Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
The virtual appliance supports VMware vSphere 6.5+, and as Oracle VM Virtualbox 6.0+.
The virtual appliance runs Alpine Linux.
Note: The virtual appliance is preconfigured with minimum CPU, RAM, and storage values. Unless instructed otherwise by Veza support, do not adjust the default values.
From the VMware Host Client Inventory screen, follow these steps to import the virtual appliance:
Right-click Host in the VMware Host client inventory and select Create/Register VM
In the New Virtual Machine window that appears, on the Select creation type page, select Deploy a virtual machine from an OVF or OVA and click Next
On the Select OVF and VMDK files page, provide a unique name for the virtual machine (ex: veza_insight_point
)
Click the blue pane to begin browsing to the location of the veza_insight_point_v2.ova
file on your local system storage
Browse to and select the veza_insight_point_v2.ova
file, then click Open
The file appears in the blue pane in the New Virtual Machine wizard; click Next
On the Select storage page, select the storage type (Standard) and choose a datastore for the virtual machine, then click Next
On the Deployment options page, select network mappings, disk provisioning, and power-on settings, then click Next
On the Ready to complete page, review the virtual machine details and click Finish
In the Oracle VM VirtualBox Manager, follow these steps to import the virtual appliance:
In the File menu, click Import Appliance
In the Appliance Import Wizard window that appears, click Choose to select the location of the veza_insight_point_v2.ova
file
Browse to the location of the veza_insight_point_v2.ova
file and click Open
Review the Appliance Import Settings displayed in the window and click Import
The Insight Point requires a registration key to authenticate with the Veza platform. To generate an Insight Point registration key, follow these steps:
Browse to your Veza Instance and log in as an administrative user.
In the left navigation pane, locate Configuration, then click Insight Point in the subpane.
Click Generate New Key in the upper-right corner of the main pane.
Provide a name for the new Insight Point and set an expiration date and time.
Click Generate Key
Make note of the key value that is returned; this will be required for configuring the Insight Point below
Once the virtual appliance is deployed and powered on, complete the initial configuration from the hypervisor console or using SSH.
Log in to the virtual appliance with the root
account. This account has no password when initially deployed.
From the shell prompt, run setup-veza
to configure the system. The Message of the Day banner refers to this command when logging in.
After invoking the setup-veza
command, follow the prompts:
Set the timezone for the virtual machine
Note: Communication between the Insight Point and the Veza SaaS platform is sensitive to time drift. Ensure that the virtual machine's clock matches the local time.
Set an appropriate hostname for the virtual appliance
Configure the eth0 interface to use DHCP or static values
If using static interface values, configure DNS settings
Set a password for the root
account
Enter the Insight Point Registration Key
Note: This value is a long base64-encoded string; copy it from the Veza platform and paste the value here
The docker daemon will pull the most recent Insight Point image; this might take several seconds to initialize without screen output
The command will return to the shell prompt after the Insight Point deploys.
After the Insight Point deploys, verify that it has successfully connected to the Veza platform. Log in to the Veza platform and follow these steps:
On the left navigation pane, under Configuration, click Insight Point
Verify that a new Insight Point has registered with the platform.
Note: One Insight Point will be named "Veza Insight Point" by default. Ensure at least two are present.
If the newly deployed Insight Point does not appear on the Veza platform, verify the status of the container on the virtual machine:
Log into the virtual machine console or use SSH
List running Docker processes with the command: docker ps -a --filter="name=veza-insight-point"
Examine the output
The Insight Point's container ID should include a Status column showing Running
.
If the Insight Point does not appear to be running, or if requested by Veza support, follow these steps to access the Insight Point logs:
Log into the virtual machine console or use SSH
Run the following command to output the Insight Point logs: docker logs veza-insight-point
The logs are in JSON format and can be output to a file or copied from the terminal for debugging
You can run an on the virtual machine service of your choice with a Veza-provided OVA image. The file includes a full Linux environment within a single file that can run on VMWare vSphere, Oracle Virtualbox, or another VM manager.
Download the current Insight Point build from
Secure datasource discovery using an Insight Point running in your own environment.
An Insight Point is a lightweight connector running in your environment to enable the secure gathering of authorization metadata for resources that Veza cannot access directly. An Insight Point is typically deployed as a Docker container or VM OVA.
