Skip to main content

Agent Configuration

Identity Manager Agent's configuration includes connection information to the managed systems and to the Server. Protection of sensitive credentials can be achieved through RSA encryption, storing information within a CyberArk Vault, or using an Azure Key Vault safe.

Configuration Files

The Agent configuration uses two sets of settings: the agent appsettings set and the appsettings.agent set.

  1. The appsettings set is written either to the Agent's working directory appsettings.json file or as environment variables.
  2. The appsettings.agent set is written as environment variables or to the appsettings.agent.json files from the Agent's working directory.
  3. There are two additional files involved in the Agent's configuration to protect sensitive data: appsettings.encrypted.agent.json and appsettings.cyberark.agent.json.

Protect Credentials

Managed system credentials are sensitive information. Identity Manager offers three strategies to protect sensitive data.

RSA encryption

Any Agent configuration setting value can be encrypted using Usercube-Protect-X509JsonValue and Usercube-Protect-X509JsonFile tools. An encrypted value is then written to the appsettings.encrypted.agent.json file.

It means that any sensitive setting value that the user chooses to protect this way won't be written to the appsettings.agent.json file but to the appsettings.encrypted.agent.json file.

CyberArk Vault

Any Agent configuration setting value can be encrypted using Identity Manager's CyberArk integration.

To put it simply, any sensitive setting value that the user chooses to protect this way won't be written to the appsettings.agent.json file but stored within a CyberArk Vault.

Azure Key Vault safe

Any Agent configuration setting value can be encrypted using Identity Manager's Azure Key Vault integration.

To put it simply, any sensitive setting value that the user chooses to protect this way won't be written to the appsettings.agent.json file but stored within an Azure Key Vault safe.

Merge Priority

Because of the credential protection system, the Agent connection information to managed systems can be written to the following configuration sources:

Each configuration source is loaded one after the other, in the following order:

  1. appsettings.agent.json
  2. appsettings.encrypted.agent.json
  3. Azure Key Vault safe
  4. CyberArk Vault
  5. appsettings.connection.json

If a json key is defined in multiple configuration source, only the last loaded json key is preserved to build the final configuration.