Configuring Authentication for Protegrity AI Team Edition
Log into My.Protegrity and obtain the necessary credentials and certificates. This portal hosts all products and features included in your Protegrity contract.
Deploy Using PCR
Use the steps provided here for deploying PPC and the features directly from the PCR.
Log in to the My.Protegrity portal.
Navigate to Product Management > Explore Products > AI Team Edition.
Create an access token to obtain the Username and Secret. Store these credentials carefully, they are required for connecting to https://registry.protegrity.com:9443 and performing registry operations.
Click Access Tokens.
Click Create Access Token.
Click Export To File to save the credentials.
Click I Understand That I Cannot See This Again.
Deploy to Own Registry
Use the steps provided here for pulling the artifacts from PCR and deploying PPC and the features to the organization-hosted registry using standard authentication.
Prerequisites:
For ECR: Ensure that the required AWS credentials are available and set.
Ensure that the jumpbox has connectivity to the Protegrity Container Registry (PCR) and your container registry.
Ensure that the user logged in to the jumpbox is the
rootuser or hassudoeraccess.Ensure that the following tools are installed:
- docker or podman: Must be installed and running. If podman is used, identify the podman directory and create a symbolic link to docker using the following commands:
which podman ln -s /bin/podman /bin/dockerhelm: Kubernetes package manager used to pull and manage Helm charts required for deploying Protegrity AI Team Edition components from an OCI‑compliant registry. Helm v3+ must be installed.
curl: Command‑line HTTP client used by the pull scripts to interact with OCI Distribution APIs, including making authenticated requests to the Protegrity Container Registry.
jq: Lightweight JSON processor used to parse and extract information from the
artifacts.jsonfile that defines the set of artifacts to be pulled and pushed.oras: OCI Registry As Storage (ORAS) client used to pull non‑container, generic OCI artifacts from the registry that are not handled by standard container tooling.
Run the following command to confirm readiness before proceeding:
docker --version && helm version && oras version && jq --version && curl --version
Steps to configure the certificates:
Log in to the My.Protegrity portal.
Navigate to Product Management > Explore Products > AI Team Edition.
Create an access token to obtain the Username and Secret.
Note: Store these credentials carefully, they are required for performing registry operations.
Click Access Tokens.
Click Create Access Token.
Click Export To File to save the credentials.
Click I Understand That I Cannot See This Again.
Obtain the artifacts for setting up the AI Team Edition.
From the Product Management > Explore Products > AI Team Edition page of the My.Protegrity portal, click Download Pull Script. A compressed file is downloaded.
Copy the compressed file to an empty directory on the jumpbox.
Extract the compressed file.
The following files are available:
- artifacts.json: The list of artifacts that are obtained.
- pull_all_artifacts.sh: The script to pull the artifacts from the PCR.
- tag_push_artifacts.sh: The script to tag and push the artifacts to your container registry.
Navigate to the extracted directory. Do not update the contents of the
artifacts.jsonfile.Run the
pull scriptto pull the artifacts to your jumpbox using the following command:./pull_all_artifacts.sh --url https://registry.protegrity.com:9443 --user <username_from_portal> --password <access_key_from_portal> --json artifacts.jsonEnsure that single quotes are used to specify the username and password in the command.
Run the following command to tag and push the artifacts to your container registry.
Sample command for ECR:
./tag_push_artifacts.sh --ecr-uri 123456789012.dkr.ecr.us-east-1.amazonaws.com --region us-east-1 --json artifacts.jsonSample command for Harbor:
./tag_push_artifacts.sh --url https://harbor.example.com --user <your_harbor_username> --password <your_harbor_password> --json artifacts.jsonEnsure that single quotes are used to specify the username and password in the command.
Validate that all the artifacts are successfully pushed to your registry.
Deploy to Own Registry Using mTLS
This section explains how to set up mTLS authentication when using your own container registry. Perform these steps to establish secure, certificate‑based trust and prevent unauthorized access during image pulls and service communication.
Prerequisites:
For ECR: Ensure that the required AWS credentials are available and set.
Ensure that the jumpbox has connectivity to the Protegrity Container Registry (PCR) and your container registry.
Ensure that the user logged in to the jumpbox is the
rootuser or hassudoeraccess.Ensure that the following tools are installed:
- docker or podman: Must be installed and running. If podman is used, identify the podman directory and create a symbolic link to docker using the following commands:
which podman ln -s /bin/podman /bin/dockerhelm: Kubernetes package manager used to pull and manage Helm charts required for deploying Protegrity AI Team Edition components from an OCI‑compliant registry. Helm v3+ must be installed.
curl: Command‑line HTTP client used by the pull scripts to interact with OCI Distribution APIs, including making authenticated requests to the Protegrity Container Registry.
jq: Lightweight JSON processor used to parse and extract information from the
artifacts.jsonfile that defines the set of artifacts to be pulled and pushed.oras: OCI Registry As Storage (ORAS) client used to pull non‑container, generic OCI artifacts from the registry that are not handled by standard container tooling.
Run the following command to confirm readiness before proceeding:
docker --version && helm version && oras version && jq --version && curl --version
Steps to configure the certificates:
Log in to the My.Protegrity portal.
Navigate to Product Management > Explore Products > AI Team Edition.
Create an access token to obtain the Username and Secret.
Note: Store these credentials carefully, they are required for performing registry operations.
Click Access Tokens.
