandard2.0
28-
secrets:
29-
token: ${{ secrets.PRIVATE_PACKAGE_ACCESS }}
3+
on:
4+
workflow_dispatch:
5+
pull_request:
6+
types: [opened, closed, synchronize, edited, reopened]
7+
push:
8+
create:
9+
branches:
10+
- 'release-*.*'
3011

31-
call-generate-readme-workflow:
32-
if: github.event_name == 'push' || github.event_name == 'workflow_dispatch'
33-
uses: Keyfactor/actions/.github/workflows/generate-readme.yml@main
12+
jobs:
13+
call-starter-workflow:
14+
uses: keyfactor/actions/.github/workflows/starter.yml@v2
3415
secrets:
35-
token: ${{ secrets.APPROVE_README_PUSH }}
36-
37-
call-update-catalog-workflow:
38-
needs: get-manifest-properties
39-
if: needs.get-manifest-properties.outputs.update_catalog == 'True' && (github.event_name == 'push' || github.event_name == 'workflow_dispatch')
40-
uses: Keyfactor/actions/.github/workflows/update-catalog.yml@main
41-
secrets:
42-
token: ${{ secrets.SDK_SYNC_PAT }}
16+
token: ${{ secrets.V2BUILDTOKEN}}
17+
APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}}
18+
gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }}
19+
gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }}

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,29 @@
1+
12
# CyberArk PAM Provider
23

34
A Keyfactor PAM Provider plugin supporting credential retrieval with a CyberArk Credential Provider. The Central Credential Provider (cloud-hosted) can be used, or the standard Credential Provider with installed SDK.
45

56
#### Integration status: Production - Ready for use in production environments.
67

7-
88
## About the Keyfactor PAM Provider
99

1010
Keyfactor supports the retrieval of credentials from 3rd party Privileged Access Management (PAM) solutions. Secret values can normally be stored, encrypted at rest, in the Keyfactor Platform database. A PAM Provider can allow these secrets to be stored, managed, and rotated in an external platform. This integration is usually configured on the Keyfactor Platform itself, where the platform can request the credential values when needed. In certain scenarios, a PAM Provider can instead be run on a remote location in conjunction with a Keyfactor Orchestrator to allow credential requests to originate from a location other than the Keyfactor Platform.
1111

12-
1312
## Support for CyberArk PAM Provider
1413

1514
CyberArk PAM Provider is supported by Keyfactor for Keyfactor customers. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com
1615

1716
###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab.
1817

19-
2018
---
2119

22-
23-
24-
2520
#### Compatibility
2621
This release was tested against CyberArk version 12.6.
2722
Using this on a Universal Orchestrator requires UO version 10.1 or greater.
23+
---
24+
25+
26+
2827

2928
### Initial Configuration of PAM Provider
3029
In order to allow Keyfactor to use the new CyberArk PAM Provider, the definition needs to be added to the application database.
@@ -176,3 +175,4 @@ After it is set up, you can now use your PAM Provider when configuring certifica
176175

