July 16th, 2024

Our Wandering Path to Supporting 1000s of Domain Names

FusionAuth Cloud now supports unlimited custom domains using Caddy for dynamic TLS certificate provisioning. This change enhances branding consistency and scalability, overcoming AWS constraints for a highly-available infrastructure with customization options.

Read original articleLink Icon
Our Wandering Path to Supporting 1000s of Domain Names

FusionAuth Cloud recently introduced support for unlimited custom domains, a significant milestone for the service. This feature allows customers to configure multiple custom domain names for their authentication servers, maintaining branding consistency. While FusionAuth as a product supports multiple tenants and applications, limitations arise within FusionAuth Cloud due to AWS constraints on certificates, routing rules, and hostnames. To overcome these limitations, FusionAuth implemented a new architecture using Caddy, a reverse-proxy solution that supports dynamic TLS certificate provisioning without restrictions. By leveraging AWS's Elastic Container Service (ECS) and Global Accelerator, FusionAuth was able to build a scalable and highly-available infrastructure to handle unlimited custom domains. This change enables FusionAuth Cloud to cater to a wide range of use cases and offers customers a fully managed private instance with various customization options. The integration of Caddy into the infrastructure was successful, providing seamless certificate provisioning, load balancing, and deployment routing.

Related

Multiple Regions, Single Pane of Glass

Multiple Regions, Single Pane of Glass

WarpStream implements a hub-and-spoke model to provide highly available resources across regions. They use a push-based replication strategy with "contexts" for metadata distribution, prioritizing availability over consistency.

Curl native support for –aws-sigv4 (2023)

Curl native support for –aws-sigv4 (2023)

To interact securely with AWS API Gateway endpoints using AWS Signature Version 4, users can leverage curl commands with proper authentication. The process involves specifying URLs, custom domains, access keys, and service identifiers for seamless integration.

Making Bubbles

Making Bubbles

The concept of "federation bubbles" involves cohesive networks with clear boundaries for account provisioning and federation technologies. Key technologies include SCIM, X.509 certificates, and federation protocols for user management. Emphasizes on interoperability challenges and nuanced solutions.

Identity: Self-Hosted or in the Cloud?

Identity: Self-Hosted or in the Cloud?

Authentik Security introduces open-source Identity Provider, favoring self-hosted solutions for enhanced control and pricing predictability. Shift to self-hosting challenges SaaS dominance, offering comparable reliability and security with improved manageability. Companies prioritize data privacy and flexibility, reflecting nuanced evaluation of needs.

Authelia and Lldap: Authentication, SSO, User Management... for Home Networks

Authelia and Lldap: Authentication, SSO, User Management... for Home Networks

Setting up Authelia and lldap for home network user management involves Docker, configuration files, secrets, Redis, Let's Encrypt, and Caddy for secure HTTPS connections. Enhance security and user management with this guide.

Link Icon 0 comments