First time setup
This section walks you step by step on how to download and install the Delphix Engine software onto your infrastructure (VMware, AWS EC2, Azure, or GCP).
Set up network access to the Delphix Engine
-
Power on the Delphix Engine and open the Console.
-
Wait for the Delphix Management Service and Delphix Boot Service to come online. This might take up to 10 minutes during the first boot. Wait for the large orange box to turn green.
-
Press any key to access the sysadmin console.
-
Enter sysadmin for the username and sysadmin for the password. For more information, read Finding an AWS AMI Instance ID or IP address Amazon documentation..
-
You will be presented with a description of available network settings and instructions for editing.
-
Configure the hostname. Use the same hostname you entered during the server installation. If you are using DHCP, this step can be skipped.
-
Configure DNS. If you are using DHCP, this step can be skipped.
-
Configure either a static or DHCP address. The static IP address must be specified in CIDR notation (for example, 192.168.1.2/24).
-
Configure a default gateway. If you are using DHCP, this step can be skipped.
-
Commit your changes. Note that you can use the get command prior to committing to verify your desired configuration.
-
Check that the Delphix Engine can now be accessed through a Web browser by navigating to the displayed IP address, or hostname if using DNS.
-
Exit setup.
Set up the Delphix Continuous Compliance Engine
-
Use the Setup Wizard to configure the Continuous Compliance Engine after your first login.
-
Open a supported web browser and connect to the Delphix Continuous Compliance Engine.
-
Log in with the default credentials:
-
Username: sysadmin
-
Password: sysadmin
-
-
Change the default password for security purposes.
The Setup Wizard then starts automatically to guide you through engine configuration.
-
-
On the Welcome page, select Continuous Compliance to setup masking-specific settings such as Compliance admin user’s email and password as well as Compliance SMTP settings directly from the setup wizard. It will then redirect the customer to the corresponding login page based on the engine type selected. When you select Continuous Compliance, the wizard creates the admin user with your defined password. This user serves as the Compliance Administrator and performs all administrative setup tasks. However, there are limitations to this feature:
-
Only Masking user settings (email and password) and SMTP settings are supported. Customers will need to use the API to setup LDAP.
-
Once set, these settings can only be updated via the Masking API. There are no corresponding sections in the system dashboard.
-
Engine Type cannot be modified once set in the Setup Wizard because it has other dependencies such as SSO.
Enter the correct password. After three failed attempts, the system locks your account from the Compliance service.
-
-
On the Continuous Compliance Password page, enter the current default password for the Compliance Engine. The default is Admin-12.
-
On the Administrators page, enter the credentials for the System Administrator, Compliance Administrator, and Engine Administrator.
-
On the Time page, select an option to maintain the system time, and click Next to continue. Note that the Compliance Engine operates only in the UTC time zone. Time zone selection during setup does not apply.
-
On the Network page, configure the network interfaces and services as required.
Modifying the settings of network interfaces or the default gateway can make the Delphix Engine unreachable from the browser. Perform such changes from the Command Line Interface (CLI) on the system console after a successful installation. -
On the Network Security page, review the certificates installed by the Engine’s Certificate Authority. Replace any certificate if needed, and click Next to continue.
-
On the Storage page, select the object storage type for data. The Delphix Continuous Compliance Engine automatically discovers and displays the available storage devices. From the Storage Type for Data drop-down list, choose the desired option.
The available settings for each storage device may differ based on the selected storage type or engine configuration.-
Verify that the required devices are enabled for data storage.
-
(Optional) Select Expand to increase capacity if additional space is available.
-
Click Rediscover to detect any newly attached storage devices.
-
Click Next to continue.
-
-
On the Outbound Connectivity page, configure how the Delphix Engine communicates with external services for support, analytics, and notifications.
-
Web proxy
-
Select Configure web proxy if the Delphix Continuous Compliance Engine must connect to Delphix Support through a proxy server.
-
Enter the proxy details as required for your environment.
-
-
Phone Home Service
-
Select Enable phone home service to automatically send a minimal support bundle to Delphix Support once per day over HTTPS.
-
Use this service to assist with proactive troubleshooting and future support.
-
-
User-Click Analytics
-
Select Enable Usage Analytics to send anonymous, non-personal metadata describing user interactions with the product interface.
-
Use this data to help improve product performance and usability.
-
-
Continuous Compliance SMTP
-
Select Use an existing SMTP server to configure email notifications for Continuous Compliance.
-
Enter the following information:
-
Server Name or IP Address: Specify the SMTP host or IP used to send emails.
-
From Email Address: Enter the sender address that appears in outgoing notifications.
-
Email Subject: Define the default subject line for Continuous Compliance email notifications.
-
-
Verify your entries and ensure that the SMTP server is reachable from the engine.
-
-
Click Next to continue.
-
-
On the Authentication page, configure how users access the Delphix Continuous Compliance Engine. You can set up LDAP and SAML/SSO authentication methods according to your organization’s access policies.