177176

178177

178+

integration-manifest.json

Lines changed: 86 additions & 84 deletions
Original file line numberDiff line numberDiff line change
@@ -1,89 +1,91 @@
11
{
2-
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
3-
"integration_type": "pam",
4-
"name": "CyberArk PAM Provider",
5-
"status": "production",
6-
"support_level": "kf-supported",
7-
"link_github": false,
8-
"description": "A Keyfactor PAM Provider plugin supporting credential retrieval with a CyberArk Credential Provider. The Central Credential Provider (cloud-hosted) can be used, or the standard Credential Provider with installed SDK.",
9-
"about": {
10-
"pam": {
11-
"providerName": "CyberArk Central Credential Provider",
12-
"assemblyName": "cyberark-credentialprovider-pam",
13-
"dbName": "CyberArk-CentralCredentialProvider",
14-
"fullyQualifiedClassName": "Keyfactor.Extensions.Pam.CyberArk.CentralCredentialProviderPAM",
15-
"pam_types": {
16-
"CyberArk-CentralCredentialProvider": {
17-
"Name": "CyberArk-CentralCredentialProvider",
18-
"Parameters": [
19-
{
20-
"Name": "AppId",
21-
"DisplayName": "Application ID",
22-
"DataType": 1,
23-
"InstanceLevel": false
24-
},
25-
{
26-
"Name": "Host",
27-
"DisplayName": "CyberArk Host and Port",
28-
"DataType": 1,
29-
"InstanceLevel": false
30-
},
31-
{
32-
"Name": "Site",
33-
"DisplayName": "CyberArk API Site",
34-
"DataType": 1,
35-
"InstanceLevel": false
36-
},
37-
{
38-
"Name": "Safe",
39-
"DisplayName": "Safe",
40-
"DataType": 1,
41-
"InstanceLevel": true
42-
},
43-
{
44-
"Name": "Folder",
45-
"DisplayName": "Folder",
46-
"DataType": 1,
47-
"InstanceLevel": true
48-
},
49-
{
50-
"Name": "Object",
51-
"DisplayName": "Object",
52-
"DataType": 1,
53-
"InstanceLevel": true
54-
}
55-
]
56-
},
57-
"CyberArk-SdkCredentialProvider": {
58-
"Name": "CyberArk-SdkCredentialProvider",
59-
"Parameters": [
60-
{
61-
"Name": "AppId",
62-
"DisplayName": "Application ID",
63-
"DataType": 1,
64-
"InstanceLevel": false
65-
},
66-
{
67-
"Name": "Safe",
68-
"DisplayName": "Safe",
69-
"DataType": 1,
70-
"InstanceLevel": true
71-
},
72-
{
73-
"Name": "Folder",
74-
"DisplayName": "Folder",
75-
"DataType": 1,
76-
"InstanceLevel": true
77-
},
78-
{
79-
"Name": "Object",
80-
"DisplayName": "Object",
81-
"DataType": 1,
82-
"InstanceLevel": true
83-
}
84-
]
85-
}
2+
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
3+
"integration_type": "pam",
4+
"name": "CyberArk PAM Provider",
5+
"status": "production",
6+
"support_level": "kf-supported",
7+
"link_github": false,
8+
"update_catalog": true,
9+
"release_dir": "cyberark-credentialprovider-pam/bin/Release/netstandard2.0",
10+
"description": "A Keyfactor PAM Provider plugin supporting credential retrieval with a CyberArk Credential Provider. The Central Credential Provider (cloud-hosted) can be used, or the standard Credential Provider with installed SDK.",
11+
"about": {
12+
"pam": {
13+
"providerName": "CyberArk Central Credential Provider",
14+
"assemblyName": "cyberark-credentialprovider-pam",
15+
"dbName": "CyberArk-CentralCredentialProvider",
16+
"fullyQualifiedClassName": "Keyfactor.Extensions.Pam.CyberArk.CentralCredentialProviderPAM",
17+
"pam_types": {
18+
"CyberArk-CentralCredentialProvider": {
19+
"Name": "CyberArk-CentralCredentialProvider",
20+
"Parameters": [
21+
{
22+
"Name": "AppId",
23+
"DisplayName": "Application ID",
24+
"DataType": 1,
25+
"InstanceLevel": false
26+
},
27+
{
28+
"Name": "Host",
29+
"DisplayName": "CyberArk Host and Port",
30+
"DataType": 1,
31+
"InstanceLevel": false
32+
},
33+
{
34+
"Name": "Site",
35+
"DisplayName": "CyberArk API Site",
36+
"DataType": 1,
37+
"InstanceLevel": false
38+
},
39+
{
40+
"Name": "Safe",
41+
"DisplayName": "Safe",
42+
"DataType": 1,
43+
"InstanceLevel": true
44+
},
45+
{
46+
"Name": "Folder",
47+
"DisplayName": "Folder",
48+
"DataType": 1,
49+
"InstanceLevel": true
50+
},
51+
{
52+
"Name": "Object",
53+
"DisplayName": "Object",
54+
"DataType": 1,
55+
"InstanceLevel": true
8656
}
57+
]
58+
},
59+
"CyberArk-SdkCredentialProvider": {
60+
"Name": "CyberArk-SdkCredentialProvider",
61+
"Parameters": [
62+
{
63+
"Name": "AppId",
64+
"DisplayName": "Application ID",
65+
"DataType": 1,
66+
"InstanceLevel": false
67+
},
68+
{
69+
"Name": "Safe",
70+
"DisplayName": "Safe",
71+
"DataType": 1,
72+
"InstanceLevel": true
73+
},
74+
{
75+
"Name": "Folder",
76+
"DisplayName": "Folder",
77+
"DataType": 1,
78+
"InstanceLevel": true
79+
},
80+
{
81+
"Name": "Object",
82+
"DisplayName": "Object",
83+
"DataType": 1,
84+
"InstanceLevel": true
85+
}
86+
]
8787
}
88+
}
8889
}
90+
}
8991
}

0 commit comments

Comments
 (0)