Discovery Failing with CyberArk Credentials Despite Successful Credential Test<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } Issue:CyberArk credential test is passing successfully; however, Discovery attempts using the same credentials is failing. In the MID Server logs, we observe the following authentication failures.------------------------------------------------------------Evaluating credential: ID=……., Name=……., Type=com.snc.automation_common.integration.creds.CredentialType@, UseHighSecurity=false, Tag=null, Domain=global, Order=..DEBUG PowerShellConnectionFactory: Authentication failed for key PowerShellSessionPoolKey[target:<ip>&port:135&...] with credential <redacted> and error: Cannot process argument because the value of argument "userName" is not valid.At <path>\Credentials.psm1:58 char:9DEBUG execute(***credential redacted***), command id: <uuid>DEBUG execute($cred = getCredential; $SNC_session = CreateNewCimSession), command id: <uuid>DEBUG STDERR: At <path>\Credentials.psm1:58 char:9DEBUG PowerShellConnectionFactory: Authentication failed for credential <redacted> with error: Cannot process argument because the value of "userName" is not valid.DEBUG PowerShellConnectionFactory: Authentication failed for credential <redacted> with error: New-CimSession : Access is denied.DEBUG Connection validation error: AuthenticationFailedException - Could not find any valid credentials to authenticate the target for type [Windows]------------------------------------------------------------ Steps to Reproduce:1. Configure CyberArk credentials in the instance.2. perform the “Test Credential” — the test passes every time.3. Run Discovery on any Windows device using the same CyberArk credential.4. Discovery fails with authentication errors in the MID logs.Resolution:The logs show UseHighSecurity=false, which indicates that the External Credential Storage plugin is installed, but the required system property com.snc.use_external_credentials has not been created or enabled. If this property is not set to true, the use_high_security and credential_id fields are not passed to the MID Server, even though they exist in the database. Because these values are not transmitted, the MID Server continues to use standard credential fields instead of CyberArk-managed credentials, resulting in authentication failures during Discovery. Fix: Create/enable the property: com.snc.use_external_credentials = trueAfter enabling, restart the MID Server and re-run the Discovery. Reference Documentation:https://www.servicenow.com/docs/bundle/yokohama-platform-security/page/product/credentials/concept/c_ExternalCredentialStorage.html