Skip to content

Commands examples

This page lists some useful CLI examples.

Note

You can disable certificate validation for login to an authenticator using the --disable-certificate-verification flag. This option is not recommended.

Useful environment variables

  • ARK_PROFILE: Sets the profile to be used across the CLI
  • ARK_DISABLE_CERTIFICATE_VERIFICATION: Disables certificate verification for REST APIs

Configure command example

The configure command works in interactive or silent mode. When using silent mode, the required parameters need to specified. Here's an example of configuring ISP in silent mode:

ark configure --profile-name="PROD" --work-with-isp --isp-username="tina@cyberark.cloud.12345" --silent --allow-output

Login commands example

The login command can work in interactive or silent mode. Here's an example of a silent login with the profile configured in the example above:

ark login -s --isp-secret=CoolPasswordß --profile-name PROD

Exec command examples

Use the --help flag to view all exec options.

Generate a short-lived SSO password for a database connection

ark exec sia sso short-lived-password

Generate a short-lived SSO password for an RDP connection

ark exec sia sso short-lived-password --service DPA-RDP

Generate a short-lived SSO Oracle wallet for an Oracle database connection

ark exec sia sso short-lived-oracle-wallet --folder ~/wallet

Generate a kubectl config file

ark exec sia k8s generate-kubeconfig 

Generate a kubectl config file and save it in the specified path

ark exec sia k8s generate-kubeconfig --folder=/Users/My.User/.kube

Add SIA VM target set

1
ark exec sia workspaces target-sets add-target-set --name mydomain.com --type Domain

Add SIA VM secret

1
ark exec sia secrets vm add-secret --secret-type ProvisionerUser --provisioner-username=myuser --provisioner-password=mypassword

Generate new SSH CA key version

ark exec sia ssh-ca generate-new-ca

Deactivate previous SSH CA key version

ark exec sia ssh-ca deactivate-previous-ca

Reactivate previous SSH CA key version

ark exec sia ssh-ca reactivate-previous-ca

List CMGR connector pools

1
ark exec cmgr list-pools

Add CMGR network

1
ark exec cmgr add-network --name mynetwork

Add CMGR connector pool

1
ark exec cmgr add-pool --name mypool --assigned-network-ids mynetwork_id

Get connector installation script

1
ark exec sia access connector-setup-script --connector-type ON-PREMISE --connector-os windows --connector-pool-id 588741d5-e059-479d-b4c4-3d821a87f012

Install a connector on windows remotely

1
ark exec sia access install-connector --connector-pool-id 89b4f0ff-9b06-445a-9ca8-4ca9a4d72e8c --username myuser --password mypassword --target-machine 1.2.3.4 --connector-os windows --connector-type ON-PREMISE

Install a connector on linux with private key remotely

1
ark exec sia access install-connector --connector-pool-id 89b4f0ff-9b06-445a-9ca8-4ca9a4d72e8c --username myuser --private-key-path /path/to/private_key.pem --target-machine 1.2.3.4 --connector-os linux --connector-type ON-PREMISE

Uninstall a connector remotely

1
ark exec sia access uninstall-connector --connector-id CMSConnector_588741d5-e059-479d-b4c4-3d821a87f012_1a8b3734-8e1d-43a3-bb99-8a587609e653 --username myuser --password mypassword --target-machine 1.2.3.4 --connector-os windows

Create a pCloud Safe

1
ark exec pcloud safes add-safe --safe-name=safe

Create a pCloud account

1
ark exec pcloud accounts add-account --name account --safe-name safe --platform-id='UnixSSH' --username root --address 1.2.3.4 --secret-type=password --secret mypass

Retrieve a pCloud account credentials

1
ark exec pcloud accounts get-account-credentials --account-id 11_1

Create an Identity user

1
ark exec identity users create-user --roles "DpaAdmin" --username "myuser"

Create an Identity role

1
ark exec identity roles create-role --role-name myrole

List all directories identities

1
ark exec identity directories list-directories-entities

Add SIA database secret

ark exec sia secrets db add-secret --secret-name mysecret --secret-type username_password --username user --password mypass

