Integrating Cloud Protect with PPC (Protegrity Provisioned Cluster)

Concepts for integrating with PPC (Protegrity Provisioned Cluster)

    This guide describes how to configure the Protegrity Policy Agent and Log Forwarder to connect to a Protegrity Provisioned Cluster (PPC), highlighting the differences from connecting to ESA.

    Key Differences: PPC vs ESA

    FeatureESA 10.2PPC (this guide)
    Datastore Key FingerprintOptional/RecommendedRequired
    CA Certificate on AgentOptional/RecommendedOptional/Recommended
    CA Certificate on Log ForwarderOptional/RecommendedNot supported
    Client Certificate Authentication from Log ForwarderOptional/RecommendedNot supported
    IP AddressESA IP addressPPC address

    Prerequisites

    • Access to PPC and required credentials.
    • Tools: curl, kubectl installed.

    Policy Agent Setup with PPC

    Follow these instructions as a guide for understanding specific inputs for Policy Agent integrating with PPC:

    1. Obtain the Datastore Key Fingerprint

      To retrieve the fingerprint for your Policy Agent:

      1. Retrieve public key from the Cloud Provider Key Management service for the policy encryption key created in pre-configuration:

        1. Navigate to the Key Management Service in AWS console and open Customer Managed Keys
        2. Select the desired key
        3. Select the Public Key tab
        4. Select Download
        1. Navigate to the Key Vault in Azure console and open Objects>Keys
        2. Select the desired key
        3. Select the key indicated as CURRENT VERSION
        4. Select Download public key
        1. Navigate to Key Management in GCP console
        2. Select the desired key and open the Versions tab
        3. Select Get public key from the Actions column menu
        4. Select Download

      2. Escape the new line characters in the downloaded public key for use in the next step - for example:

        awk 'NF {printf "%s\\n",$0}' "<public_key_file>" > "new-line-escaped-public-key.pem"
        cat new-line-escaped-public-key.pem
        
      3. Export key fingerprint using the PPC API as indicated in the curl example below:

        curl -k -H "Authorization: Bearer ${TOKEN}" -X POST https://${HOST}/pty/v2/pim/datastores/1/export/keys  -H "Content-Type: application/json" --data '{
          "algorithm": "RSA-OAEP-256",
          "description": "example-key-from-key-management",
          "pem": "<value of new-line-escaped-public-key>"
        }'
        

        Sample Output:

        {"uid":"1","algorithm":"RSA-OAEP-256","fingerprint":"4c:46:d8:05:35:2e:eb:39:4d:39:8e:6f:28:c3:ab:d3:bc:9e:7a:cb:95:cb:b1:8e:b5:90:21:0f:d3:2c:0b:27","description":"example-key-from-kms"}
        
      4. Record the value for fingerprint and configure the Policy Agent:

        Set the environment variable PTY_DATASTORE_KEY in the Policy Agent Lambda function to the fingerprint value.

        Set the environment variable PTY_DATASTORE_KEY in the Policy Agent Function App to the fingerprint value.

        Set the variable in Policy Agent main.tf pty_datastore_key to the fingerprint value and apply the changes.

    2. Retrieve the PPC CA Certificate

      To obtain the CA certificate from PPC:

      kubectl -n api-gateway get secret ingress-certificate-secret -o jsonpath='{.data.ca\.crt}' | base64 -d > CA.pem
      

      Use the ProtegrityCA.pem that was returned as described in Policy Agent Installation.

    3. Configure the PPC Address

      Use the PPC address in place of the ESA IP address wherever required in your configuration.

    Log Forwarder Setup with PPC

    • The Log Forwarder will proceed without certificates and will print a warning if PTY_ESA_CA_SERVER_CERT is not provided.
    • No additional certificate or CA configuration is needed for PPC.


    Last modified : April 21, 2026