Cloud API

Protector with a REST API on GCP.

This section describes the high-level architecture of Protegrity Cloud API, installation procedures, and performance guidance. This section focuses on Protegrity specific aspects and should be consumed in conjunction with the corresponding GCP documentation.

This guide may also be used with the Protegrity Enterprise Security Administrator Guide, which explains the mechanism for managing the data security policy.


Overview

Solution overview and features.

Architecture

Deployment architecture and connectivity

Installation

Product Installation Guide.

REST API

Reference for Cloud API authorization and specification

Performance

Performance benchmarks and considerations.

Audit Logging

Audit log description/formatting

No Access Behavior

Unauthorized unprotect requests behaviour.

Upgrading To The Latest Version

Instructions for upgrading the protector.

Known Limitations

Known product limitations.

Appendices

Additional references for the protector.


Last modified : April 27, 2026