Commands examples
This page lists some useful CLI examples.
Note
You can disable certificate validation for login to an authenticator using the --disable-certificate-verification
flag. This option is not recommended.
Useful environment variables
ARK_PROFILE
: Sets the profile to be used across the CLI
ARK_DISABLE_CERTIFICATE_VERIFICATION
: Disables certificate verification for REST APIs
The configure
command works in interactive or silent mode. When using silent mode, the required parameters need to specified. Here's an example of configuring ISP in silent mode:
ark configure --profile-name="PROD" --work-with-isp --isp-username="tina@cyberark.cloud.12345" --silent --allow-output
Login commands example
The login command can work in interactive or silent mode. Here's an example of a silent login with the profile configured in the example above:
ark login -s --isp-secret=CoolPasswordĂ --profile-name PROD
Exec command examples
Use the --help
flag to view all exec
options.
Generate a short-lived SSO password for a database connection
ark exec sia sso short-lived-password
Generate a short-lived SSO password for an RDP connection
ark exec sia sso short-lived-password --service DPA-RDP
Generate a short-lived SSO Oracle wallet for an Oracle database connection
ark exec sia sso short-lived-oracle-wallet --folder ~/wallet
Generate a kubectl config file
ark exec sia k8s generate-kubeconfig
Generate a kubectl config file and save it in the specified path
ark exec sia k8s generate-kubeconfig --folder=/Users/My.User/.kube
Add SIA VM target set
| ark exec sia workspaces target-sets add-target-set --name mydomain.com --type Domain
|
Add SIA VM secret
| ark exec sia secrets vm add-secret --secret-type ProvisionerUser --provisioner-username=myuser --provisioner-password=mypassword
|
Generate new SSH CA key version
ark exec sia ssh-ca generate-new-ca
Deactivate previous SSH CA key version
ark exec sia ssh-ca deactivate-previous-ca
Reactivate previous SSH CA key version
ark exec sia ssh-ca reactivate-previous-ca
List CMGR connector pools
Add CMGR network
| ark exec cmgr add-network --name mynetwork
|
Add CMGR connector pool
| ark exec cmgr add-pool --name mypool --assigned-network-ids mynetwork_id
|
Get connector installation script
| ark exec sia access connector-setup-script --connector-type ON-PREMISE --connector-os windows --connector-pool-id 588741d5-e059-479d-b4c4-3d821a87f012
|
Install a connector on windows remotely
| ark exec sia access install-connector --connector-pool-id 89b4f0ff-9b06-445a-9ca8-4ca9a4d72e8c --username myuser --password mypassword --target-machine 1.2.3.4 --connector-os windows --connector-type ON-PREMISE
|
Install a connector on linux with private key remotely
| ark exec sia access install-connector --connector-pool-id 89b4f0ff-9b06-445a-9ca8-4ca9a4d72e8c --username myuser --private-key-path /path/to/private_key.pem --target-machine 1.2.3.4 --connector-os linux --connector-type ON-PREMISE
|
Uninstall a connector remotely
| ark exec sia access uninstall-connector --connector-id CMSConnector_588741d5-e059-479d-b4c4-3d821a87f012_1a8b3734-8e1d-43a3-bb99-8a587609e653 --username myuser --password mypassword --target-machine 1.2.3.4 --connector-os windows
|
Create a pCloud Safe
| ark exec pcloud safes add-safe --safe-name=safe
|
Create a pCloud account
| ark exec pcloud accounts add-account --name account --safe-name safe --platform-id='UnixSSH' --username root --address 1.2.3.4 --secret-type=password --secret mypass
|
Retrieve a pCloud account credentials
| ark exec pcloud accounts get-account-credentials --account-id 11_1
|
Create an Identity user
| ark exec identity users create-user --roles "DpaAdmin" --username "myuser"
|
Create an Identity role
| ark exec identity roles create-role --role-name myrole
|
List all directories identities
| ark exec identity directories list-directories-entities
