Skip to content

Commit 085efe4

Browse files
authored
Release v14.4 (#419)
* POC-720: UserData instead of CfnInit (#409) * POC-746: Userdata for cpm config (#413) * POC-747: Userdata for psm config (#414) * POC-748: New userdata for linux components (#415) * SHPVWA-16535: Remove SetLocalService for PVWA (#416) * POC-663: release notes + win2022 + eula (#418)
1 parent b508868 commit 085efe4

10 files changed

+433
-1229
lines changed

CHANGELOG.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,26 @@
1-
# CyberArk AWS Cloud Package Release Notes
1+
# CyberArk PAMonCloud Offering Release Notes
2+
The PAMonCloud Offering includes CyberArk PAM products, delivered as AWS AMIs and Azure images, along with AWS CloudFormation and Azure ARM templates to automate deployment.
23

3-
The AWS Cloud package includes CyberArk PAS products, delivered as AMIs and AWS CloudFormation templates to automate deployment.
44

5+
## [PAMonCloud v14.4] (11.12.2024)
56

6-
## [PAS on Cloud v14.2] (18.6.2024)
7+
### Added
8+
- Windows Server 2022 images are now available for all Windows based components.
9+
- New Terraform deployment offering: The PAMonCloud solution is now available in Terraform for both Azure and AWS, offering more flexibility, self-tailored configurations, cross-region deployments, and the benefits of using the IaC platform. PAMonCloud-terraform modules and examples are publicly available at: [PAMonCloud-Terraform](https://github.com/cyberark/pamoncloud-terraform)
10+
11+
### Changed
12+
- #### AWS :
13+
- Product configuration and registration are now executed as part of the instance's userdata, rather than CloudFormation::Init.
14+
- Product configuration and registration failures are tracked and raised in real-time, rather than only at stack timeout.
15+
- Enhanced CloudWatch logging for better observability during deployment.
16+
- Deployment and configuration time for Windows-based components has been significantly reduced.
17+
18+
### Removed
19+
- #### Azure :
20+
- Removed usage of ManagedIdentityExtensionForWindows.
21+
- Windows components are no longer published based on Windows Server 2016. You can create Win2016-based images using the BYOI solution to suit your needs (subject to product system requirements).
22+
23+
## [PAMonCloud v14.2] (18.6.2024)
724

825
### Changed
926
- #### AWS :

CyberArk Software EULA 20210831.1.pdf

-174 KB
Binary file not shown.

LICENSE.md renamed to LICENSE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Copyright © 2024 CyberArk Software Ltd. All rights reserved.
1+
Copyright © 2025 CyberArk Software Ltd. All rights reserved.
22
<https://cyberark.com>
33

44
Licensed under the Apache License, Version 2.0 (the "License");

README.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
# Overview
2+
We offer comprehensive tools and scripts to facilitate the deployment of CyberArk's Privileged Access Manager (PAM) solution on both Amazon Web Services (AWS) and Microsoft Azure.
23

3-
We provide you with the necessary tools and scripts to deploy CyberArk's Privileged Access Security (PAS) solution on Amazon Web Services (AWS) and Microsoft Azure with one click.
4+
Our templates offer the flexibility to deploy CyberArk PAM in various architectures, including hybrid, multi-cloud, and fully cloud-based environments.
45

5-
The different templates provide you with the flexibility of deploying CyberArk PAS to support your architecture (hybrid, multi-cloud, all in the cloud and etc.).
6-
7-
8-
# Licensing
9-
Copyright © 2024 CyberArk Software Ltd. All rights reserved.
10-
11-
CyberArk’s Privileged Access Security is licensed under the following license terms - "CyberArk Software EULA 20210831.1.pdf". CyberArk’s PAS AWS CloudFormation and Azure Resource Manager (ARM) deployment templates are licensed under Apache License, Version 2.0 - "LICENSE.md".
6+
# Licensing
7+
This repository is subject to the following licenses:
8+
- **CyberArk Privileged Access Manager**: Licensed under the [CyberArk Software EULA](https://www.cyberark.com/EULA.pdf).
9+
- **CyberArk’s PAM AWS CloudFormation and Azure Resource Manager (ARM) deployment templates**: Licensed under the Apache License, Version 2.0 ([LICENSE](https://github.com/cyberark/pas-on-cloud/blob/master/LICENSE)).

