CRDP Workflow
You can deploy CRDP in any dev-ops ready environment. It reaches out to the CipherTrust Manager for keys, policies, and configurations. The following topics describes the CRDP deployment and post-deployment flows.
Deployment Flow
.
The following steps summarize the CRDP deployment flow:
The Application Data Protection Administrator defines an application on the CipherTrust Manager and in response, a registration token is returned.
The Application Data Protection Administrator gives the registration token to the DevOps team to insert it into their orchestrator configuration for CRDP deployment.
The orchestrator runs the deployment script.
CRDP containers are up and ready to serve the requests.
Post-deployment Flow
.
After the CRDP containers are live, they will fetch keys, policies, and configurations from the CipherTrust Manager and protect/reveal data based on the user requirements.