Typically, you will want an Insight Point to enable secure discovery of services (such as Active Directory, Oracle Database, or SQL Server) that require connectivity from within your corporate network. The Insight Point will run within your network to query the internal-only data sources for authorization metadata and push that information to Veza securely.
Deploying an Insight Point for Veza is usually not required, but might be necessary:
When the resources to discover are not exposed publicly.
To discover databases and other services that do not have cloud-native APIs.
If your organization prohibits 3rd-party programmatic access to cloud service providers.
Log in to Veza with an administrator account, and create a registration key by browsing to Integrations > Insight Points:
Click Create
Enter a Name
Click Generate Key
Copy the key for use when running the docker image
Save the Insight Point key in a secure location. If lost, there is no way to recover it.
Refer to specific deployment guides for troubleshooting steps.
Checking connectivity
The Insight Point automatically checks for connectivity on container start. This includes steps to resolve the DNS and verify TCP and HTTP communication. If there are connection problems, the container logs will indicate if a connection was refused, a host could not be found, or there is another issue.
Monitoring Insight Point availability
Note: If the Insight Point task manager service is restarted, the event can be emitted sooner than the 24-hour window.
To enable email alerts when an Insight Point is unavailable:
Use the Veza navigation menu to open Administration > Event Subscriptions
Click Create Subscription
On the Details tab, enter a descriptive name to communicate the alert purpose.
On the Conditions tab:
Set Event Type to "Insight Point Unavailable"
Set Severity to "Error"
Set Category to "Integrations"
On the Action → Send Alert tab, select or create an email Veza Action
Click Create to save the subscription
When modifying the Insight Point associated with an integration — for example, if the registration key is lost — you will need to re-enter the credentials and secrets for that integration configuration.
Follow the instructions to start another Insight Point with a new deployment key
On the Integrations page, edit the integration configuration to re-enter the credentials for each affected integration.
The Insight Point will communicate out from the container VM to the Veza Tenant and targeted systems. Your implementation must enable traffic to and from the host on the required ports.
Also, the host must be able to communicate out to the ECR repository hosting the insight point image.
yes
Veza Tenant
TCP
443
yes
public.ecr.aws
TCP
443
for AD
AD Domain Controller
TCP/UDP
636
for SQL
SQL Server
TCP
1433
The Insight Point must be able to communicate with https://<your-org>.vezacloud.com
on outbound port 443. Ensure that firewalls allow outbound traffic to the Veza tenant domain.
For Active Directory and SQL Server: The Insight Point must be allowed to communicate with Active Directory Domain Controllers on port 636
, and SQL Servers on port 1433
.
For AWS RDS and Trino: To discover AWS RDS or Trino instances, you will need to add the Insight Point egress IP to the Security Groups Inbound rules. Do this for each of the instances to discover.
To add an entry for AWS RDS:
Log in to the AWS account containing the resources to discover, and go to RDS > Databases
Click the DB identifier and go to Connectivity & security > Security > VPC security groups
Click Inbound rules > Edit inbound rules to set the IP address entry
Click Add rule > Type (MySQL, Aurora or PostgreSQL) > Source (Custom)
Enter the Insight Point egress IP
Optionally enter a description and click Save rules
To add an entry for Trino:
Log in to the AWS account containing the resources to discover, and go to EC2 > Security Groups
Click the Security Group associated with your Trino instances and go to 'Inbound rules' > 'Edit inbound rules' to set the IP address entry
Click 'Add rule' > Type (Custom TCP) > Port Range (8080 or your custom port) > Source (Custom) > enter the Insight Point egress IP
Optionally enter a description, and save the rules
To ensure a smooth onboarding process, configure your environment to allow communication with essential Veza IP addresses and email domains.
The following domains should be allowed through email filters, proxies, and firewalls:
Email notifications: When a Veza local account is created, an email is sent to the user to create their password. This email comes from noreply@vezacloud.com
.
Veza tenant domain: The domain for your Veza instance will be *.vezacloud.com
, where *
represents your Veza tenant name.
Veza integrations connect to data sources across your on-premise environment, cloud providers, and SaaS applications. Most integrations use API tokens or other credentials to query for authorization metadata.
