<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Appendices on</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/</link><description>Recent content in Appendices on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/index.xml" rel="self" type="application/rss+xml"/><item><title>Integrating Cloud Protect with PPC (Protegrity Provisioned Cluster)</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/install_with_ppc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/install_with_ppc/</guid><description>&lt;p>

 




	






 






 &lt;p>This guide describes how to configure the Protegrity Policy Agent and Log Forwarder to connect to a Protegrity Provisioned Cluster (PPC), highlighting the differences from connecting to ESA.&lt;/p>
&lt;h2 id="key-differences-ppc-vs-esa">Key Differences: PPC vs ESA&lt;/h2>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Feature&lt;/th>
 &lt;th>ESA 10.2&lt;/th>
 &lt;th>PPC (this guide)&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Datastore Key Fingerprint&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Required&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CA Certificate on Agent&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Optional/Recommended&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CA Certificate on Log Forwarder&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Not supported&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Client Certificate Authentication from Log Forwarder&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Not supported&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>IP Address&lt;/td>
 &lt;td>ESA IP address&lt;/td>
 &lt;td>&lt;strong>PPC address&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="prerequisites">Prerequisites&lt;/h2>
&lt;ul>
&lt;li>Access to PPC and required credentials.&lt;/li>
&lt;li>Tools: &lt;code>curl&lt;/code>, &lt;code>kubectl&lt;/code> installed.&lt;/li>
&lt;/ul>
&lt;h2 id="policy-agent-setup-with-ppc">Policy Agent Setup with PPC&lt;/h2>


&lt;div class="alert alert-warning" role="alert">
&lt;h4 class="alert-heading">Important&lt;/h4>

 When connecting to PPC, the Policy Agent &lt;strong>requires&lt;/strong> the &lt;code>PTY_DATASTORE_KEY fingerprint&lt;/code>. For ESA 10.2, the fingerprint is optional but recommended. See &lt;a href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/installation/agent/">Policy Agent Installation&lt;/a> for general setup steps.

&lt;/div>

&lt;p>Follow these instructions as a guide for understanding specific inputs for Policy Agent integrating with PPC:&lt;/p></description></item><item><title>Configuring Regular Expression to Extract Policy Username</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/usename_regex_configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/usename_regex_configuration/</guid><description>&lt;h2 id="configuring-regular-expression-to-extract-policy-username">Configuring Regular Expression to Extract Policy Username&lt;/h2>
&lt;p>Cloud Protect Function exposes USERNAME_REGEX configuration to allow extraction of policy username from user in the request.&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>USERNAME_REGEX Function Environment configuration&lt;/strong>&lt;/p>
&lt;p>The USERNAME_REGEX environment variable can be set to contain regular expression with one capturing group. This group is used to extract the username. Examples below show different regular expression values and the resulting policy user.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;table>&lt;thead>&lt;tr>&lt;th>
&lt;p>USERNAME_REGEX&lt;/p>
&lt;/th>&lt;th>
&lt;p>User in the request&lt;/p></description></item><item><title>Getting JWT for Service Account in Azure Active Directory</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/jwt_auth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/jwt_auth/</guid><description>&lt;h2 id="getting-jwt-for-service-account-in-azure-active-directory">Getting JWT for Service Account in Azure Active Directory&lt;/h2>
&lt;p>Protect Function App can use Microsoft identity platform endpoint for identity-as-a-service, available in Azure Active Directory, to implement OpenID Connect and OAuth 2.0 authorization. This section describes how to get JWT using OAuth 2.0 client credentials grant flow in Azure Active Directory and authorize the Client ID in Protegrity Policy.&lt;/p>


&lt;div class="alert alert-info" role="alert">
&lt;h4 class="alert-heading">Note&lt;/h4>

 Protect Function App and Azure Active Directory support more authorization methods, and the correct procedure should be chosen based on the use case.