aws/DRVault-Single-Deployment.yaml

Lines changed: 40 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -7,26 +7,23 @@ Resources:
77
RetentionInDays: 30
88
DeletionPolicy: Retain
99
UpdateReplacePolicy: Retain
10-
CfnInitLogStream:
10+
VaultDRUserDataLogStream:
1111
Type: AWS::Logs::LogStream
1212
Properties:
1313
LogGroupName: !Sub '${LogGroup}'
14-
LogStreamName: VaultDRMachine/CfnInitLog
15-
UpdateReplacePolicy: Retain
14+
LogStreamName: VaultDRMachine/UserDataLog
1615
DeletionPolicy: Retain
17-
VaultInitLogStream:
16+
VaultDRInitLogStream:
1817
Type: AWS::Logs::LogStream
1918
Properties:
2019
LogGroupName: !Sub '${LogGroup}'
2120
LogStreamName: VaultDRMachine/VaultInitLog
22-
UpdateReplacePolicy: Retain
2321
DeletionPolicy: Retain
24-
VaultPostInstallLogStream:
22+
VaultDRPostInstallLogStream:
2523
Type: AWS::Logs::LogStream
2624
Properties:
2725
LogGroupName: !Sub '${LogGroup}'
2826
LogStreamName: VaultDRMachine/VaultPostInstallLog
29-
UpdateReplacePolicy: Retain
3027
DeletionPolicy: Retain
3128
VaultAmi:
3229
Type: Custom::FindAMI
@@ -50,7 +47,11 @@ Resources:
5047
Type: AWS::CloudFormation::CustomResource
5148
Properties:
5249
ServiceToken: !GetAtt 'StorePasswordLambda.Arn'
53-
Password: !Ref 'Secret'
50+
Password:
51+
Fn::If:
52+
- SecretProvided
53+
- !Ref 'Secret'
54+
- "null"
5455
DependsOn:
5556
- LambdaDeployRole
5657
CleanDRPassword:
@@ -395,7 +396,7 @@ Resources:
395396
396397
while (response['Images'] == []) and (pas_ver_major >= 0):
397398
while (response['Images'] == []) and (pas_ver_minor >= 0):
398-
ami_name = 'CyberArk PAS ' + component + ' v'+str(pas_ver_major) + '.' + str(pas_ver_minor) +'*'+ os_filter
399+
ami_name = 'CyberArk PAM ' + component + ' v'+str(pas_ver_major) + '.' + str(pas_ver_minor) +'*'+ os_filter
399400
response = boto3.client('ec2').describe_images(
400401
Owners= [event['ResourceProperties']['OwnerAccountId']],
401402
Filters=[
@@ -442,61 +443,32 @@ Resources:
442443
- !Ref VaultAmi
443444
- !Ref VaultCustomAmi
444445
InstanceType: !Ref 'VaultInstanceType'
445-
UserData: !Base64
446-
Fn::Sub: |-
447-
<script>
448-
cfn-init.exe -v -s ${AWS::StackId} -r VaultDRMachine --configsets ascending --region ${AWS::Region}
449-
</script>
446+
UserData:
447+
Fn::Base64: !Sub
448+
- |
449+
<powershell>
450+
$UserDataParams = @{
451+
"IsPrimaryOrDR" = "DR"
452+
"Region" = "${AWS::Region}"
453+
"LogGroup" = "${LogGroup}"
454+
"UserDataLogStream" = "${VaultDRUserDataLogStream}"
455+
"VaultInitLogStream" = "${VaultDRInitLogStream}"
456+
"VaultPostInstallLogStream" = "${VaultDRPostInstallLogStream}"
457+
"SSMDRPassParameterID" = "${StoreDRPassword.SsmId}"
458+
"SSMSecretParameterID" = "${SecretSsmId}"
459+
"VaultPrivateIP" = "${VaultPrivateIP}"
460+
"VaultInstancesRole" = "${VaultInstancesRole}"
461+
"VaultHostname" = "${VaultHostname}"
462+
"StackName" = "${AWS::StackName}"
463+
}
464+
C:\CyberArk\Deployment\UserDataScript.ps1 @UserDataParams
465+
</powershell>
