<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pre-Configuration on</title><link>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/</link><description>Recent content in Pre-Configuration on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/index.xml" rel="self" type="application/rss+xml"/><item><title>Extension Source Code</title><link>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/prepare_extension/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/prepare_extension/</guid><description>&lt;h2 id="setting-up-the-browser-protector-extension-for-distribution">Setting up the Browser Protector Extension For Distribution&lt;/h2>
&lt;p>Before deploying the Protegrity Browser Protector extension in your organization, you must set up the extension source code for secure distribution. This involves signing the extension and packaging it into a .crx file, which can then be distributed to users or deployed via MDM tools like Microsoft Intune.&lt;/p>
&lt;p>Signing the extension ensures its integrity and authenticity, allowing browsers to verify that the extension has not been tampered with and originates from a trusted source. Packaging the extension into a &lt;em>.crx&lt;/em> file makes it suitable for enterprise distribution and deployment.&lt;/p></description></item><item><title>Host Extension On Private Server</title><link>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/https_file_hosting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/https_file_hosting/</guid><description>&lt;h2 id="prepare-the-crx-file">Prepare the &lt;em>.crx&lt;/em> File&lt;/h2>
&lt;p>Ensure you have the &lt;code>.crx&lt;/code> file for Protegrity Browser Protector extension. If you haven’t created one yet, follow the steps in the &lt;a href="https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/prepare_extension/">Extension Source Code&lt;/a> section.&lt;/p>
&lt;h2 id="set-up-https-file-hosting">Set Up HTTPS File Hosting&lt;/h2>
&lt;p>HTTPS File hosting service is required to host the &lt;em>.crx&lt;/em> file. This can be any web server, such as, Apache, Nginx, or a cloud storage service.&lt;/p>
&lt;h2 id="set-up-an-amazon-s3-bucket">Set Up an Amazon S3 Bucket&lt;/h2>
&lt;ol>
&lt;li>
&lt;p>Create a new S3 bucket:&lt;/p></description></item><item><title>Entra ID Configuration</title><link>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/sso_ms_entra_id/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/sso_ms_entra_id/</guid><description>&lt;h2 id="configuring-entra-id-single-sign-on-sso-for-protegrity-browser-protector">Configuring Entra ID Single Sign-On (SSO) for Protegrity Browser Protector&lt;/h2>
&lt;p>To enable SSO using Microsoft Entra ID, formerly Azure AD, for the Protegrity Browser Protector extension, follow the steps below.&lt;/p>
&lt;h3 id="create-a-new-app-registration">Create a New App Registration&lt;/h3>
&lt;ol>
&lt;li>Log in to the &lt;strong>Microsoft Entra Admin Center&lt;/strong>.&lt;/li>
&lt;li>Navigate to &lt;strong>App registrations&lt;/strong> &amp;gt; &lt;strong>New registration&lt;/strong>.&lt;/li>
&lt;li>Provide the following details for the new app:
&lt;ul>
&lt;li>&lt;strong>Name&lt;/strong>: Enter a name for the app, for example, &lt;code>Protegrity Browser Protector&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Supported account types&lt;/strong>: Choose the account type suitable for your organization. For example, accounts in this organizational directory only.&lt;/li>
&lt;li>&lt;strong>Redirect URI&lt;/strong>: Leave this blank for now; you will configure it in a later step.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Click &lt;strong>Register&lt;/strong> to create the app registration.&lt;/li>
&lt;li>After registration, copy the &lt;strong>app_registration_client_id&lt;/strong> and &lt;strong>app_registration_tenant_id&lt;/strong> displayed on the app overview page. You’ll need these IDs for configuration in &lt;a href="https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/config_file/">Set Up Configuration File for Browser Protector&lt;/a>.&lt;/li>
&lt;/ol>
&lt;h3 id="add-redirect-uri-for-single-page-application">Add Redirect URI for Single-Page Application&lt;/h3>
&lt;ol>
&lt;li>Log in to the &lt;strong>Microsoft Entra Admin Center&lt;/strong>.&lt;/li>
&lt;li>In the app registration overview, navigate to the &lt;strong>Authentication&lt;/strong> tab.&lt;/li>
&lt;li>Under &lt;strong>Platform configurations&lt;/strong>, click &lt;strong>Add a platform&lt;/strong>.&lt;/li>
&lt;li>Select &lt;strong>Single-page application&lt;/strong> from the list.&lt;/li>
&lt;li>Add a new Redirect URI with the following format:
&lt;ul>
&lt;li>Format: &lt;code>https://pty_extension_id.chromiumapp.org&lt;/code>&lt;/li>
&lt;li>Example: &lt;code>https://epfnbngoodhmbeepjlcohfacgnbhbhah.chromiumapp.org/&lt;/code>&lt;/li>
&lt;li>Replace &lt;code>pty_extension_id&lt;/code> with extension id recorded in &lt;code>Extension Source&lt;/code> section.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Scroll down and set the &lt;strong>Logout URL&lt;/strong> to the same URI:
&lt;ul>
&lt;li>Example: &lt;code>https://epfnbngoodhmbeepjlcohfacgnbhbhah.chromiumapp.org/&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Click &lt;strong>Save&lt;/strong> to apply the changes.&lt;/li>
&lt;/ol>
&lt;h3 id="finalize-authentication-settings">Finalize Authentication Settings&lt;/h3>
&lt;ol>
&lt;li>In the &lt;strong>Microsoft Entra Admin Center&lt;/strong>, ensure that:
&lt;ul>
&lt;li>Access tokens and ID tokens are enabled in the &lt;strong>Implicit grant and hybrid flows&lt;/strong> section.&lt;/li>
&lt;li>Redirect URIs are correctly configured.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Save the changes.&lt;/li>
&lt;/ol></description></item><item><title>Set Up Configuration File for Browser Protector</title><link>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/config_file/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/browser-protector/1.1.0/docs/installation/pre_configuration/config_file/</guid><description>&lt;h2 id="configuring-the-protegrity-browser-protector">Configuring the Protegrity Browser Protector&lt;/h2>
&lt;p>The Protegrity Browser Protector can be customized and managed using a configuration file in
JSON format distributed via MDM tools described in the installation chapters.
The configuration file defines key settings, such as the service endpoint for tokenization, authentication service configuration,
the data elements to be used to protect clear text values as well as administrative contact information display in the Browser Protector Extension.&lt;/p>
&lt;h3 id="configuration-file-overview">Configuration File Overview&lt;/h3>
&lt;p>Below is an example configuration file for the Protegrity Browser Protector:&lt;/p></description></item></channel></rss>