Authing DocsDocuments
Concept
workflow
Guides
Development Integration
Application integration
Concept
workflow
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

  • Authenticate the user

  • Authority management for users

  • Authorization

  • Manage user accounts

  • Manage User Directory

  • Management Application

  • Become a source of federal authentication identity

  • Connect to an external identity provider (IdP)

  • Open up WeChat ecology
  • Migrate users to Authing

  • Management organization

  • Expandable capabilities

  • Audit Log

  • Configure security information

  • Configure user pool information

  • Deployment plan

    • Basic deployment mode
    • Docker deployment mode
    • Kubernetes deployment mode
    • Custom Domain Name Configuration Scheme
  • Frequently Asked Questions FAQs

  1. Guides
  2. /
  3. Deployment plan
  4. /
  5. Basic deployment mode

¶ Basic Deployment

Update Time: 2025-02-18 09:00:47
Edit

¶ Overview

Orchestration-based containerized deployment operation and maintenance has gradually become the current mainstream method. Whether it is an infrastructure environment based on Kubernetes or Docker, business components can be built quickly through orchestration, and efficient operation and maintenance management can also be achieved. Here we It is recommended that you use a container-based deployment scheme.

  • Docker deployment
  • Kubernetes deployment

Of course, we also provide a traditional physical machine-based deployment solution. The advantage of physical machine deployment is that it can make full use of the resources of the physical machine and can finely control the deployment process. This article will introduce the basic deployment plan of Authing IDaaS platform and specific operation guidance.

¶ Overall structure

The main components of the Authing IDaaS platform architecture include: object storage service, Redis, ElasticSearch, Postgres and Authing Server.Authing Server, as the main service of the Authing IDaaS platform, receives requests from clients; object storage is used as a service for storing static resources; Redis stores session information, data caching, etc.; Postgres is used to store core business data; ElasticSearch is used for data statistical analysis and logs collection and analyze the work.

¶ Deployment plan

1. Component planning

serverComponent packageFunction Description
ElasticSearchelasticsearch-7.7.0Search engine, log service
Authing ServerAuthing-server-1.2.0Authing main service
Redisredis-4.0.0Cache service
PostgreSQLpostgres-12.5Database service
Logstashlogstash-7.7.0Log collection and analysis service
JDBC-Riverjdbc-logstash-river:1.0.0Background data service
StaticfilesAuthing-staticfiles:1.0.0Static resource service

2. System environment requirements

server configuration:

projectMinimum configurationRecommended configuration
CPUX86 64 bit 8 coreX86 64 bit 16 core
RAM32 GB64 GB and above
hard disk500 GB2 TB
Intranet bandwidth100 Mbps1 Gbps

Operating system environment requirements:

projectMinimum configurationRecommended configuration
Operating system platformlinux/amd64-
Kernel versionlinux 3.10.0 and above-

3. Related Documents

nameDescription
"Authing IDaaS Platform User Guide Version 1.2.0"Introduce Authing IDaaS platform operation guide
"Authing IDaaS Platform Product Documentation Version 1.2.0"Introduce Authing IDaaS platform product features

Note: Please contact the pre-sales staff for the above resources

4. Installation package

nameDescription
Authing-jdbc-logstash-river-1.0.0.tar.gzAuthing back-end data service installation package
Authing-server-1.2.0.tar.gzAuthing service installation package
Authing-staticfiles-1.0.0.tar.gzStatic resource service installation package
elasticsearch-7.7.0-linux-x86_64.tar.gzElasticSearch service installation package
logstash-7.7.0-linux-x86_64.tar.gzLogstash service installation package
postgres-12.5-linux-x86_64.tar.gzPostgreSQL service installation package
redis-4.0.0-linux-x86_64.tar.gzRedis service installation package

Note: Please contact the pre-sales staff for the above resources

Prev: Deployment plan Next: Docker deployment mode
  • Overview
  • Overall structure
  • Deployment plan

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.