Here is the list of all known CyberArk data source issues.
To perform the initial configuration steps, make sure you first connect to a user who has the required CyberArk permissions.
While in preview, the CyberArk data source will recognize Add Safe as the Admin. This also controls the add/edit/delete actions in the user interface. Regardless of Add Safe, CyberArk will validate the correct user permissions when an action is requested (add/edit/delete) and will prevent you from performing tasks that the current user is not authorized to perform.