The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Credential Provider, another the Central Credential Provider, and then there is ACP, along with Conjur. Excluding Conjur, we are using those three methodologies, which cover use cases for user-to-machine as well as machine-to-machine. For user-to-machine use cases, if there is any kind of secret being used by users, we use the Credential Provider to manage those secrets, and Secret Manager also exposes some APIs for machine-to-machine use cases in the customer environment. The named features are used for user-to-machine and machine-to-machine use cases.
Senior Member Of Technical Staff at a energy/utilities company with 10,001+ employees
Real User
Top 5
2025-03-14T07:55:00Z
Mar 14, 2025
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
IT Security Architect at a comms service provider with 201-500 employees
Real User
Top 5
2024-12-19T19:01:00Z
Dec 19, 2024
The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.
Learn what your peers think about CyberArk Secrets Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
CyberArk Secrets Management offers comprehensive security for managing sensitive information, addressing crucial needs in secure storage, access, and control of credentials across IT environments.CyberArk Secrets Management focuses on ensuring the secure handling of sensitive enterprise data, offering a robust infrastructure for credentials and secrets management. Designed for organizations that need high levels of security, it provides efficiency in automating access controls and compliance....
The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Credential Provider, another the Central Credential Provider, and then there is ACP, along with Conjur. Excluding Conjur, we are using those three methodologies, which cover use cases for user-to-machine as well as machine-to-machine. For user-to-machine use cases, if there is any kind of secret being used by users, we use the Credential Provider to manage those secrets, and Secret Manager also exposes some APIs for machine-to-machine use cases in the customer environment. The named features are used for user-to-machine and machine-to-machine use cases.
My main use cases at the moment promote security all across the organization.
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.