Configuration Overview
On this page
When you onboard to the Curity Identity Server, you need to understand configuration and deployment. You may have some concerns about areas like high availability and zero-downtime upgrades. Or you may not understand how this type of system is managed.
The Curity Identity Server is a cloud native product, and deployment itself requires only a simple operation like running a Docker container. If you are using an orchestration platform like Kubernetes, you don't even have to do that. Instead, you simply express your desired state and the platform takes care of deployment for you.
Configuration Management System
The key to managing deployment, high availability and upgrades well is effective configuration management. Whether you are using the full Curity Identity Server or the Standalone Token Handler, the system you deploy has strong configuration support:
Feature | Behaviors |
---|---|
Configuration as Code | You manage your configuration in source control |
Protected Secrets | You store secrets in a secure vault and protect secure values at deployment time |
Parameterized | You parameterize configuration to avoid duplication in your deployment pipeline |
Modular | You modularize your configuration to keep it maintainable |
Reliable | The configuration system is transactional and you can rollback to your last good configuration |
Flexible | Your configuration can express our deployment concepts to enable flexible rollouts |
Learning Configuration
First, familiarize yourself with the basic usage of configuration. Learn how to use the admin UI to make configuration changes, then back them up:
Next, understand how to manage configuration for your deployed environments. By treating configuration as code you can avoid duplication, protect secure values and store your configuration in source control:
Finally, read specific configuration tutorials on topics like the Command Line Interface (CLI) and Keys, Certificates and Trust Stores. You can also consult the Detailed Configuration Guide.
Reliable Deployments
Once you know how to configure the Curity Identity Server, we recommend deploying the same standardized binary Docker image and parameterized configuration to all stages of your deployment pipeline. This avoids duplication of security settings and takes the pain out of production upgrades:
Conclusion
Configuration management and deployment are closely related. When operating a critical component like an authorization server, you should consider a solid configuration management design to be essential. When onboarding to the Curity Identity Server, you have many tools and techniques to help you on your journey.
Join our Newsletter
Get the latest on identity management, API Security and authentication straight to your inbox.
Start Free Trial
Try the Curity Identity Server for Free. Get up and running in 10 minutes.
Start Free Trial