Skip to content

Deployment

Root Security provides flexible deployment options to meet your organization's security and infrastructure requirements.

Deployment Options

Choose the deployment model that best fits your needs:

Model Description Best For
Cloud Fully managed SaaS solution Fast deployment, minimal maintenance
Self-Hosted Deploy in your own infrastructure Maximum control, regulatory compliance
Hybrid Mix of cloud and on-premises components Balance of control and convenience

Deployment Considerations

When choosing a deployment model, consider:

  • Security Requirements: Regulatory compliance, data residency, and security policies
  • Integration Needs: Connectivity with existing systems and infrastructure
  • Scale: User volume and authentication throughput requirements
  • Operational Resources: Available IT resources for maintenance and updates

System Requirements

Cloud Deployment

  • No infrastructure requirements
  • Modern web browser for administrative console

Self-Hosted Deployment

Minimum requirements:

  • Kubernetes 1.18+ or Docker 19.0+
  • 2 CPU cores, 4GB RAM, 20GB storage per node
  • TLS certificates for secure communication
  • Database: PostgreSQL 11+ or MySQL 8.0+
  • Load balancer for production deployments

High Availability

For production environments, we recommend:

  • Redundant application nodes across availability zones
  • Database replication and backups
  • Load balancing and auto-scaling configurations
  • Regular monitoring and health checks

Getting Started

Refer to our specific deployment guides: