<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Policy Workflow on</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/</link><description>Recent content in Policy Workflow on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/index.xml" rel="self" type="application/rss+xml"/><item><title>Initialize Policy Management</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_init_policy_management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_init_policy_management/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Initialize the Policy Management environment so it can store keys, policies, and configuration data required for all subsequent steps.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>This step prepares the Policy Management subsystem by creating the internal key material and policy repository used by the API. Initialization ensures that the environment is in a valid state before you create any data elements, roles, policies, or datastores.&lt;/p>
&lt;h3 id="purpose">Purpose&lt;/h3>
&lt;p>To set up the foundational Policy Management environment so that all future API commands operate against a valid and initialized repository.&lt;/p></description></item><item><title>Prepare Data Element</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_prepare_data_element/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_prepare_data_element/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Create a Data Element that defines the sensitive data type and how it will be protected. For example, whether the data is tokenzied, encrypted, or masked.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Data Element describes a category of sensitive information, such as credit card numbers, Social Security numbers, names, or email addresses. It then defines the protection method that applies to the category. This includes the protection algorithm, formatting constraints, visibility rules, and validation options. A Data Element is the foundation of all policy rules. Policies reference Data Elements to determine how data is protected and under which circumstances it may be revealed or transformed.&lt;/p></description></item><item><title>Create Member Source</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_member_source/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_member_source/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Create a Member Source that defines the external system from which user and group identities will be imported for use in roles and policies.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Member Source establishes a connection to an identity provider, such as a directory service, a database, or a simple user or group file. This ensures that real users and service accounts can be referenced within policy roles. Member Sources supply the identities that roles draw from, allowing the system to stay aligned with organizational updates to accounts, groups, and permissions.&lt;/p></description></item><item><title>Create Role</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_role/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_role/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Create a Role to represent a group of users or service accounts that will receive specific permissions in a policy.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Role is a logical container that defines who will receive access to a Data Element within a policy. Roles do not hold permissions on their own. Instead, they become meaningful when paired with Data Elements and permissions in policy rules. Roles allow you to centralize and standardize access behavior across multiple users by grouping identities into functional categories such as Data Analysts, Customer Support, or Payment Service Applications.&lt;/p></description></item><item><title>Assign Member Source to Role</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_assign_member_source_role/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_assign_member_source_role/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Assign a user or group from a Member Source to a Role so the Role is backed by real identities that can receive policy permissions. This step links the Role to the identities it should represent and, when synchronized, imports current membership from the source into the Role.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>This step connects a previously created Role to a specific user or group that exists in a Member Source. For example, LDAP, Active Directory, Azure AD, a database, or a file-based source. Using &lt;code>pim create roles members&lt;/code>, you define which source-backed identity should belong to the Role. After that, running a role sync updates the Role with membership information from the source.&lt;/p></description></item><item><title>Create Policy Shell</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_policy_shell/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_policy_shell/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Create an empty Policy Shell that acts as the container for roles, data elements, rules, and deployment configuration.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Policy Shell is the foundational policy object that holds all components of a complete policy but initially contains no rules or assignments. It defines the policy’s identity, which is its name, description, and purpose, and prepares the environment for adding data elements, roles, permissions, and datastores. Creating a Policy Shell is the administrative starting point for constructing a full policy.&lt;/p></description></item><item><title>Define Rule with Data Element and Role</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_define_rule/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_define_rule/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Define a rule that specifies how a Role may interact with a Data Element by assigning permissions such as protect, unprotect, mask, or view.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Rule establishes the relationship between a Data Element and a Role within a policy. It defines which operations members of that Role are allowed to perform on the Data Element. For example, protecting the data using tokenization, viewing masked values, or unprotecting the data if permitted. Rules are the core of policy logic. They determine the behavior of the system when a user or application attempts to access or process sensitive data.&lt;/p></description></item><item><title>Create Datastore</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_datastore/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_create_datastore/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Create a Datastore entry that represents the application, service, or infrastructure component where the policy will be deployed and enforced.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>A Datastore defines the environment in which a policy will operate, such as an application server, a database engine, an API endpoint, or another enforcement point. It represents the location where data is accessed or processed and where the policy rules, which have been defined earlier through roles and data elements, will be applied. Creating a Datastore registers this target environment with the policy management system so that policies can later be deployed to it.&lt;/p></description></item><item><title>Deploy Policy to a Datastore</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_deploy_policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_deploy_policy/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Deploy the completed policy to a Datastore so that its rules are actively enforced during real data access operations.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>Deploying a policy makes it operational on a specific Datastore, such as an application, service, database, or other enforcement point. Until deployment occurs, a policy exists only as a configuration object. Deployment pushes all rules, including Data Elements, Roles, and permissions, to the target Datastore. This ensures that the runtime environment can apply them when users or applications interact with sensitive data.&lt;/p></description></item><item><title>Confirm Deployment</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_confirm_deployment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/workflow_examples/workflow_explanation/wf_confirm_deployment/</guid><description>&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>Verify that the policy has been successfully deployed to the intended Datastore by retrieving deployment information.&lt;/p>
&lt;h3 id="description">Description&lt;/h3>
&lt;p>After deploying a policy, it is important to confirm that the system has registered the deployment correctly. The API provides a command to retrieve a list of all Datastores along with the policies currently connected to them. This verification step ensures that the deployment completed successfully and that the Datastore is now enforcing the appropriate policy rules.&lt;/p></description></item></channel></rss>