Click Create Access Token.
Click Export To File to save the credentials.
Click I Understand That I Cannot See This Again.
Generate a CSR file for registering the jumpbox with the Protegrity Container Registry.
Open a terminal or command prompt.
Generate a private key.
openssl genrsa -out private.key 2048Create the CSR using the private key.
openssl req -new -key private.key -out request.csrSpecify the following details for the certificate:
- Country (C): Two-letter code (for example, US)
- State/Province (ST)
- City/Locality (L)
- Organization (O): Legal company name
- Organizational Unit (OU): Department (optional)
- Common Name (CN): Domain (for example, www.example.com)
- Email Address: Email address
View the CSR file.
cat request.csr
Create the client certificate to connect to the registry. This step is required only when your security policies mandates mutual TLS (mTLS) for a two-way certificate verification between your environment and the Protegrity Container Registry.
Click Client Certificates.
Click Create Client Certificate.
Click Browse to upload your CSR. Refer to the previous step if you do not have a CSR.
Click Create Client Certificate to generate the client certificate.
From the Client Certificate tab, click Download Client Certificate from the Actions column to download a compressed file with the certificates.
Copy or upload the certificates to the jumpbox.
Warning: Ensure that the same filenames and extensions are used that are provided in the following steps.
Ensure to login to the jumpbox as the
rootuser.Navigate to the
/etc/docker/directory. For podman, navigate to/etc/containers/.Create the
certs.ddirectory.Open the
certs.ddirectory.Create the
registry.protegrity.comdirectory.Copy the compressed file with the certificate to the
/etc/docker/certs.d/registry.protegrity.comdirectory. For podman, navigate to/etc/containers/certs.d/registry.protegrity.com.Extract the compressed file.
The extracted file contains the following certificates:
- protegrityteameditioncontainerregistry_protegrity-usa-inc.crt
- TrustedRoot.crt
- DigiCertCA.crt
Navigate to the extracted directory.
Concatenate the contents of
TrustedRoot.crtandDigiCertCA.crtto a new file calledca.crt.cat TrustedRoot.crt DigiCertCA.crt > ca.crtRename the client certificate file.
``` mv protegrityteameditioncontainerregistry_protegrity-usa-inc.crt client.cert ```Copy the client and CA certificates to
/etc/docker/certs.d/registry.protegrity.com. For podman, copy the certificates to/etc/containers/certs.d/registry.protegrity.com.Copy the
client.keythat was generated to the/etc/docker/certs.d/registry.protegrity.comdirectory. If the/certs.d/registry.protegrity.comdirectory does not exist, then create the directories. For podman, use the/etc/containers/certs.d/registry.protegrity.comdirectory.Copy the Docker registry’s CA certificate to the system’s trusted CA store to establish SSL/TLS trust for that registry. A sample command for RHEL 10.1 is provided here:
For docker: ``` sudo cp /etc/docker/certs.d/registry.protegrity.com/ca.crt /etc/pki/ca-trust/source/anchors/ ``` For podman: ``` sudo cp /etc/containers/certs.d/registry.protegrity.com/ca.crt /etc/pki/ca-trust/source/anchors/ ```- Rebuild the system’s trusted CA bundle. A sample command for RHEL 10.1 is provided here.
``` update-ca-trust ```Restart the container service.
For docker:
service docker restartFor podman:
service podman restart
Obtain the artifacts for setting up the AI Team Edition.
From the Product Management > Explore Products > AI Team Edition page of the My.Protegrity portal, click Download Pull Script. A compressed file is downloaded.
Copy the compressed file to an empty directory on the jumpbox.
Extract the compressed file.
The following files are available:
- artifacts.json: The list of artifacts that are obtained.
- pull_all_artifacts.sh: The script to pull the artifacts from the PCR.
- tag_push_artifacts.sh: The script to tag and push the artifacts to your container registry.
Navigate to the extracted directory. Do not update the contents of the
artifacts.jsonfile.Run the
pull scriptto pull the artifacts to your jumpbox using the following command:For docker:
./pull_all_artifacts.sh --url https://registry.protegrity.com --user <username_from_portal> --password <access_key_from_portal> --json artifacts.json --cert-file /etc/docker/certs.d/registry.protegrity.com/client.cert --key-file /etc/docker/certs.d/registry.protegrity.com/client.keyFor podman:
./pull_all_artifacts.sh --url https://registry.protegrity.com --user <username_from_portal> --password <access_key_from_portal> --json artifacts.json --cert-file /etc/containers/certs.d/registry.protegrity.com/client.cert --key-file /etc/containers/certs.d/registry.protegrity.com/client.keymTLS uses a client certificate and the port 443 to connect to the Protegrity Container Registry. Also, ensure that the certificate files are named as ca.crt, client.cert, and client.key. Ensure that single quotes are used to specify the username and password in the command.
Run the following command to tag and push the artifacts to your container registry.
Sample command for ECR:
./tag_push_artifacts.sh --ecr-uri 123456789012.dkr.ecr.us-east-1.amazonaws.com --region us-east-1 --json artifacts.jsonSample command for Harbor:
./tag_push_artifacts.sh --url https://harbor.example.com --user <your_harbor_username> --password <your_harbor_password> --json artifacts.jsonEnsure that single quotes are used to specify the username and password in the command.
Validate that all the artifacts are successfully pushed to your registry.
Feedback
Was this page helpful?