Preparing the Environment

Preparing the environment for deploying the protector.

This section provides an overview of the steps required to prepare the environment for deploying the Protegrity AWS EC2 Protector product.


Initializing the Jump Box

Initialize the Linux instance.

Extracting the Installation Package

Extract the Linux installation package.

Creating a JAR for the Sample Application

Create JAR file for the Sample Application.

Creating a Linux AMI for the Sample Application

Create a Linux AMI for the Sample Application.

Creating Certificates and Keys for TLS Authentication

Create certificates and keys for establishing a secure communication between the client and the load balancer.

Uploading the Server Certificates to the AWS Identity and Access Management

Upload server certificates to the AWS IAM service.

Uploading the RPSyncConfig Package to the AWS S3 Bucket

Upload the RPSyncConfig package to the AWS S3 bucket.

Preparing the AWS Requirements

Overview of preparing the AWS requirements.


Last modified : February 25, 2026