-
Configure LDAP
Configure the Continuous Compliance LDAP service using the Continuous Compliance API before enabling LDAP on this page. To sync LDAP settings from the setup application into Continuous Compliance at engine startup, select Use LDAP (Server/Port required; TLS optional) and Configure LDAP for Continuous Compliance Engine (Base DN/LDAP filter required; MS AD domain optional). If both are selected and required fields are set, the configuration syncs automatically. The Enable toggle is not synced and must be enabled manually in Continuous Compliance. Ensure a Continuous Compliance user exists in LDAP before enabling LDAP. If you import or modify certificates in the TrustStore, restart the masking service for the changes to take effect. In the setup application, the Test Connection button does not validate the Base DN, LDAP filter, or Microsoft AD domain values. If you get locked out, refer to the LDAP Troubleshooting & Recovery page.
In the setup application, the Test Connection button performs an LDAP bind test that validates all configuration fields except the LDAP filter. This aligns with the behavior in the Continuous Compliance Engine.-
Select Use LDAP to enable authentication with your existing LDAP server.
-
Enter LDAP Server and Port details.
-
(Optional) Select Protect LDAP traffic with SSL/TLS to secure communication over the port number entered above (636 for SSL/TLS).
-
Select the Authentication method.
-
(Optional) Click Import Server Certificate to upload the LDAP certificate. To import a certificate, you must provide a host, port and protect LDAP traffic with SSL/TLS.
-
(Optional) Click Test Connection to verify the connection to your LDAP server.
-
-
Configure SAML/SSO
-
Select Use SAML/SSO to enable single sign-on authentication.
-
Review the Entity ID displayed on the page. This is the unique identifier of your engine as a SAML/SSO service provider.
-
Copy and paste the IdP Metadata XML from your identity provider into the IdP Metadata field. In your identity provider (IdP), set the Audience Restriction values (SP Entity ID and Partner’s Entity ID) to match this Entity ID.
-
(Optional) Expand the Advanced Options section and configure the following fields:
-
Response skew time in seconds: Specify the maximum time difference allowed between the SAML response and the engine’s current time. the default is 120 seconds.
-
Maximum age of IdP authentication in seconds: Specify how far in the past the engine accepts authentication from the IdP. the default is 86,400 seconds (1 day).
-
-
-
Configure OAuth2
-
Select Use OAuth2 access tokens to enable token-based authentication for users accessing the Delphix Continuous Compliance Engine.
-
Enter the following details:
-
Issuer URI: Specify the URI of the OAuth authorization server.
-
Audience: Define the intended audience of the access tokens. The default is api://delphix.
-
User Identifying Claim: Enter the claim in the token used to associate a JWT with a Delphix Engine user. The default is sub.
-
-
(Optional) Expand Advanced Options to configure additional parameters:
-
JWK Set URI: Enter the URI of the JSON Web Key (JWK) set used for validating tokens.
-
User Matching Field: Select the Delphix user property that matches the user ID claim. The default is PRINCIPAL.
-
Access Token Skew Time: Define the time window (in seconds) allowed for clock drift between systems when validating tokens. The default is 60 seconds.
-
-
-
Click Next to continue.
-
-
On the Network Authorization page, select Use Kerberos authentication to communicate with remote hosts to enable secure communication with remote hosts using Kerberos credentials.
-
Configure Host Connection Authentication: When connecting to hosts, you can define username-password pairs directly or use an external Enterprise Password Vault for credential management.
-
Click + to add a new vault entry.
-
In the Vault Type drop-down, select the vault provider (for example, CyberArk).
-
Enter the following details:
-
Vault Name: Specify a descriptive name for the vault connection.
-
Vault Hostname: Enter the hostname or IP address of the vault server.
-
Port: Provide the connection port number used by the vault (for CyberArk, the default is typically 443).
-
App ID: Enter the application ID used to authenticate the Delphix Engine with the vault.
-
Authentication Certificate: Paste or upload the vault’s authentication certificate.
-
Private Key: Provide the private key associated with the authentication certificate.
-
-
Click Save to add the vault configuration.
-
(Optional) Repeat the process to add multiple vaults as needed.
-
-
Click Next to continue.
-
-
On the Registration page, activate the Delphix Continuous Compliance Engine and associate it with your Delphix Support or Community account. You can register the engine online (if internet connectivity is available) or offline (if external access is restricted).
If the Delphix Engine has access to the external Internet (either directly or through a web proxy), then you can auto-register the Delphix Engine. If external connectivity is not immediately available, you must perform manual registration by copying the Delphix Engine registration code and completing the registration process on the Delphix registration portal. Click Next to continue.
-
The final Summary tab will enable you to review your configuration. Click Submit to acknowledge the configuration.
Log in to the Delphix Continuous Compliance Engine
-
Login to a web browser that points to
http://masking-engine.example.com/masking. -
Enter default username:
admin. -
Enter default user password:
Admin-12.