/images/resources/howtos/deploy/configuration-overview.png

Configuration Overview

On this page

When you onboard to the Curity Identity Server, you need to understand configuration and deployment. You may have some concerns about areas like high availability and zero-downtime upgrades. Or you may not understand how this type of system is managed.

The Curity Identity Server is a cloud native product, and deployment itself requires only a simple operation like running a Docker container. If you are using an orchestration platform like Kubernetes, you don't even have to do that. Instead, you simply express your desired state and the platform takes care of deployment for you.

Configuration Management System

The key to managing deployment, high availability and upgrades well is effective configuration management. Whether you are using the full Curity Identity Server or the Standalone Token Handler, the system you deploy has strong configuration support:

FeatureBehaviors
Configuration as CodeYou manage your configuration in source control
Protected SecretsYou store secrets in a secure vault and protect secure values at deployment time
ParameterizedYou parameterize configuration to avoid duplication in your deployment pipeline
ModularYou modularize your configuration to keep it maintainable
ReliableThe configuration system is transactional and you can rollback to your last good configuration
FlexibleYour configuration can express our deployment concepts to enable flexible rollouts

Learning Configuration

First, familiarize yourself with the basic usage of configuration. Learn how to use the admin UI to make configuration changes, then back them up:

Next, understand how to manage configuration for your deployed environments. By treating configuration as code you can avoid duplication, protect secure values and store your configuration in source control:

Finally, read specific configuration tutorials on topics like the Command Line Interface (CLI) and Keys, Certificates and Trust Stores. You can also consult the Detailed Configuration Guide.

Reliable Deployments

Once you know how to configure the Curity Identity Server, we recommend deploying the same standardized binary Docker image and parameterized configuration to all stages of your deployment pipeline. This avoids duplication of security settings and takes the pain out of production upgrades:

Pipeline deployment

Conclusion

Configuration management and deployment are closely related. When operating a critical component like an authorization server, you should consider a solid configuration management design to be essential. When onboarding to the Curity Identity Server, you have many tools and techniques to help you on your journey.

Join our Newsletter

Get the latest on identity management, API Security and authentication straight to your inbox.

Start Free Trial

Try the Curity Identity Server for Free. Get up and running in 10 minutes.

Start Free Trial