Overview: Venafi VSatellites
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
Overview: Venafi VSatellites
VSatellites are a new, novel and critical part of Next-Gen Trust Security,
CyberArk's cloud-native machine identity management service.
VSatellites extend the reach of your Next-Gen Trust Security account beyond
publicly accessible networks and hosts, to your on-premise/private
cloud networks and machines, enabling you to develop the full
picture of your machine identities across your organization,
irrespective of public or private visibility.
At the most basic level, Venafi VSatellite is a self-updating
application that is a runtime extension of Next-Gen Trust Security that runs within
your private infrastructure.
VSatellite is a modern, self-contained, low-footprint,
Kubernetes-based application runtime and runs on popular
Linux systems.
You manage your own VSatellites remotely using your company's own
Next-Gen Trust Security account. So, after your administrators have completed a
one-time download and setup of VSatellites on your designated
machines (Linux), full administration and management of services
for those VSatellites is performed from using the Next-Gen Trust Security web
console. This includes self-updates of the VSatellite runtime itself.
What's Next?
Learn how to set up your first VSatellite,
or if you've already done so, learn more about managing your existing
VSatellites.
Or you can learn a bit more about how VSatellites actually work,
including the moving parts.