Documentation
ConnectorsCyberArk

CyberArk

Connect CyberArk Privileged Access Manager to Compass for PAM analysis.

The CyberArk connector integrates with CyberArk Privilege Access Manager to pull privileged access metrics, vault inventory, and session management data.

Prerequisites

  • CyberArk PAM with PVWA (Password Vault Web Access) accessible
  • A user account with auditor or read-only permissions

Setup

1. Create a Read-Only User

We recommend creating a dedicated service account with the minimum required permissions:

  1. In CyberArk, create a new user "CompassDiscovery"
  2. Assign the Auditors group (or a custom group with read-only vault permissions)
  3. Ensure the user can:
    • List safes and accounts
    • View account properties (but not retrieve passwords)
    • Access audit logs and session recordings metadata

2. Add to Compass

  1. Go to Settings > Connectors in Compass
  2. Click Add Connector > CyberArk
  3. Enter:
    • PVWA URL — Your CyberArk PVWA URL (e.g., https://pvwa.yourcompany.com)
    • Username — The service account username
    • Password — The service account password
  4. Click Test Connection
  5. Save

Metrics Collected

CategoryMetrics
Vaults & SafesTotal safes, accounts per safe, safe utilisation
Privileged AccountsTotal count, account types, accounts without rotation
Credential RotationRotation compliance, average rotation age, overdue rotations
SessionsSession recording coverage, average session duration, suspicious sessions
Access ControlUsers with vault access, permission distribution, break-glass account usage

Troubleshooting

Connection refused

Ensure your firewall allows connections from Compass to your PVWA endpoint. For on-premises deployments, you may need to set up a secure tunnel or use the Enterprise on-prem deployment option.

Insufficient permissions

The service account needs safe-level read permissions. If metrics are missing for certain safes, check that the CompassDiscovery user has been added to those safes with at least "List" permissions.