Pre-Configuration
Resource Group
Identify or create a new Azure Resource Group where the Protegrity solution will be installed. It is recommended that a new Resource group is created. This can provide greater security controls and help avoid conflicts with other applications that might impact regional account limits. An individual with the Cloud Administrator role will be required for some of the subsequent installation steps.
Azure Subscription ID (AzureSubscriptionID): ____________________
Azure Resource Group ID (ApiResourceGroupID): ___________________
Azure Region (ApiRegion): ___________________
Key Vault
Key Vault is required to store secrets and encrypt policy deployment package. Identify existing Key Vault or create new.
To create Key Vault:
From the Azure Console select Create a resource.
Navigate to Key Vault > Create.
Select a Resource group.
Enter a Key vault name.
Select a Region. For the best performance, use the same region for all resources.
Set the Pricing tier to
Standard.Under Access configuration, select Vault access policy as the Permission model.
Under Networking, ensure that Enable public access is selected.
Under Review + create, click Create.
Record Key Vault Name:
Key Vault Name (PolicyKeyValue): ___________________
Function App Storage
Create Storage Account
Create a storage account to host Protegrity deployment packages provided in installation artifact bundle. Note that turning on the firewall or restricting access to selected virtual networks or IP address ranges will require additional configuration and is beyond the scope of this document.
To create Function App storage:
From the Azure Console select Create a resource.
Navigate to Storage account > Create.
Select the Resource group where the Protegrity solution will be deployed.
Enter a Storage account name.
Select the Region where the Protegrity solution will be deployed.
Set the Preferred storage type to
Azure Blob Storage or Azure Data Lake StorageSet the Primary workload to
Cloud nativeSetting for Performance should be set to
Standard.Setting for Redundancy should be set to
Geo-redundant storage (GRS).Continue to Advanced setup and verify Enable hierarchical namespace is unchecked
Warning
If Enable hierarchical namespace is checked, Policy Agent component will not be able to properly set the policy blob url, resulting in Protector errorPolicy is not availableAdjust the Networking and Data protection configurations according to your security requirements or use the default values.
Under Review + create, click Create.
Record the storage account name
Storage Account Name (StorageAccountName): ____________________
Record the storage blob service URL. Navigate to created Storage Account, select Settings, Endpoints, record the value of Blob Service
Storage Account Blob Service Url (StorageAccountBlobServiceUrl): ____________________
Upload Files
Create a deployment container using the Azure Blob Service.
Go Storage Account created in the previous step.
Under Data storage section, select Containers and click + Container .
Type in container name and click Create .
Upload the following installation artifacts to the container:
- protegrity-protect-azure-<version>.zip
- protegrity-agent-azure-<version>.zip
Important
The installation bundle you receive from Protegrity should be unzipped to reveal the files above. Only the files above need to be uploaded to the storage container. Do not unzip the three individual zip packages.Record Protect function blob URL:
Protect Function Blob URL (ProtectFuncURL): ____________________
Record Forward function blob URL. Both Protect and Forward functions use the same protegrity-protect-azure-<version>.zip distribution:
Forward Function Blob URL (ForwardFuncURL): ____________________
Record Agent function blob URL:
Agent Function Blob URL (AgentFuncURL): ____________________
Create Protect Function Policy Blob
Create a blob container for encrypted Protegrity security policy using Azure Blob Service. Agent will store encrypted policy in this container. Both Protect and Log Forwarder functions will load policy from this container.
Go Storage Account created in the previous step.
Under Data storage section, select Containers and click + Container .
Type in container name and click Create .
Right-click the container name, and select Container properties to obtain URL.
Append the name of the policy file to the container URL, e.g, https://<your-storage-account>.blob.core.windows.net/<your-policy-container>/<your-policy-file-name>.zip. Record the blob url.
Protect Function Policy Blob URL (ProtectFuncPolicyBlobUrl): ____________________
Create Agent Policy Blob Container
The Agent function uploads an encrypted policy zip package to a blob container which is used as a staging storage. Create the policy staging container
To prepare the policy blob container:
Under Storage account created in previous step, select Data storage > Containers and click + Container .
Type in a container name and click Create .
Agent Policy Blob Container Name (AgentPolicyBlobContainer): ___________________
Feedback
Was this page helpful?