Delete SIA database secret

ark exec sia secrets db delete-secret --secret-name mysecret

Add SIA database

ark exec sia workspaces db add-database --name mydatabase --provider-engine aurora-mysql --read-write-endpoint myrds.com

Delete SIA database

ark exec sia workspaces db delete-database --id databaseid

Get Secrets Hub Configuration

ark exec sechub configuration get-configuration

Set Secrets Hub Configuration

ark exec sechub configuration set-configuration --sync-settings 360

Get Secrets Hub Filters

ark exec sechub filters get-filters --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667

Add Secrets Hub Filter

ark exec sechub filters add-filter --type "PAM_SAFE" --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667 --data-safe-name "example-safe"

Delete Secrets Hub Filter

ark exec sechub filters delete-filter --filter-id filter-7f3d187d-7439-407f-b968-ec27650be692 --store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667

Get Secrets Hub Scans

ark exec sechub scans get-scans

Trigger Secrets Hub Scan

ark exec sechub scans trigger-scan --id default --secret-stores-ids store-e488dd22-a59c-418c-bbe3-3f061dd9b667 type secret-store

Create Secrets Hub Secret Store

ark exec sechub secret-stores create-secret-store --type AWS_ASM --description sdk-testing --name "SDK Testing" --state ENABLED --data-aws-account-alias ALIAS-NAME-EXAMPLE --data-aws-region-id us-east-1 --data-aws-account-id 123456789123 --data-aws-rolename Secrets-Hub-IAM-Role-Name-Created-For-Secrets-Hub

Retrieve Secrets Hub Secret Store

ark exec sechub secret-stores get-secret-store --secret-store-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667

Update Secrets Hub Secret Store

ark exec sechub secret-stores update-secret-store --secret-store-id store-7f3d187d-7439-407f-b968-ec27650be692 --name "New Name" --description "Updated Description" --data-aws-account-alias "Test2"

Delete Secrets Hub Secret Store

ark exec sechub secret-stores delete-secret-store --secret-store-id store-fd11bc7c-22d0-4d9b-ac1b-f8458161935f

Get Secrets Hub Secrets

ark exec sechub secrets get-secrets

Get Secrets Hub Secrets using a filter

ark exec sechub secrets get-secrets-by --limit 5 --projection EXTEND --filter "name CONTAINS EXAMPLE"

Get Secrets Hub Service Information

ark exec sechub service-info get-service-info

Get Secrets Hub Sync Policies

ark exec sechub sync-policies get-sync-policies

Get Secrets Hub Sync Policy

ark exec sechub sync-policies get-sync-policy --policy-id policy-7f3d187d-7439-407f-b968-ec27650be692 --projection EXTEND

Create Secrets Hub Sync Policy

ark exec sechub sync-policies create-sync-policy --name "New Sync Policy" --description "New Sync Policy Description" --filter-type PAM_SAFE --filter-data-safe-name EXAMPLE-SAFE-NAME --source-id store-e488dd22-a59c-418c-bbe3-3f061dd12367 --target-id store-e488dd22-a59c-418c-bbe3-3f061dd9b667

Delete Secrets Hub Sync Policy

ark exec sechub sync-policies delete-sync-policy --policy-id policy-7f3d187d-7439-407f-b968-ec27650be692

List Sessions

ark exec sm list-sessions

Count Sessions

ark exec sm count-sessions

List Sessions By Filter

1
ark exec sm list-sessions-by --search "duration LE 01:00:00"

Count Sessions By Filter

ark exec sm count-sessions-by --search "command STARTSWITH ls"

Get Session

ark exec sm get-session --session-id my-id

List Session Activities

ark exec sm list-session-activities --session-id my-id

Count Session Activities

ark exec sm count-session-activities --session-id my-id

List Session Activities By Filter

ark exec sm list-session-activities-by --session-id my-id --command-contains "ls"

Count Session Activities By Filter

ark exec sm count-session-activities-by --session-id my-id --command-contains "chmod"