466+
- SecretSsmId: !If
467+
- SecretProvided
468+
- !GetAtt StoreSecret.SsmId
469+
- ''
450470
KeyName: !Ref 'KeyName'
451471
IamInstanceProfile: !Ref 'VaultInstancesProfile'
452-
Metadata:
453-
AWS::CloudFormation::Init:
454-
configSets:
455-
ascending:
456-
- configSSMAndHostnameAndTagKMS
457-
- configServices
458-
- configSignal
459-
configSSMAndHostnameAndTagKMS:
460-
services:
461-
windows:
462-
AmazonSSMAgent:
463-
enabled: true
464-
ensureRunning: true
465-
files:
466-
- C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\AWS.EC2.Windows.CloudWatch.json
467-
commands:
468-
1-configCloudWatch:
469-
command: !Sub >
470-
powershell.exe -File C:\CyberArk\Deployment\CloudWatch.ps1
471-
-LogGroup ${LogGroup} -CfnInitLogStream ${CfnInitLogStream}
472-
-VaultPostInstallLogStream ${VaultPostInstallLogStream}
473-
-VaultInitLogStream ${VaultInitLogStream} -Region ${AWS::Region}
474-
2-restartSSM:
475-
command: powershell.exe -Command "Restart-Service AmazonSSMAgent"
476-
waitAfterCompletion: 60
477-
ignoreErrors: true
478-
3-addDNSSuffix:
479-
command: powershell.exe -Command "Set-DnsClientGlobalSetting -SuffixSearchList ((Get-DnsClientGlobalSetting).SuffixSearchList += 'pas.local')"
480-
configServices:
481-
commands:
482-
1-postInstall:
483-
command: !Sub >
484-
powershell.exe -File C:\CyberArk\Deployment\VaultPostInstall.ps1 -SSMDRPassParameterID ${StoreDRPassword.SsmId} -IsPrimaryOrDR "DR" -PrimaryVaultIP ${VaultPrivateIP} -LicensePath "C:\CyberArk\Deployment\vaultLicense.xml" -Region ${AWS::Region} -SSMSecretParameterID ${StoreSecret.SsmId}
485-
waitAfterCompletion: 0
486-
2-changeKMSTag:
487-
command: !Sub >
488-
powershell.exe -File C:\CyberArk\Deployment\VaultTagKMS.ps1 -Role ${VaultInstancesRole} -Region ${AWS::Region}
489-
waitAfterCompletion: 0
490-
3-ChangeHostname:
491-
command: !Sub >
492-
powershell.exe -Command Rename-Computer -NewName ${VaultHostname} -Force -Restart
493-
waitAfterCompletion: forever
494-
configSignal:
495-
commands:
496-
0-signalCompletion:
497-
command: !Sub >
498-
"C:\Program Files\Amazon\cfn-bootstrap\cfn-signal.exe" -e %ERRORLEVEL% --stack ${AWS::StackId} --resource VaultDRMachine --region ${AWS::Region}
499-
waitAfterCompletion: 0
500472
CreationPolicy:
501473
ResourceSignal:
502474
Timeout: PT20M
@@ -513,9 +485,9 @@ Parameters:
513485
Type: String
514486
Description: Select a Windows Server version for all Windows-based components.
515487
AllowedValues:
516-
- Win2016
517488
- Win2019
518-
Default: Win2016
489+
- Win2022
490+
Default: Win2019
519491
VaultCustomAmi:
520492
Type: String
521493
Description: Enter the Vault Image ID, if you wish to use a custom Vault image.
@@ -643,6 +615,10 @@ Metadata:
643615
Secret:
644616
default: DR User Secret
645617
Conditions:
618+
SecretProvided: !Not
619+
- !Equals
620+
- ''
621+
- !Ref Secret
646622
CustomImageEmpty: !Equals
647623
- ''
648624
- !Ref VaultCustomAmi

0 commit comments

Comments
 (0)