By default, integrations run on the Veza SaaS platform. If your organization filters inbound connections to applications you want to integrate with Veza, allow traffic from the following Veza NAT Gateway IP addresses in your firewall rules or filters, depending on the region where Veza is deployed:
North America regions:
18.221.224.60
3.18.38.252
52.14.66.128
Europe, Middle East, and Africa regions:
18.133.37.58
18.171.45.61
13.42.176.0
When configuring an integration, you can choose to use an Insight Point managed by your organization. An Insight Point allows querying authorization metadata within your environment, with no inbound calls from your Veza tenant to integrated data sources.
Generic instructions for running an Insight Point as a Docker container on Debian / Ubuntu / Amazon Linux / RedHat Linux.
Veza maintains a script you can use to quickly install and run an Insight Point with Docker. Follow these steps to set up your environment, run the latest install script, and manage the deployment.
Systemd
Docker (or Podman with Docker compatibility)
Generate an Insight Point key from the Veza Integrations > Insight Point page. Store it as an environment variable before downloading and executing the script:
or
Uninstall will remove all components of the Insight Point but will not remove the configuration in /etc/veza-insight-point.
Remove will remove all components of the Insight Point and the configuration in /etc/veza-insight-point. The Insight Point Key will be lost (if not backed up).
The Insight Point image must be pulled from a pull-through cache or private registry (where the image is mirrored). You can override the image repository with the IMAGE_REPOSITORY
config setting.
Create or edit the configuration in /etc/veza-insight-point/service.env
to set the IMAGE_REPOSITORY configuration
:
If pulling some other image version than the default image tag (latest
), you need to configure the override using the IMAGE_TAG
option:
After the changes have been made and saved, restart the Insight Point service:
Check that the service has started successfully by running the following command:
If you need to use a proxy server, add the HTTP_PROXY, HTTPS_PROXY, and NO_PROXY lines to the Insight Point service configuration.
Create or edit the configuration file /etc/veza-insight-point/config.env
to include the proxy server details:
After the changes have been made and saved, restart the Insight Point service:
Check that the service has started successfully by running the following command:
An Insight Point can proxy connections to Veza, allowing you to send Open Authorization API (OAA) payloads to a locally accessible server within a VPC instead of directly over the internet.
When a proxy port is enabled in the configuration, applications can push to the Insight Point's internal network address (e.g., http://localhost:8080/api/v1/providers/custom/...
), instead of making API calls directly to Veza's cloud service (https://$VEZA_URL/api/v1/providers/custom/...
).
Create or edit the configuration file /etc/veza-insight-point/service.env
to set the proxy port:
Save the changes. Then, restart the Insight Point service:
Proxy server is supported since Veza release 2025.5.x. For older Insight Points, you will need to reinstall before you can enable a proxy port:
Create or edit the configuration file /etc/veza-insight-point/service.env
to mount the custom certificates to the Insight Point container:
After the changes have been made and saved, restart the Insight Point service:
Check that the service has started successfully by running the following command:
Retrieve the status of the Insight Point systemd
service:
Retrieve last 500 log lines for the Insight Point service:
Follow logs for the Insight Point service:
Reinstall will remove the currently installed Insight Point service and install it again. All configuration in /etc/veza-insight-point will be preserved.
Follow the instructions to launch a new AWS EC2 instance, install prerequisites, and download and run the Insight Point. You can opt to use an existing EC2 instance, provided that the docker version is 19.09
or later.
Ensure that the region where you want to initialize the instance is selected
Click Launch Instance
Add a name for the instance ("Veza Insight Point")
Choose Amazon Linux 2023
OS image
Dedicate at least 2 CPU
, 4GB RAM
for the instance
Choose an existing key pair or create a new one
After the Insight Point deploys, verify that it has successfully connected to the Veza platform. Log in to the Veza platform and follow these steps:
On the left navigation pane, under Configuration, click Insight Point
Verify that a new Insight Point has registered with the platform.
Note: One Insight Point will exist by default, named "Veza Insight Point".
If the newly deployed Insight Point does not appear on the Veza platform, verify the status of the container on the virtual machine:
Log into the virtual machine console or use SSH
List running Docker processes with the command: docker ps -a
Examine the output
The Insight Point's container ID should include a Status column showing Running
.
If the Insight Point does not appear to be in a running state, or if requested by Veza support, follow these steps to access the Insight Point logs:
Log into the virtual machine console or use SSH
Run the following command: docker ps -a
Note the value in the Container ID
field
Run the following command to output the Insight Point logs: docker logs <container_id>
, substituting the actual container ID
The logs are in JSON format and can be output to a file or copied from the terminal for debugging
Instructions for running an Insight Point as a Docker container using an Azure container instance.
