Z
ZITADEL
Z
ZITADEL
Security - Deployment Design
Original message was deleted
ZITADEL
Join
ZITADEL - Identity infrastructure, simplified for you.
4,316
Members
View on Discord
F
FFO
•
8/2/24, 8:55 PM
I think this might help you
F
FFO
•
8/2/24, 8:55 PM
https://zitadel.com/docs/self-hosting/manage/production
ZITADEL Docs
As soon as you successfully deployed ZITADEL as a proof of concept using one of our deployment guides
,
F
FFO
•
8/2/24, 8:56 PM
In short
, deploy zitadel behind a proxy
/waf and only expose the HTTP API of zitadel to the proxy
.
F
FFO
•
8/2/24, 8:56 PM
To further harden zitadel you can restrict access to its apis in the proxy layer and only keep the oidc
, oauth
, saml endpoints open with the login path
F
FFO
•
8/3/24, 7:32 AM
I do not have a list at hand but here you can find the apis
https://zitadel.com/docs/apis/introduction
Easiest would be IMO to just allow the
/oauth
,
/oidc
,
/saml
,
/ui
/login paths
That should work
ZITADEL Docs
ZITADEL exposes all features via different gRPC and REST APIs and provides SDKs for popular languages and frameworks
.
F
FFO
•
8/3/24, 7:33 AM
It is worth noting that you should keep the Db under tight control since it stores the critical data
We take a lot of precautions though for that