The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Credential Provider, another the Central Credential Provider, and then there is ACP, along with Conjur. Excluding Conjur, we are using those three methodologies, which cover use cases for user-to-machine as well as machine-to-machine. For user-to-machine use cases, if there is any kind of secret being used by users, we use the Credential Provider to manage those secrets, and Secret Manager also exposes some APIs for machine-to-machine use cases in the customer environment. The named features are used for user-to-machine and machine-to-machine use cases.
Senior Member Of Technical Staff at a energy/utilities company with 10,001+ employees
Real User
Top 10
Mar 14, 2025
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.
Learn what your peers think about CyberArk Secrets Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
CyberArk Secrets Management provides credential rotation automation, integration with applications, audit trails, and access controls to enhance security and efficiency.
CyberArk Secrets Management is a comprehensive solution for managing credentials across multiple platforms. It automates password rotation and integrates seamlessly with CI/CD tools, AWS, and healthcare industries. Its audit trails ensure compliance, while granular access controls boost security. Although its documentation...
The main use case for CyberArk Secrets Management is application integrations and the CI and CD part. In CyberArk Secrets Management, there are a variety of tools that they cover, one being the Credential Provider, another the Central Credential Provider, and then there is ACP, along with Conjur. Excluding Conjur, we are using those three methodologies, which cover use cases for user-to-machine as well as machine-to-machine. For user-to-machine use cases, if there is any kind of secret being used by users, we use the Credential Provider to manage those secrets, and Secret Manager also exposes some APIs for machine-to-machine use cases in the customer environment. The named features are used for user-to-machine and machine-to-machine use cases.
My main use cases at the moment promote security all across the organization.
We own a robotic process automation platform called UiPath. We use CyberArk Secrets Management to bring the credentials into robotic process automation for the bots during runtime.
The primary use case for CyberArk Secrets Management is rotating credentials for all service accounts, especially those managed by Puppet for file deployment. This includes rotating AWS keys and credentials used by Terraform. Additionally, we use CyberArk to rotate credentials for Bamboo, our chosen CI/CD tool.