In the creation wizard, use a custom image source. Select Other registry and add the path to Insight Point image: public.ecr.aws/veza/insight_point:latest
Add the Insight Point to the virtual network. Choose Private and enter the virtual network assigned to other resources the Insight Point will connect to:
In the advanced settings, configure the Insight Point registration key:
Navigate to the Advanced tab.
In the Environment Variables section, add the Insight Point provisioning key to the DP_REGISTER_KEY
variable.
To generate a new registration key, visit the Integrations -> Insight Point page in the Veza console.
Confirm your settings by clicking Review + create, then deploy the container by selecting Create.
Finally, update the integration configuration in Veza so that the connection is made using the new Insight Point, instead of the Veza SaaS platform:
Log in to Veza, go to the Integrations page, and find the Azure integration on the list of providers.
Click Edit to open the configuration.
Change the Insight Point from (default) to the one you created.
Save the integration.
Deploy an Insight Point to a Kubernetes cluster.
The Insight Point Helm chart accepts the following configuration parameters via --set
flags. Typically only key
is required.
key
is your unique Insight Point registration key, generated in the Veza UI.
Create a key in Veza: Integrations > Insight Points > Create
Store this value securely as it cannot be recovered if lost
skipVerify
(TLS_INSECURE_SKIP_VERIFY) should only be set to true
to disable certificate validation for testing/troubleshooting.
When using an HTTPS inspection proxy:
Set to addr
to your proxy's address if different from the Veza endpoint. This value overrides the default request authority.
Ensure your proxy can connect to your Veza deployment.
authority
specifies the domain name to use for TLS certificate validation and is only required when addr
points to a proxy instead of directly to Veza. Must be a specific domain (wildcards not supported).
To trust an HTTPS proxy, you will need to modify the Helm chart to add a volume for the proxy's CA certificate, mount it into the container, and configure the certificate path:
A Kubernetes Helm chart is a package format used to define, install, and upgrade applications in Kubernetes. Helm is often referred to as a package manager for Kubernetes. To install the chart, you will need:
Insight Point Key: You will need to generate a secret key for the Insight Point. To create one, go to Veza Integrations > Insight Point > Create.
Access to the Kubernetes Cluster: Ensure you have the necessary permissions and access credentials to interact with the target Kubernetes cluster.
Your organization security policies must allow chart installation from the VEZA ECR public.ecr.aws/veza
Customize Values and Install the Insight Point:
Use the helm install
command to install the Insight Point into the Kubernetes cluster. Replace <NAME>
, <VERSION>
, <KEY>
, and key with your specific values:
--namespace <NAMESPACE>
: required if installing the Insight Point into a different namespace than the default.
--create-namespace
: required if the namespace does not exist yet.
--set enableSecrets=true
: optional field, required to enable Kubernetes Secrets extraction. Secrets will not be extracted by default.
An Veza Insight Point Key must be provided. To do this, you can specify the value with the --set key=<registration-key>
option when installing the chart.
Example:
Verify Installation:
Verify the status of the installation by running:
This command will return a list of Helm releases, including the Insight Point you just installed. Ensure the STATUS is "DEPLOYED."
Get Insight Point Logs:
If the Insight Point fails to initialize or can't connect to Veza, you can get more details by reviewing the container logs. You can retrieve this using the terminal:
Upgrade and Maintain:
Over time, you may need to upgrade the Insight Point to newer versions or adjust its configuration. Use the helm upgrade
command to make these changes.
Example:
Uninstall the Insight Point:
If you need to uninstall the Insight Point, you can do so using the helm uninstall
command:
To discover on-premise and .
Veza provides an to install an Insight Point for common Linux distributions.
The Insight Point is also available as an suitable for Oracle Virtualbox or VMWare VSphere. This option can be preferable to Docker for Windows-based environments.
For AWS environments, see for instructions to start an Insight Point on AWS EC2.
After deploying the Insight Point, you can specify it when an integration. Veza will use the Insight Point for secure collection and transmission of entity metadata.
The Veza platform emits an Insight Point Unavailable event after the Insight Point is unavailable for several minutes. To reduce the number of times this event triggers, the task manager will not re-emit the event for 24h hours. An administrator can configure to get email notifications when connectivity issues impact Veza data collection.
Insight Point: If using an , access to public.ecr.aws
must be allowed for the Veza Insight Point.
