The CyberArk integration enables your security and compliance teams to synchronize personnel into Drata and provision user accounts.
This connection helps automate identity-related compliance controls and lays the foundation for enabling SSO (Single Sign-On) through CyberArk.
Key Capabilities
Personnel sync: Continuously imports users and groups into Drata, populating the Personnel page with identity source-of-truth data.
Control support: Enables authentication-related compliance controls (e.g., MFA enforcement, unique email)
Foundational for SSO: Single Sign-On (SSO) cannot be configured until an IdP is connected
This integration powers identity-based compliance tests like Test 86: MFA on Identity Provider and Test 96: Employees have Unique Email Accounts.
Prerequisites & Data Access
CyberArk Admin access: Ability to configure SCIM roles and create OAuth2 clients
Drata role requirement: Admin, Workspace Manager, or DevOps Engineer. Access Reviewers can only view the Connections page
Email domain match: If your organization uses multiple domains and hasn't enabled multi-domain sync, contact our support team to activate this capability
Permissions & Data Table
Permission/Scope | Why It’s Needed |
Tenant URL | Used to establish secure access to your CyberArk instance |
OAuth App ID | Used to construct the authorization endpoint |
Client ID / Secret | Authenticates Drata to retrieve user identity data |
Step-by-Step Setup
Step 1: Get Your CyberArk Tenant URL
Log in to your CyberArk portal
Copy the full URL used to access the portal. This is your Tenant URL
Expected outcome: You have the base URL required to connect your instance to Drata.
Step 2: Create the SCIM Client Role
In the Admin Portal, go to Core Services → Roles
Click Add Role, name it
SCIM Client, and saveUnder Administrative Rights, add
User Management.Do not select Read Only User Management
Expected outcome: This role will be used in the next step to grant the OAuth client permission to sync users.
Step 3: Register an OAuth2 Client
Navigate to Apps & Widgets → Web Apps.
Click Add Web Apps.
Under the Custom tab, select OAuth2 Client.
Click Yes to confirm.
On the Settings page, set the Application ID to a value you choose (example:
scim_oauth_client).On the Tokens page:
Token Type: JwtRS256
Auth Methods: Client Creds
Access token lifetime: 5 hours
On the Scope page, add and create:
Name: SCIMAPIScope
Allowed REST APIs: scim
On the Permissions page, add the SCIM Client role from the previous section.
Ensure Run permission is checked.
Click Save.
Expected outcome: The Application ID you created (example: scim_oauth_client) must be entered into Drata during the connection process.
Step 4: Create a Service User in CyberArk
Go to Core Services → Users
Create a new user
Login name becomes your Client ID
Password becomes your Client Secret
Enable the option: Is OAuth Confidential Client
Return to the
SCIM Clientrole and add this new user under Members
Expected outcome: The Client ID and Secret you created (example: scim_oauth_client) must be entered into Drata during the connection process.
Step 5: Connect CyberArk in Drata
Navigate to the available connections on your Connections page
Search for CyberArk and start the connection process
Enter the following when prompted:
Tenant URL
OAuth Application ID
Client ID
Client Secret
Expected outcome: Personnel begin syncing into Drata from CyberArk. Initial sync may take up to 1 hour.
Step 6: Limit Sync to a Specific CyberArk Role (Optional)
You can scope the sync to a specific SCIM role in CyberArk:
Go to your CyberArk connection in Drata.
Select the edit icon next to Setup details.
Enter the exact name of the SCIM role you want to sync.
Make sure your Drata administrator is a member of this role.
Important:
Role names must be entered exactly. If the name doesn't match, Drata will default to syncing all users.
Once corrected, any users outside the designated role will be marked as Former Employee in Drata.
Nested roles are not supported. Only direct members of the specified role are synced.
Expected outcome: Drata limits personnel sync to the specified role.
Important Notes
Test 86: MFA on Identity Provider Limitations
The CyberArk API does not expose WebAuthn factors. Users using WebAuthn will fail Test 86: MFA on Identity Provider unless:
You upload MFA evidence manually in Drata, or
You assign an alternative supported MFA method
