This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Protegrity SDK Upgrade Permissions and Deployment

Lists user or group configuration, file and folder permissions, and deployment steps.

Overview

Protegrity deployments include the following components:

  • Upgrade Agent
  • Application Protector (AP) Java SDK
  • Resilient Package (RP) Agent
  • Log Forwarder

It requires a structured permission model to ensure that only authorized users can access protected resources. The permissions define the ability to execute, read, or modify protected resources. This section provides recommended user and group configurations, file and folder permissions, and step‑by‑step deployment guidance for a common use case.

1 - User Roles and Groups

Details about user roles and groups for a common setup.

Groups

GroupPurposeExample
Admin groupUsers who manage the Upgrade Agent, RPAgent, and Log Forwarder. This group is always required.ptyadmin
SDK users groupAP Java users who run applications using the SDK.ptyusers

User Configuration Examples

UserPrimary GroupPurpose
ptyadminptyadminAdmin user who can install and run Upgrade Agent, RPAgent, Log Forwarder, and AP Java.
ptyuser1, ptyuser2, and so onptyadminAP Java user who can run application using the SDK.

User and Group Setup Commands

This section provide commands to create users and groups on Linux.

sudo groupadd ptyadmin
sudo useradd -m -g ptyadmin ptyadmin
sudo useradd -m -g ptyadmin ptyuser1

Here, ptyuser1 uses ptyadmin as the primary group. PID files are created with the following ownership:

ptyuser1:ptyadmin

The Upgrade Agent can read the files with this permission automatically.

2 - Component Overview

Details about ownership of all Protegrity components.

All Protegrity components are owned and primarily run by the ptyadmin user. The following table lists the components and their ownership.

ComponentDescriptionOwner or User*Who Runs It
Upgrade AgentUpgrades and rolls back Protegrity components.ptyadminptyadmin user
AP Java SDKJava libraries used by applications to protect and unprotect data.ptyadminUser (ptyuser1) in the ptyadmin group.
RPAgentDownloads and keeps security policy packages in sync.ptyadminptyadmin user
Log Forwarder- Collects logs and forwards them to the ESA.
- It is based on Fluent Bit.
ptyadminptyadmin user

* - All components are owned by ptyadmin.

The 10.0.gpg file is used by the Upgrade Agent for signature verification. However, it is not a part of the product build. Complete the following steps.

  1. Copy it manually from the ESA machine.
  2. Place it in upgrader/bin/.
  3. Set permissions to 640.

3 - Recommended File and Folder Permissions

List of permissions required for users and groups, core components, and files.

This section explains the required users and groups, core components, and recommended file permissions for running Protegrity Upgrade Agent and the AP Java SDK securely on Linux systems.

Note: The user running the Upgrade Agent must own the extracted old SDK build used for the upgrade. If a local path is configured in sdkupgrd.conf, the user must also own the downloaded new build.

The following tables describe which users can access specific directories under the Upgrade Agent installation and explain why these permissions are required.

  • ptyadmin - Admin user who owns and manages the Upgrade Agent, RPAgent, and Log Forwarder.
  • ptyuser1 - AP Java application user.

Upgrader Agent

The Upgrade Agent is always installed under /opt/protegrity/upgrader/.

PathOwner:GroupModeNotes
/opt/protegrity/ptyadmin:ptyadmin751Allows users to traverse into subdirectories without listing the contents of /opt/protegrity.
upgrader/ptyadmin:ptyadmin750-
upgrader/bin/ptyadmin:ptyadmin750-
upgrader/bin/sdkupgrdptyadmin:ptyadmin700Ensures upgrades and rollbacks can be initiated only by ptyadmin.
upgrader/data/ptyadmin:ptyadmin750-
upgrader/data/metadata.iniptyadmin:ptyadmin660Enables the SDK to read and update active version information required for upgrade coordination.
upgrader/data/sdkupgrd.confptyadmin:ptyadmin660-
upgrader/logs/ptyadmin:ptyadmin770Allows SDK users to create and write log files during runtime and upgrades.
upgrader/active_processes/ptyadmin:ptyadmin770Allows SDK users to create PID files so the Upgrade Agent can detect running processes.
upgrader/backup/ptyadmin:ptyadmin750Stores backup and rollback data.

AP Java SDK

PathOwner:GroupModeNotes
sdk/ptyadmin:ptyadmin750Grants AP Java users read and execute access to the SDK.
sdk/java/lib/ptyadmin:ptyadmin750Contains SDK JARs and native libraries.
sdk/java/lib/ApplicationProtectorJava.jarptyadmin:ptyadmin640Read‑only access for AP Java users.
sdk/java/lib/jcorelite.plmptyadmin:ptyadmin640Native library used by the SDK runtime.
sdk/java/data/ptyadmin:ptyadmin750SDK configuration directory.
sdk/java/data/config.iniptyadmin:ptyadmin640SDK configuration file. Read‑only access for AP Java users.

RPAgent

PathOwner:GroupModeNotes
rpagent/ptyadmin:ptyadmin755Allows read and execute access without exposing writable permissions.
rpagent/bin/rpagentptyadmin:ptyadmin750RPAgent runtime binary.
rpagent/bin/rpagentctrlptyadmin:ptyadmin750RPAgent control script.
rpagent/data/rpagent.cfgptyadmin:ptyadmin640RPAgent configuration file.

Log Forwarder

PathOwner:GroupModeNotes
logforwarder/ptyadmin:ptyadmin755Allows read and execute access without write permissions.
logforwarder/bin/fluent-bitptyadmin:ptyadmin750Log Forwarder runtime binary.
logforwarder/bin/logforwarderctrlptyadmin:ptyadmin750Log Forwarder control script.
logforwarder/data/logforwarder.confptyadmin:ptyadmin640Log Forwarder configuration file.