I’ve been looking at documentation on authentication tools provided by CyberArk for integration with DAP (link). Do any of the CyberArk Authenticator tools provide a mechanism to combat application tampering? If so, how do they analyze the calling application? For example, do they scan the application source code or container?
Hi Louis,
Currently in DAP/Conjur we do not have a mechanism to combat application tampering.
So with that being said, if application tampering is a concern you can use CP (which is an agent that lives on the VM the application is deployed) to validate specific binary hash.
More information regarding hash can be found here:
https://docs.cyberark.com/Product-Doc/OnlineHelp/AAM-CP/Latest/en/Content/CP%20and%20ASCP/Generating-Application-Hash-Value.htm?TocPath=Administration|Application%20management|Application%20authentication|Application%20authentication%20methods|Authenticate%20with%20a%20hash%20value|_____1
Let me know if you have any other questions.
Thanks,
Andrew
This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.