CRDP Workflow
You can deploy CRDP in any dev-ops ready environment. It reaches out to the CipherTrust Manager for keys, policies, and configurations. The following topics describes the CRDP deployment and post-deployment flows.
Deployment Flow
.
The following steps summarize the CRDP deployment flow:
The Application Data Protection Administrator defines an application on the CipherTrust Manager and in response, a registration token is returned. For details, refer to defining CRDP application.
The Application Data Protection Administrator gives the registration token to the DevOps team to insert it into their orchestrator configuration for CRDP deployment. Refer to quick start for details.
The orchestrator runs the deployment script.
CRDP containers are up and ready to serve the requests.
Operational Flow
After the CRDP containers are live, they will fetch keys, policies, and configurations from CipherTrust Manager (CM) and cache the information. CRDP does not go back to CipherTrust Manager until the CRDP heartbeat notifies CRDP of a change to the configuration, keys, and/or policies.
.