CyberArk
Last Updated: April 07, 2026
An identity provider (IdP) uses an authentication token to vouch for a person's identity. Vasion Automate uses IdPs for several tasks, including logging in to the Admin Console and portals, deploying printers, releasing print jobs, and more.
If you use an IdP, the Control Panel Application (CPA) supports only badge and PIN authentication.
Configure Connection
To add and configure app properties for the Vasion Print connection, do the following:
- Create the CyberArk App.
- Add the IdP Settings Template.
- Configure Single Sign-On (SSO).
- Add the X-509 Certificate.
- Complete IdP Settings.
- Configure Provisioning.
- Add Vasion Print Admins.
1. Create the CyberArk App
- In your preferred browser, log in to your CyberArk portal.
-
Select Apps & Widgets, and then select Web Apps.
- On the Web Apps screen, select Add Web Apps in the upper-right corner.
- In the Search tab, search for and select the PrinterLogic app.
-
Select Add.
- In the Add Web App modal, select Yes to add the app.
- Close the Add Web Apps modal.
- Name your app, and select Save.
- Leave the current browser open on the new app screen for the following steps.
2. Add the IdP Settings Template
If the IdP Settings modal does not look like the image below, you may not be using the latest version and should contact Product Support to upgrade your IdP settings.
When configuring this IdP through Vasion Print, select the Custom option from the IdP Template dropdown menu.
- Open your Vasion Print Admin Console in a new browser tab, and log in.
- Select Tools
Settings
General, and scroll down to the Identity Provider Settings section. - Select IdP, and then select Add.
- Select the IdP that you want to configure from the IdP Template dropdown menu.
- Select SAML2 in the Authentication Protocol section.
-
In the Provisioning section, if you are using Systems for Cross-domain Identity Management (SCIM), leave the JIT option deselected.
By default, the Admin Console assumes that you are using SCIM for provisioning. Only select JIT if you are not using SCIM.
- In the Name field, enter the name that you want to appear on the login button for users. For example, My Company, Login, or Acme Corp.
- Scroll down, and select the desired settings:
- Enable for End User Login: Allows end users to log in using this IdP. (Self-service Portal)
- Enable for Admin Login: Allows admins to log in using this IdP. (Admin Console)
- You can select both checkboxes when you are using a single IdP or the admin and end users use the same IdP to log in.
Keep the IdP Settings modal open so that the Service Provider Information section at the bottom is available for the following steps.
3. Configure Single Sign-On (SSO)
- In the CyberArk app, select Trust from the side menu.
- In the Identity Provider Configuration section, select Manual Configuration.
- Copy the CyberArk Sign In URL, and paste it in the Vasion Print Admin Console SSO URL.
- Copy the CyberArk Issuer URL, and paste it in the Admin Console Issuer URL field.
-
Cut the numerical portion (after app/) from the Issuer URL, and paste it in the Admin Console Issuer ID field.
Issuer URL example: https://abc1234.my.idaptive.app/, Issuer ID: a1b2cd34-fb1f-4f71-9248-8675309d/
- Return to the CyberArk app, scroll down to the Service Provider Configuration section, and select Manual Configuration.
- Copy the Admin Console Identifier (Entity ID) URL, and paste it in the CyberArk SP Entity ID/ SP Issuer/Audience field.
- Copy the Admin Console Reply Url (ACS), and paste it in the CyberArk Assertion Consumer Service (ACS) URL field.
- In the CyberArk Recipient section, select the checkbox for Same as ACS URL.
- In the Sign Response or Assertion field, select Assertion.
- Copy the Admin Console Relay State URL, and paste it in the CyberArk Relay State field.
- Select Save in the CyberArk app.
4. Add the X-509 Certificate
- Return to the Identity Provider Configuration section in the CyberArk app, and expand the Signing certificate section.
- Select Download.
- Open the file in your preferred text editor.
