Installing Trust Protection Foundation
Review this overview before you start the CyberArk Trust Protection Foundation installation.
BEST PRACTICE Before you install Trust Protection Foundation 25.3, please review Important Considerations before upgrading CyberArk Trust Protection Foundation - Self-Hosted.
To install CyberArk Trust Protection Foundation
-
Prepare your network for Trust Protection Foundation.
For specific instructions, see Preparing your environment for the CyberArk Trust Protection Foundation - Self-Hosted.
-
Configure your database and database accounts.
For more information, see Preparing the database server.
-
Install Trust Protection Foundation.
For specific instructions, see Installing and Configuring Trust Protection Foundation.
- Install Trust Protection Foundation on additional servers, as needed.
-
(Recommended) Replace the default self-signed certificate (Venafi Operational Certificate) with a fully trusted end-entity certificate.
To learn more about the Venafi Operational Certificate, see Securing Trust Protection Foundation's web servers.
To learn how to replace the Venafi Operational Certificate, see Replacing the Venafi Operational Certificate with your own CA-signed certificate.
- After the installation is complete, see Network and local certificate management configuration overview in the CyberArk Trust Protection Foundation Certificate Management Guide for an outline of the steps required to configure Trust Protection Foundation to manage network and local certificates in your encryption environment.
Carefully review Installing and Configuring Trust Protection Foundation before launching the installation process.
TIP To browse topics in this section, use the menu on the left side of this page.