When using this option, outbound traffic must be enabled, to allow the Insight Point to transmit authorization metadata securely to your Veza tenant. The Insight Point must also be able to pull images from the Veza ECR repository, as detailed in .
To configure custom certificates, see the section.
This document provides instructions to start an AWS EC2 virtual machine and run an as a Docker image. For generic instructions for Docker (suitable for Azure VMs), see or .
Open the
To discover standalone RDS or Trino databases, ensure that allow communication to and from the Insight Point's outbound IP address.
If you are deploying a new Insight Point, Veza recommends using the latest version of the Insight Point OVA. Please follow the instructions in the for the most current deployment instructions.
Veza recommends deploying an Insight Point within Microsoft Azure for a secure connection to resources. This document includes instructions to run an Insight Point with an Azure Container Instance.
Log in to your Azure Tenant and go to . Create a new resource:
The requires an running within the cluster to discover RBAC entities. When adding the integration, you will specify the cluster details and the Insight Point to use. Veza provides a helm chart to simplify the process of deploying and managing the Insight Point.
Insight Point Version: Note the most recent Insight Point version (e.g. 2024.8.12-9
) from .
Helm Installed: Ensure Helm version 3.8
or greater is installed on your local machine. You can install Helm by following the official documentation: .
key
Insight Point Registration key for connecting to Veza
""
--set key=abc123
addr
Address for Veza API connection, overriding the one provided by the key
""
--set addr=customer.vezacloud.com
skipVerify
Disable TLS certificate validation
false
--set skipVerify=true
authority
Overrides the request authority for certificate validation
""
--set authority=veza.example.com
To ensure secure communication between Veza and Workday, we adopt an authentication mechanism using public-private key pairs. This approach uses SSL (Secure Socket Layer) technology, which establishes encrypted links between servers and clients, ensuring that all data transmitted remains private and secure. x509 certificates are a standard format for public key certificates, verifying the ownership of a cryptographic public key for secure communication.
Security: Public-private key pairs are the foundation of many cryptographic protocols, ensuring the confidentiality, authenticity, and integrity of data.
Authentication: Workday can verify that data received is genuinely from Veza, ensuring trusted communication.
Non-repudiation: Transactions signed with the private key can be proven to come from Veza.
Most Linux distributions include OpenSSL by default. If not:
Debian or Ubuntu: sudo apt update && sudo apt install openssl
Red Hat: sudo yum install openssl
Fedora: sudo dnf install openssl
OpenSSL is included with macOS by default. If you need a specific version or updates:
OpenSSL Binary:
Add OpenSSL's bin
directory to your system's PATH.
Windows Subsystem for Linux (WSL):
Run the Linux distribution and install OpenSSL using its package manager (e.g., sudo apt install openssl
for Ubuntu).
Git Bash for Windows:
Use OpenSSL directly from the Git Bash terminal.
Package Manager for PowerShell:
Alternately, you can use the Microsoft Management Console (MMC):
Use the built-in MMC snap-in to manage certificates:
Press Win + R
, type mmc
, and press Enter.
File > Add/Remove Snap-in > Certificates > Add.
Follow the wizard to manage personal certificates and trusted root certificates.
1. Generate a Private Key:
The private key is the foundation of your security protocol. Ensure it is secure and never exposed.
Generate it with OpenSSL in PEM format:
If you need additional security, encrypt the key file with a passphrase. Save the passphrase in a secure location:
During Veza integration configuration, you will upload this private key file and, if encrypted, enter its passphrase.
2. Generate a Certificate Signing Request (CSR):
A CSR is a request for a certificate authority (CA) to validate and certify your public key. The CSR includes information such as your organization and domain.
Generate the CSR:
During the process, you'll be prompted to enter details like your organization and common name (CN). These are optional depending on your integration requirements.
Post generation, you can either:
Submit the CSR to a trusted Certificate Authority for a signed certificate.
Create a self-signed certificate, which might not be trusted universally but is sufficient for testing or internal use.
3. Generate a Self-Signed Certificate:
Using the CSR and private key, generate the certificate:
In this example, days
sets the length of time the certificate is valid for.
Paste the contents of this certificate, which includes the public key, when configuring the API client registration in Workday.
Use : brew install openssl
Download and install from .
Install .
Install , which includes Git Bash.
Use a package manager like . After installing Chocolatey, run: choco install openssl