Migrating from Another Certificate Authority
If you are already using a CA Adapter with TruU for another Certificate Authority (e.g. an Active Directory CA), when you enable the CyberArk ZTPKI CA Adapter, the transition will work as follows:- Previously issued certificates from the original CA will continue to be used. When certificate expiration is approaching and a renewal is required, the new certificate will be issued from CyberArk Zero Touch PKI.
- New enrollments will be issued from CyberArk ZTPKI.
Creating a CyberArk ZTPKI CA Adapter
- Log into your TruU Admin Console
- Navigate to Integrations > Adapters
- Click on the “+” button to add a new adapter
- Select “Certificate Authority”
- Select “CyberArk ZTPKI” as the specific adapter type
- Enter the required fields based on your CyberArk tenant
| Field | Notes |
|---|---|
| Name | * This is the name of the TruU adapter and does not need to be tied specifically to your CyberArk tenant |
| ZTPKI URL | - This is the URL for the ZTPKI APIs |
- Most customers can leave this as the default value ( https://ztpki.venafi.com ) | | Policy Name | * Enter the name of the policy that should be used when issuing smartcard logon certificates for TruU desktop authenticators
- Contact your CyberArk representative or technical support to enable the appropriate policies in your ZTPKI environment, which will add support for desktop login to Windows Authenticators, and/or Shared Workstations (see the Policy Requirements below) | | API Key ID | - Enter the API key ID that TruU will use for authentication with CyberArk APIs
- You can get this value from your CyberArk tenant | | API Key Secret | * Enter the API key secret that TruU will use for authentication with CyberArk APIs
- You can get this value from your CyberArk tenant |
- Click “Create”
- Optionally add specific administrator roles for managing this adapter
- Click “Apply” to create the adapter
CyberArk ZTPKI Certificate Policy Requirements
The certificate policy should include the following: DN Components:- CN (Common Name) - Required
- DC (Domain Component) - Must include all components of your Active Directory domain (e.g. DC=corp, DC=company, DC=com)
- UPN (User Principal Name) - Required
- OID 1.3.6.1.4.1.311.21.7 - Microsoft Certificate Template Information (Required)
- OID 1.3.6.1.4.1.311.21.10 - Microsoft Application Policies (Required)
- OID 1.3.6.1.4.1.311.25.2 - Microsoft NTDS CA Security Extension
- Standard Users - We recommend 365 days or whatever your organization uses for desktop authentication.
- Shared Workstations - We recommend 24 hours or less.
Enable FIDO2 security key sign-in for Windows Importing CyberArk ZTPKI certificates into Active Directory

