...
CyberArk credential requires two inputs as described below.
Input Name | Notes |
---|---|
Application Id | Application id and Query Text are used to retrieve secret from CyberArk AAM. |
Query | Query Text for credential. For example, Safe=Linux%20Accounts;Folder=root;Object=secret |
Here is how edit credential looks like.
...