/images/resources/howtos/deploy/configuration-overview.png

Configuration Overview

On this page

When you onboard to the Curity Identity Server, you need to understand how to manage state and deploy the Curity Identity Server. One type of state is identity data like user accounts, credentials, sessions and tokens that you need to manage using database storage. First though, you should understand how to manage configuration, which is the subject of this tutorial.

The Curity Identity Server is a cloud native product, and deployment itself requires only a simple operation like running a Docker container. If you are using an orchestration platform like Kubernetes, you don't even have to do that. Instead, you simply express your desired state and the platform takes care of deployment for you.

Configuration Management System

The key to managing deployment, high availability and upgrades well is effective configuration management. Whether you are using the full Curity Identity Server or the Standalone Token Handler, the system you deploy has strong configuration support:

FeatureBehaviors
Configuration as CodeYou manage your configuration in source control
Protected SecretsYou store secrets in a secure vault and protect secure values at deployment time
ParameterizedYou parameterize configuration to avoid duplication in your deployment pipeline
ModularYou modularize your configuration to keep it maintainable
ReliableThe configuration system is transactional and you can rollback to your last good configuration
FlexibleYour configuration can express our deployment concepts to enable flexible rollouts

Learning Configuration

First, familiarize yourself with the basic usage of configuration. Learn how to use the admin UI to make configuration changes, then back them up:

Next, understand how to manage configuration for your deployed environments. By treating configuration as code you can store many security-related settings in source control or a secure vault and minimize duplication.

Finally, read specific configuration tutorials on topics like the Command Line Interface (CLI) and Keys, Certificates and Trust Stores. You can also consult the Detailed Configuration Guide.

Reliable Deployments

Once you know how to configure the Curity Identity Server, deploy the same standardized machine image and parameterized configuration to all stages of your deployment pipeline. Doing so avoids duplication of security settings and takes the pain out of production upgrades.

Pipeline deployment

Conclusion

Configuration management and deployment are closely related. When operating a critical component like an authorization server, you should consider a solid configuration management design to be essential. When onboarding to the Curity Identity Server, you have many tools and techniques to help you on your journey.

Newsletter

Join our Newsletter

Get the latest on identity management, API Security and authentication straight to your inbox.

Newsletter

Start Free Trial

Try the Curity Identity Server for Free. Get up and running in 10 minutes.

Start Free Trial