System and Operation
Operate the Curity Identity Server in a similar manner to a cloud native API. You need to deploy configuration, store identity data and expose HTTPS endpoints. Once the system is up and running you can use standard monitoring and observability patterns to ensure that the system runs reliably, and to gain insights into security events.
System and Operation Concepts#
To learn operational details, browse the System and Operation Guide to gain insights into the following areas.
Deployment
The docs provide additional reference information about deployment planning, like system requirements and a go-live checklist. They also provide some lower level details on clustering and the Java runtime.
Operation and Monitoring
Use mature cloud native observability patterns for logging, tracing and metrics. If the Curity Identity Server experiences problems connecting to dependencies it raises alarms. You can use event listeners to capture security and operational events and handle them in custom ways.
Upgrading
Use cloud native techniques to upgrade the Curity Identity Server with zero downtime. Upgrades deliver new security capabilities which you should integrate frequently, such as once per quarter. Always read the upgrade guides to ensure reliability.
HTTP Server
An in-built HTTP server handles lower-level aspects of HTTP requests. Web assets are served for the built-in login pages and you can also serve custom assets. During OAuth flows, the HTTP server handles aspects like CORS, cross-sire requests and single sign-on (SSO) cookies.
Learn By Use Case#
Since the Curity Identity Server is a cloud native product, you can choose your preferred hosting platform and run it on-premise or in the cloud. If required, you can operate advanced deployments like multi-region, multi-tenant or multi-cloud. The Curity website provides many resources on deployment and operational use cases that explain standards-based operational approaches.
- Use Data Management to store user accounts and operational data like sessions and tokens.
- Use Deployment to provide working endpoints and data sources.
- Use Logging and Monitoring to keep the system running reliably and gain security insights.
Curity Online Training#
To take a deep dive into operational topics, complete the Operator Training Courses. Training explains details like clustering, managing data sources and designing advanced deployments. The training includes multiple deployments that demonstrate concepts.