This is the multi-page printable view of this section. Click here to print.
Application Protector
1 - Application Protector Java
The Protegrity Application Protector (AP) Java provides APIs that integrate with the customer application to protect, unprotect, and reprotect sensitive data. The AP Java can be used with any customer application that is developed using the Java programming language.
To perform protect and unprotect operations, refer to Application Protector Java APIs.
1.1 - Installing the Application Protector Java
Setting up the Application Protector Java
The Protegrity Application Protector (AP) Java provides APIs that integrate with the customer application to protect, unprotect, and reprotect sensitive data. The AP Java can be used with any customer application that is developed using the Java programming language.
Prerequisites
For a detailed information on the prerequistes, refer to System Requirements.
Integrating the Application Protector Java with PPC
To integrate the Application Protector Java with PPC, perform the following steps:
Install and set up the PPC using the steps from the Installing PPC documentation.
Preparing the environment using the steps mentioned in the section Preparing the Environment.
Install the Application Protector Java using the steps mentioned in the section Application Protector Java Installation.
Note: When prompted for the ESA IP address, enter the PPC FQDN as configured in Step 4 of Deploying PPC. Ensure the FQDN does not exceed 50 characters. For the ESA listening port, enter
25400. These specific values are required to integrate the protector with the PPC.
Post Configuration Steps
For a detailed information on the post configuration steps, refer to Verifying Installation of AP Java.
1.2 - Uninstalling the Application Protector Java
Uninstalling the Application Protector Java
For more information about uninstalling the Application Protector Java, refer to Uninstalling the Application Protector Java.
Deleting the PPC
For more information about deleting the PPC, refer to Deleting PPC.
2 - Application Protector Python
The Protegrity Application Protector (AP) Python provides APIs that integrate with the customer application to protect, unprotect, and reprotect sensitive data. The AP Python can be used with any customer application that is developed using the Python programming language.
To perform protect and unprotect operations, refer to Application Protector Python APIs.
2.1 - Installing the Application Protector Python
Setting up the Application Protector Python
The Protegrity Application Protector (AP) Python provides APIs that integrate with the customer application to protect, unprotect, and reprotect sensitive data. The AP Python can be used with any customer application that is developed using the Python programming language.
Prerequisites
For a detailed information on the prerequistes, refer to System Requirements.
Integrating the Application Protector Python with PPC
To integrate the Application Protector Python with PPC, perform the following steps:
Install and set up the PPC using the steps from the Installing PPC documentation.
Preparing the environment using the steps mentioned in the section Preparing the Environment.
Install the Application Protector Python using the steps mentioned in the section Application Protector Python Installation.
Note: When prompted for the ESA IP address, enter the PPC FQDN as configured in Step 4 of Deploying PPC. Ensure the FQDN does not exceed 50 characters. For the ESA listening port, enter
25400. These specific values are required to integrate the protector with the PPC.
Post Configuration Steps
For a detailed information on the post configuration steps, refer to Verifying the installation of AP Python.
2.2 - Uninstalling the Application Protector Python
Uninstalling the Application Protector Python
For more information about uninstalling the Application Protector Python, refer to Uninstalling the Application Protector Python.
Deleting the PPC
For more information about deleting the PPC, refer to Deleting PPC.
3 - Application Protector .Net
The Protegrity Application Protector (AP) .Net provides APIs that integrate with customer applications to protect, unprotect, and reprotect sensitive data. It can be used with any application developed using .NET Standard 2.0.
To perform protect and unprotect operations, refer to the section Application Protector .Net APIs.
3.1 - Installing the Application Protector .Net
Setting up the Application Protector .Net
The Protegrity Application Protector (AP) .Net provides APIs that integrate with customer applications to protect, unprotect, and reprotect sensitive data. It can be used with any application developed using .NET Standard 2.0.
Prerequisites
For a detailed information on the prerequistes, refer to System Requirements.
Integrating the Application Protector .Net with PPC
To integrate the Application Protector .Net with PPC, perform the following steps:
Install and set up the PPC using the steps from the Installing PPC documentation.
Preparing the environment using the steps mentioned in the section Preparing the Environment.
Install the Application Protector Java using the steps mentioned in the section Application Protector .Net Installation.
Note: When prompted for the ESA IP address, enter the PPC FQDN as configured in Step 4 of Deploying PPC. Ensure the FQDN does not exceed 50 characters. For the ESA listening port, enter
25400. These specific values are required to integrate the protector with the PPC.
Post Configuration Steps
For a detailed information on the post configuration steps, refer to Verifying Installation of AP .Net.
3.2 - Uninstalling the Application Protector .Net
Uninstalling the Application Protector .Net
For more information about uninstalling the Application Protector .Net, refer to Uninstalling the Application Protector .Net.
Deleting the PPC
For more information about deleting the PPC, refer to Deleting PPC.