Skip to main content

Customer-Hosted SecureAuth Deployment Overview

This section provides an overview of deploying the SecureAuth IAM platform in customer-hosted environments—whether on-premises, in private data centers, or in self-managed public cloud infrastructure (e.g., AWS, Azure, GCP).

Learn about available deployment models, required dependencies, and how to configure SecureAuth for production readiness.


Deployment Options

SecureAuth is designed to be deployed on Kubernetes (K8s) using Helm Charts. We follow a GitOps approach, where infrastructure and configuration are version-controlled and centrally managed through Git.

To get started, visit our official reference repository:
➡️ acp-on-k8s GitHub Repository

Warning
The example deployment in the repository is not production-ready by default.
Before going live, ensure your environment is hardened and production configured.

K8s with Helm


Deployment Modes

SecureAuth offers three deployment modes to support various use cases:

  • Dev Mode – Quick start for evaluation or demo purposes
  • Base Mode – Deploys SecureAuth and core dependencies in a high-availability architecture
  • Full Mode – Adds observability components like tracing, logging, and metrics

Not sure which to choose?
Compare them here: Selecting the Right Deployment Mode


Core Dependencies

SecureAuth supports the following components as part of its customer-hosted deployment:

DependencyRequirementDescription
CockroachDBRequiredStores user identities, client configurations, consent records, and more.
Redis ClusterRequiredStores session data, access tokens, ID tokens, and other key-value pairs.
TimescaleDBOptionalStores audit logs and analytics using a time-series-optimized database.
SpiceDBOptionalEnables fine-grained authorization (FGA) for applications integrated with SecureAuth.
Fission or Self-Managed FaaS