-
Copy the certificate body, including the Begin / End headers, and paste it in the X-509 Certificate field in the Vasion Print Admin Console.
- Select Apply in the Admin Console.
- Select Save in the upper-right corner of the General settings.
5. Complete IdP Settings
- In the General settings of the Vasion Print Admin Console, navigate to the Identity Provider Settings section.
-
To have Vasion Print prompt users to authenticate through the IdP when performing any function that requires authorization, such as installing a printer, select the Automatically Open Browser to Login on Desktop Client option.
If you do not select this option, users must manually navigate to the IdP login screen to log in.
-
We recommend enabling the Use Loopback with Saml 2.0 (recommended) option. The IdP needs to provide an authentication token to the desktop Client whenever authentication happens. This option allows the Client to handle the token and automatically log in without interaction from end users.
- The option Use Domain User (Windows only) automatically authorizes domain-joined Windows users and does not require log in via the configured IdPs.
- Select Save in the upper-right corner of the General settings.
6. Configure Provisioning
The provisioning steps vary depending on whether you are using Systems for Cross-domain Identity Management (SCIM) or Just-in-Time (JIT) provisioning. Choose the appropriate option below to view the corresponding steps.
SCIM Provisioning
Enable SCIM Provisioning
- In the CyberArk app, select Provisioning from the side menu.
- Select the checkbox for Enable provisioning for this application, and then select Yes.
- Select Live Mode.
- In the Vasion Print Admin Console, select IdP and then select Modify.
-
In the IdP Settings modal, copy the SCIM Tenant URL from the Service Provider Information section, and then paste it in the CyberArk SCIM Service URL field.
- In the CyberArk Authorization Type section, select Authorization Header. For the header type, select Bearer Token.
- Close the Admin Console IdP Settings modal.
Generate a SCIM Token
- In the Vasion Print General settings, select the SCIM option in the Identity Provider Settings section.
- Select your IdP configuration from the dropdown menu.
-
Select Generate SCIM Token.
Generating a SCIM token invalidates any previous tokens for that IdP.
- Copy the token, close the modal, and select Save in the upper-right corner of the General settings.
- Paste the token in the CyberArk Bearer Token field.
- Select the Verify button to ensure communication.
- In the Sync Options section, enable the settings below:
- Sync (overwrite) users to target application when existing users are found with the same principal name.
- Do not de-provision (deactivate or delete) users in target application when the users are removed from mapped role.
- Sync groups from local directory to target application (this option overrides any destination group selection in Role Mappings).
- Disable user.
- Deprovision (deactivate or delete) users in this application when they are disabled in the source directory.
- Select Save in the CyberArk app.
Add Roles & Users
-
In the CyberArk portal, select Core Services and then Roles from the side menu.
- Select Add Role.
- Name the role Vasion Admin.
- (Optional): Add a description and organization.
- Set the Role Type to Static.
- Select Save.
- From the side menu, select Members.
- Add any users that should have admin rights in Vasion Print to this role.
- From the side menu, select Assigned Applications.
- Select Add, and then locate and add the app that you created.
- Select Save.
Map the Role
JIT Provisioning
JIT does not support the provisioning of group membership associations, so you cannot apply Role-Based Access Control (RBAC) roles, printer deployments, or portal security roles to groups. You must create assignments individually for each user.
When using JIT provisioning, the app creates users during the first login attempt:
- Access your Vasion instance, and select Sign In With <IdP Name>.
- Attempt to log in with your IdP credentials.
-
This login attempt fails and returns you to the login screen.
This behavior is expected. With JIT, this action triggers user creation in the Vasion instance.
- The second login attempt with valid credentials initiates a typical login sequence.
For admins who need access to the Admin Console, you still need to add them to the Users page located in Tools
Users.
7. Add Vasion Print Admins
For steps on assigning users and roles to the Vasion Print and Vasion Automate Admin Console, refer to Admin Console Users.













