Skip to content

Connection for CyberArk Certificate Manager authentication to Certificate Manager - Self-Hosted or Venafi Control Plane

Connection for CyberArk Certificate Manager (formerly known as Venafi Connection) provides a variety of authentication options to connect your Kubernetes cluster to the CyberArk. The following table gives a basic overview of these options compared with each other.

Product Authentication Method Credential Storage Maintenance
Connection for CyberArk Certificate Manager Workload Identity Federation using the OIDC protocol. Dynamically generated short-lived tokens. One-time set-up per cluster (scriptable).
Access Token Long-lived access tokens stored in Kubernetes secrets or HashiCorp Vault Requires periodic token rotation.
Username/Password Long-lived username and password credentials stored in Kubernetes secrets or HashiCorp Vault. Requires periodic password rotation.
Open-source cert-manager Access Token Long-lived access tokens stored in Kubernetes secrets. Requires periodic token rotation

The following sections describe the advantages and disadvantages of each approach Connection resource uses.

Configuring authentication using workload identity federation

Workload identity federation allows CyberArk components for Kubernetes, such as Enterprise Issuer for CyberArk Certificate Manager, to authenticate with Venafi Control Plane securely without having to manage and secure long-lived credentials (like passwords or API keys). Instead, Kubernetes can function as an OIDC provider such that Venafi Control Plane can validate its service account tokens using JWT/OIDC authentication.

This is a secretless method for authenticating with Certificate Manager - Self-Hosted or Venafi Control Plane. With this method, you don't require an access token or password. In the case of Certificate Manager - Self-Hosted this method is limited to Certificate Manager - Self-Hosted 22.4 or later.

This method also has the advantage of being a one-time setup and no credentials need to be passed between your teams.

This option offers the best choice for managing authentication as there are no long-lived credentials at all. Learn more

Configuring authentication using HashiCorp Vault

You have two other options when configuring Connection for CyberArk Certificate Manager to work with HashiCorp Vault:

  • Authenticating to Certificate Manager - Self-Hosted using a username and password stored in HashiCorp Vault.
  • Authenticating to Certificate Manager - Self-Hosted using a username and password stored in LDAP by means of HashiCorp Vault's LDAP Secret Engine.

This method however also requires periodic manual rotation of passwords. Learn more

Configuring authentication using Kubernetes Secrets

This is the simplest authentication mechanism. In this case, the Certificate Manager - Self-Hosted access token, Certificate Manager - Self-Hosted username and password, or Venafi-as-a-Service API Key are loaded from a Kubernetes secret.

This method however requires manual rotation of tokens/passwords. Learn more