After the future removal of the classic playbook editor, your existing classic playbooks will continue to run, However, you will no longer be able to visualize or modify existing classic playbooks.
For details, see:
Manage your organization's credentials with a password vault
Use credential vaults to centrally manage and monitor credential usage in your organization. supports the following password vaults:
- CyberArk Vault Privileged Access Manager
- Hashicorp Vault
- Thycotic Secret Server
As an administrator, you can configure to retrieve credentials from these vaults and use them with in assets.
- When used in conjunction with the Splunk SOAR Automation Broker, the Automation Broker will authenticate directly with your supported privileged access manager and retrieve credentials to use with assets.
- If an asset is configured on the Splunk SOAR instance and does not require the Automation Broker, then Splunk SOAR will authenticate with the supported privileged access manager and retrieve credentials to use with assets.
Use CyberArk Vault Privileged Access Manager with
Integrate with CyberArk's Vault cloud-based Privileged Access Manager feature to retrieve passwords or other fields for assets. This allows you to utilize CyberArk account management features to change passwords on managed products and services without having to manually update assets after a password change.
Before you begin, you need to be or be working with your organization's CyberArk administrator. Collect the following items:
- The URL to your organizations CyberArk Vault.
- Your organizations CyberArk Vault username and password.
- The pkcs12 certificate and certificate password for your organizations CyberArk Vault.
- This certificate file must be located on the file system.
To use CyberArk Vault with , perform the following steps:
- From the main menu, select Administration.
- Select Administration Settings, then Password Vault.
- In the Manager field, select CyberArk Vault.
- Type the entries for the following fields:
- URL
- Username
- Password
- Certificate password
- Upload your certificate file:
- Click Choose File then select the pkcs12 certificate file from your filesystem.
- Click Save Changes.
Use Hashicorp Vault with
supports Hashicorp Vault's KV store REST API version 2.
To use Hashicorp Vault with , perform the following steps:
- From the main menu, select Administration.
- Select Administration Settings, then Password Vault.
- In the Manager field, select Hashicorp Vault.
- Get the URL and Token from your Hashicorp administrator.
- Select the Verify server certificate check box to verify that the HTTPS certificate is trusted.
- Click Save Changes.
Once you have Hashicorp access configured, you need to know the paths and names of the secrets you want to use from the Hashicorp Vault.
Use Hashicorp Vault to provide credentials with assets
You can use Hashicorp to automatically supply credentials when working with assets.
- From the main menu, select Apps.
- In the list of apps, find one to configure such as the Palo Alto Networks Firewall and click Configure New Asset.
- Open the Asset Settings tab for that asset.
- Click Advanced to expand the advanced configuration section.
- In the Credential Management section, select the fields you want to get from Hashicorp Vault, and the path and key to use. For example, you can specify /secret/autofocus in the Path field and apikey in the Key field to retrieve an API key used to authenticate to the AutoFocus service.
- Click Save.
Use Thycotic Secret Server with
can use Thycotic's API to access secrets managed by Secret Server. Usernames and passwords can be stored in Thycotic Secret Server for both users and assets which require a login to use.
Splunk SOAR (Cloud) does not support Delinea Secret Server, a product which replaces Thycotic Secret Server.
In order for to use secrets managed by Thycotic Secret Server you must provide:
- The URL to your organization's Thycotic Secret Server. You only need to include a port number in the URL if the Thycotic Secret Server is unreachable without a port number. Certain network and server configurations might require you to include port numbers in the URL.
https://<your.organization's.secret.server>:<port number>
- The username and password of the account which will retrieve secrets using the API.
- Optional: The Organization ID set in Secret Server for use in the Thycotic Secret Server API.
These values are used to make an oauth2 token for Thycotic Secret Server. Once authenticated, uses the SearchSecretsByFolder
API to access the managed secrets.
Set the login secret in Thycotic Secret Server
You must set up the login information in Secret Server before you can use it to access . For more information on Thycotic Secret Server, see the documentation on the Thycotic website.
- Create the required folders.
- Use the Create Secret widget, selecting the template as Password.
- Enter the required items in the mandatory fields of secret and Password.
Set the Thycotic Secret Server settings in
Add the required information to create the oauth2 token for Thycotic Secret Server in 's administration settings. This token is for connecting to Thycotic Secret Server.
- From the Main Menu, select Administration.
- Select Administration Settings > Password Vault.
- Select Thycotic Secret Server from the drop-down list in the Manager field.
- Set the URL fpr your Thycotic Secret Server instance.
- Specify the username and password will use to access secrets.
- Optional: Set the organization id.
- Click Save Changes.
If you have assets that require logins, and those logins are managed by Thycotic Secret Server, then you must set credential management in the asset's configuration, in Apps > <Asset Name> > Asset Settings > Advanced.
Configure Google Maps for visual geolocation data | Set global environment variables |
This documentation applies to the following versions of Splunk® SOAR (Cloud): current
Feedback submitted, thanks!