# This article provides detailed steps to set up a CyberArk data source for discovery of CyberArk User, Service, and Vaulted accounts and vaults for that user within the organization.
With the CyberArk integration all credentials needed for the discovery process of any data collection can safely be stored in a safe/vault outside of Hydden and utilized when needed only.
A CyberArk instance with configured and active Identity Administration Core Services in place. Including a suitable service account with the appropriate permissions configured for the integrations to be used. Hydden can work with CyberArk SMEs to ensure a least privilege model is followed for service account access.
The following shows the minimum permissions required to discover CyberArk accounts, to use the CyberArk Discovery Workflow, and to vault discovered accounts in a CyberArk Safe.

[!note] You will need to make the following adjustments below to what appears to be out of box role configurations in CyberArk to achieve the list above:
Care must be taken when making these changes to be certain the changes do not impact other areas of an organization’s CyberArk deployment.
The CyberArk module needs to be added to a configured Client in Hydden to collect data.
| Navigate to __Configuration | Discover__, select the Clients tab. |
| To access the data sources page, navigate to __Configuration | Discover__ and select Data Sources or use the data source URL: https://portal.hydden.com/configuration/data-sources. |
[!note] If custom mapping rules are required, refer to the Advanced Configuration section in the Data Source Overview topic.
At this point, you can run a collection from the Data Sources page and shortly after, you will see your CyberArk accounts listed on the Identity Posture dashboard, in Global Search and the Search Library.