<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Application Protector Java on</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/</link><description>Recent content in Application Protector Java on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/index.xml" rel="self" type="application/rss+xml"/><item><title>Understanding the Architecture</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/architecture_and_workflow/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/architecture_and_workflow/</guid><description>&lt;p>This page describes the architecture, the individual components, and the workflow of the Protegrity Application Protector (AP) solution.&lt;/p>
&lt;h2 id="architecture-and-workflow">Architecture and Workflow&lt;/h2>
&lt;p>The following figure illustrates the deployment architecture of the Application Protector (AP).&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/protectors/10.0/docs/images/ap/ap_common_arch_RA.png" alt="Architecture and Workflow of Application Protector">&lt;/p>
&lt;p>The following table describes the components of the AP deployment architecture.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Component&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Customer Application&lt;/td>
 &lt;td>Built in supported programming languages and integrates with AP for data protection.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Application Protector&lt;/td>
 &lt;td>Core protection engine that enforces security policies and performs data protection operations.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Configuration File (config.ini)&lt;/td>
 &lt;td>Contains initialization parameters passed to AP during startup.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Native Interface&lt;/td>
 &lt;td>Native interface between AP and the C layer. &lt;br>&lt;li>&lt;strong>Java&lt;/strong>: Java Native Interface (JNI) layer&lt;/li>&lt;li>&lt;strong>Python&lt;/strong>: Python.h layer&lt;/li>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Package Enforcement and Deployment&lt;/td>
 &lt;td>Downloads policy packages from the RP Agent and executes protection operations, such as, protect, unprotect, and reprotect.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Log Forwarder&lt;/td>
 &lt;td>Collects logs from AP and forwards them to the Audit Store for centralized auditing.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Resilient Package (RP) Agent&lt;/td>
 &lt;td>Standalone process that retrieves policy packages from ESA and shares them with AP processes using shared memory IPC.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>The following steps describe the workflow of a sample AP deployment in the production environment.&lt;/p></description></item><item><title>System Requirements</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/ap_hardware_reqs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/ap_hardware_reqs/</guid><description>&lt;p>The following table lists the minimum hardware configurations.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Hardware Component&lt;/th>
 &lt;th>Configuration Details&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>CPU&lt;/td>
 &lt;td>Depends on the application.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Disk Space&lt;/td>
 &lt;td>Under 200 MB - including LogForwarder, RP Agent, and AP Java or AP Python.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>RAM&lt;/td>
 &lt;td>Memory usage depends on the AP flavor and application behavior.&lt;br>Refer to &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/appendix/memory_usage_apjava/">AP Java&lt;/a> and &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/ap/ap_python/appendix/memory_usage_appython/">AP Python&lt;/a>&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title>Preparing the Environment</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/prep_the_env/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/prep_the_env/</guid><description>&lt;h2 id="preparing-the-environment-for-ap-java-installation-on-linux">Preparing the Environment for AP Java Installation on Linux&lt;/h2>
&lt;p>Before installing Protegrity Application Protector (AP) Java on a Linux platform, ensure the following prerequisites are met:&lt;/p>
&lt;h3 id="prerequisites">Prerequisites&lt;/h3>
&lt;ul>
&lt;li>The Enterprise Security Administrator (ESA) is installed, configured, and running.&lt;/li>
&lt;li>The IP address or host name of the Load Balancer, Proxy, or ESA is noted.&lt;/li>
&lt;li>The Policy Management (PIM) is initialized on the ESA. It creates cryptographic keys and the policy repository for data protection. &lt;br>
For more information about initializing the PIM, refer to &lt;a href="https://docs.protegrity.com/10.0/docs/installation/ig_working_with_esa_using_pm/">Initializing the Policy Management&lt;/a>.&lt;/li>
&lt;/ul></description></item><item><title>Installing the AP Java Protector</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/apjava_linux_installation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/apjava_linux_installation/</guid><description>&lt;h2 id="extracting-the-setup-scripts-and-package">Extracting the Setup Scripts and Package&lt;/h2>
&lt;p>To extract the setup scripts and package:&lt;/p>
&lt;ol>
&lt;li>Download the &lt;code>ApplicationProtector_Linux-ALL-64_x86-64_JRE-1.8-64_&amp;lt;version&amp;gt;.tgz&lt;/code> file to any location on the machine where you want to install the protector.&lt;/li>
&lt;li>Extract the AP Java installation package using the following command. &lt;br>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>tar –xvf ApplicationProtector_Linux-ALL-64_x86-64_JRE-1.8-64_&amp;lt;version&amp;gt;.tgz
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>The following setup files are extracted:
&lt;ul>
&lt;li>&lt;code>ApplicationProtector_Linux-ALL-64_x86-64_JRE-1.8-64_&amp;lt;version&amp;gt;.tgz&lt;/code>&lt;/li>
&lt;li>&lt;code>signatures/ApplicationProtector_Linux-ALL-64_x86-64_JRE-1.8-64_&amp;lt;version&amp;gt;.sig&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Verify the digital signature of the signed AP Java build. &lt;br>
For more information about verifying the signed AP Java build, refer to &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/verification_of_signed_artifacts/">Verification of Signed Protector Build&lt;/a>.&lt;/li>
&lt;li>Extract the AP Java installation package again using the following command. &lt;br>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>tar –xvf ApplicationProtector_Linux-ALL-64_x86-64_JRE-1.8-64_&amp;lt;version&amp;gt;.tgz
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>The following setup files are extracted:
&lt;ul>
&lt;li>&lt;code>LogforwarderSetup_Linux_x64_&amp;lt;version&amp;gt;.sh&lt;/code>&lt;/li>
&lt;li>&lt;code>RPAgentSetup_Linux_x64_&amp;lt;version&amp;gt;.sh&lt;/code>&lt;/li>
&lt;li>&lt;code>APJavaSetup_Linux_x64_&amp;lt;version&amp;gt;.sh&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;h2 id="installing-log-forwarder-on-linux">Installing Log Forwarder on Linux&lt;/h2>
&lt;p>The steps to install the Log Forwarder on a Linux platform using the Interactive mode or through the Silent mode are described in this section.&lt;/p></description></item><item><title>Configuring the Protector</title><link>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/config_the_protector/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/config_the_protector/</guid><description>&lt;h2 id="configuring-ap-java-on-linux">Configuring AP Java on Linux&lt;/h2>
&lt;p>To configure the AP Java on the Linux platform:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Setup the Java classpath.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Operating System&lt;/th>
 &lt;th>Classpath&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Linux&lt;/td>
 &lt;td>&lt;code>/opt/protegrity/sdk/java/lib&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;/li>
&lt;li>
&lt;p>Before the trusted application can successfully load the &lt;code>ApplicationProtectorJava.jar&lt;/code> file, ensure that -&lt;/p>
&lt;ul>
&lt;li>The Java &lt;code>classpath&lt;/code> is set accurately.&lt;/li>
&lt;li>The path to &lt;code>jcorelite.plm&lt;/code> is configured properly.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Deploy a policy to test the application.&lt;/p>
&lt;p>For more information about deploying a policy, refer to &lt;a href="https://docs.protegrity.com/10.0/docs/pmg/pmg_creating_deploying_policies/pmg_deploying_policy/">Deploying Policies&lt;/a>.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>For more information about configuring the various parameters for the AP Java using the &lt;code>config.ini&lt;/code> file, refer to &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/appendix/ap_config_file/">Config.ini file for Application Protector&lt;/a>.&lt;/p></description></item></channel></rss>