&lt;/div>

&lt;p>Suggested reading: &lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow">https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow&lt;/a>&lt;/p></description></item><item><title>Protection Methods</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/protection_methods/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/protection_methods/</guid><description>&lt;h2 id="protection-methods">Protection Methods&lt;/h2>
&lt;p>For more information about the protection methods supported by Protegrity, refer to the &lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/">Protection Methods Reference&lt;/a>.&lt;/p>
&lt;table>&lt;thead>&lt;tr>&lt;th>
&lt;p>Tokenization Type&lt;/p>
&lt;/th>&lt;th>
&lt;p>Supported Input Data Types&lt;/p>
&lt;/th>&lt;th>
&lt;p>Notes&lt;/p>
&lt;/th>&lt;/tr>&lt;/thead>&lt;tbody>&lt;tr>&lt;td>
&lt;p>Numeric&lt;/p>
&lt;p>Credit Card&lt;/p>
&lt;p>Alpha&lt;/p>
&lt;p>Upper-case Alpha&lt;/p>
&lt;p>Alpha-Numeric&lt;/p>
&lt;p>Upper Alpha-Numeric&lt;/p>
&lt;p>Lower ASCII&lt;/p>
&lt;p>Printable&lt;/p>
&lt;p>Decimal&lt;/p>
&lt;p>Unicode&lt;/p>
&lt;p>Unicode Base64&lt;/p>
&lt;p>Unicode Gen2&lt;/p>
&lt;p>Email&lt;/p>
&lt;/td>&lt;td>
&lt;p>STRING&lt;/p>
&lt;p>NULL&lt;/p>
&lt;/td>&lt;td>
&lt;/td>&lt;/tr>&lt;tr>&lt;td>
&lt;p>Integer&lt;/p>
&lt;/td>&lt;td>
&lt;p>NUMBER&lt;/p>
&lt;p>NULL&lt;/p>
&lt;/td>&lt;td>
&lt;/td>&lt;/tr>&lt;tr>&lt;td>
&lt;p>Date&lt;/p>
&lt;p>Datetime&lt;/p>
&lt;/td>&lt;td>
&lt;p>STRING&lt;/p>
&lt;p>NULL&lt;/p>
&lt;/td>&lt;td>
&lt;p>For information about supported formats, refer to the &lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/">Protection Methods Reference&lt;/a>.&lt;/p></description></item><item><title>ARM Template Installation - Required Permissions</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/arm_template_installation_permission_req/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/arm_template_installation_permission_req/</guid><description>&lt;h2 id="arm-template-installation---required-permissions">ARM Template Installation - Required Permissions&lt;/h2>
&lt;p>Permissions below are required to install Protegrity service using ARM template.&lt;/p>
&lt;p>All permissions in the table must be granted with the Resource group scope.&lt;/p>
&lt;table id="permissions-table">&lt;thead>&lt;tr>&lt;th>
&lt;p>Permissions&lt;/p>
&lt;/th>&lt;th>
&lt;p>Description&lt;/p>
&lt;/th>&lt;th>
&lt;p>Built-In Azure Role&lt;/p>
&lt;/th>&lt;/tr>&lt;/thead>&lt;tbody>&lt;tr>&lt;td>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Insights/components/read
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.OperationalInsights/workspaces/read
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/td>&lt;td>
&lt;p>Read access to monitoring data and settings&lt;/p>
&lt;/td>&lt;td>
&lt;p>Monitoring Reader&lt;/p>
&lt;/td>&lt;/tr>&lt;tr>&lt;td>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Insights/components/write
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.OperationalInsights/workspaces/write
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/td>&lt;td>
&lt;p>Write and manage access to monitoring data and settings&lt;/p>
&lt;/td>&lt;td>
&lt;p>Monitoring Contributor&lt;/p>
&lt;/td>&lt;/tr>&lt;tr>&lt;td>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Web/serverFarms/write
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Web/sites/write
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Web/sites/host/listkeys/action
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Web/serverFarms/join/action
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>Microsoft.Web/register/action
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/td>&lt;td>
&lt;p>Write and manage access to web apps&lt;/p></description></item><item><title>Associating ESA Data Store With Cloud Protect Agent</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/agent_ip_address_config/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/azure/api/appendix/agent_ip_address_config/</guid><description>&lt;h2 id="associating-esa-data-store-with-cloud-protect-agent">Associating ESA Data Store With Cloud Protect Agent&lt;/h2>
&lt;p>ESA controls which policy is deployed to protector using concept of data store. A data store may contain a list of IP addresses identifying servers allowed to pull the policy associated with that specific data store. Data store may also be defined as default data store, which allows any server to pull the policy, provided it does not belong to any other data stores. Node registration occurs when the policy server (in this case the policy agent) makes a policy request to ESA, where the agent&amp;rsquo;s IP address is identified by ESA.&lt;/p></description></item></channel></rss>