|
Add SIA database secret
ark exec sia secrets db add-secret --secret-name mysecret --secret-type username_password --username user --password mypass
Delete SIA database secret
ark exec sia secrets db delete-secret --secret-name mysecret
Add SIA database
ark exec sia workspaces db add-database --name mydatabase --provider-engine aurora-mysql --read-write-endpoint myrds.com
Delete SIA database
ark exec sia workspaces db delete-database --id databaseid
Get Secrets Hub Configuration
ark exec sechub configuration get-configuration
Set Secrets Hub Configuration
ark exec sechub configuration set-configuration --sync-settings 360
Get Secrets Hub Filters
ark exec sechub filters get-filters --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667
Add Secrets Hub Filter
ark exec sechub filters add-filter --type "PAM_SAFE" --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667 --data-safe-name "example-safe"
Delete Secrets Hub Filter
ark exec sechub filters delete-filter --filter-id filter-7f3d187d-7439-407f-b968-ec27650be692 --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667
Get Secrets Hub Scans
ark exec sechub scans get-scans
Trigger Secrets Hub Scan
ark exec sechub scans trigger-scan --id default --secret-stores-ids store-e488dd22-a59c-418c-bbe3-3f061dd9b667 type secret-store
Create Secrets Hub Secret Store
ark exec sechub secret-stores create-secret-store --type AWS_ASM --description sdk-testing --name "SDK Testing" --state ENABLED --data-aws-account-alias ALIAS-NAME-EXAMPLE --data-aws-region-id us-east-1 --data-aws-account-id 123456789123 --data-aws-rolename Secrets-Hub-IAM-Role-Name-Created-For-Secrets-Hub
Retrieve Secrets Hub Secret Store
ark exec sechub secret-stores get-secret-store --secret-store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667
Update Secrets Hub Secret Store
ark exec sechub secret-stores update-secret-store --secret-store-id store-7f3d187d-7439-407f-b968-ec27650be692 --name "New Name" --description "Updated Description" --data-aws-account-alias "Test2"
Delete Secrets Hub Secret Store
ark exec sechub secret-stores delete-secret-store --secret-store-id store-fd11bc7c-22d0-4d9b-ac1b-f8458161935f
Get Secrets Hub Secrets
ark exec sechub secrets get-secrets
Get Secrets Hub Secrets using a filter
ark exec sechub secrets get-secrets-by --limit 5 --projection EXTEND --filter "name CONTAINS EXAMPLE"
ark exec sechub service-info get-service-info
Get Secrets Hub Sync Policies
ark exec sechub sync-policies get-sync-policies
Get Secrets Hub Sync Policy
ark exec sechub sync-policies get-sync-policy --policy-id policy-7f3d187d-7439-407f-b968-ec27650be692 --projection EXTEND
Create Secrets Hub Sync Policy
ark exec sechub sync-policies create-sync-policy --name "New Sync Policy" --description "New Sync Policy Description" --filter-type PAM_SAFE --filter-data-safe-name EXAMPLE-SAFE-NAME --source-id store-e488dd22-a59c-418c-bbe3-3f061dd12367 --target-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667
Delete Secrets Hub Sync Policy
ark exec sechub sync-policies delete-sync-policy --policy-id policy-7f3d187d-7439-407f-b968-ec27650be692
List Sessions
ark exec sm list-sessions
Count Sessions
ark exec sm count-sessions
List Sessions By Filter
| ark exec sm list-sessions-by --search "duration LE 01:00:00"
|
Count Sessions By Filter
ark exec sm count-sessions-by --search "command STARTSWITH ls"
Get Session
ark exec sm get-session --session-id my-id
List Session Activities
ark exec sm list-session-activities --session-id my-id
Count Session Activities
ark exec sm count-session-activities --session-id my-id
List Session Activities By Filter
ark exec sm list-session-activities-by --session-id my-id --command-contains "ls"
Count Session Activities By Filter
ark exec sm count-session-activities-by --session-id my-id --command-contains "chmod"