Authing DocsDocuments
Concept
workflow
Guides
Development Integration
Application integration
Concept
workflow
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

  • Authenticate the user

  • Authority management for users

  • Authorization

  • Manage user accounts

  • Manage User Directory

  • Management Application

  • Become a source of federal authentication identity

  • Connect to an external identity provider (IdP)

  • Open up WeChat ecology
  • Migrate users to Authing

  • Management organization

  • Expandable capabilities

  • Audit Log

  • Configure security information

  • Configure user pool information

  • Deployment plan

    • Basic deployment mode
    • Docker deployment mode
    • Kubernetes deployment mode
    • Custom Domain Name Configuration Scheme
  • Frequently Asked Questions FAQs

  1. Guides
  2. /
  3. Deployment plan
  4. /
  5. Docker deployment mode

¶ Docker Deployment

Update Time: 2025-05-14 08:32:28
Edit

¶ Overview

Docker Compose is a set of orchestration tools based on the Docker engine. You can use Docker Compose to quickly deploy the Authing IDaaS platform with one click Authing under the Docker deployment scheme is a stand-alone deployment. If you want to deploy a highly available version of Authing, please refer to:Kubernetes Deployment. This article will introduce the Docker Compose-based deployment plan of the Authing IDaaS platform and specific operation instructions.

¶ Overall structure

The main components of the Authing IDaaS platform architecture include: object storage service, Redis, ElasticSearch, Postgres and Authing Server.Authing Server, as the main service of the Authing IDaaS platform, receives requests from clients; object storage is used as a service for storing static resources; Redis stores session information, data caching, etc.; Postgres is used to store core business data; ElasticSearch is used for data statistical analysis and logs collection and analyze the work. Authing IDaaS platform uses the ELK architecture for logging system. The Authing Server writes logs into the Log File. Logstash writes the log information into the ElasticSearch service by reading the Log File. This ensures that multiple IDaaS clusters follow a unified pipeline: Collection -> Transmission -> Storage -> Analysis process, and Kibana is used as a graphical UI management interface for operation and maintenance management, which greatly reduces the complexity and error rate of operation and maintenance work, and improves the work efficiency of operation and maintenance staff.

¶ Deployment plan

1. Component planning

serverComponent packageFunction Description
ElasticSearchelasticsearch-7.7.0Search engine, log service
Authing ServerAuthing-server-1.2.0Authing main service
Redisredis-4.0.0Cache service
PostgreSQLpostgres-12.5Database service
Logstashlogstash-7.7.0Log collection and analysis service
JDBC-Riverjdbc-logstash-river:1.0.0Background data service
StaticfilesAuthing-staticfiles:1.0.0Static resource service

2. System environment requirements

Docker version requirements:

projectversion
Client19.03.14 and above
Server19.03.14 and above

Operating system environment requirements:

projectMinimum configurationRecommended configuration
Operating system platformlinux/amd64-
Kernel versionlinux 3.10.0 and above-

server configuration:

projectMinimum configurationRecommended configuration
CPUX86 64 bit 8 coreX86 64 bit 16 core
RAM32 GB64 GB and above
hard disk500 GB2 TB
Intranet bandwidth100 Mbps1 Gbps

3. Related Documents

nameDescription
"Authing IDaaS Platform User Guide Version 1.2.0"Introduce Authing IDaaS platform operation guide
"Authing IDaaS Platform Product Documentation Version 1.2.0"Introduce Authing IDaaS platform product features

Note: Please contact the pre-sales staff for the above resources.

4. Installation packages

nameDescription
Authing-jdbc-logstash-river-1.0.0-90875fa84d87.tarAuthing back-end data service image package
Authing-server-1.2.0-32d8b4130bae.tarAuthing main service image package
Authing-staticfiles-1.0.0-a70a58e3c115.tarStatic resource service image package
elasticsearch-7.7.0-7ec4f35ab452.tarSearch and data statistics service mirror package
logstash-7.7.0-30dcca1db5e9.tarLog collection and analysis service image package
postgres-12.5-386fd8c60839.tarDatabase service mirroring package
redis-4.0.0-3189e099eb0f.tarCache service image package

Note: Please contact the pre-sales staff for the above resources.

5. Component files

nameDescription
docker-compose.ymlAuthing Docker Compose One-click file layout

Note: Please contact the pre-sales staff for the above resources

Prev: Basic deployment mode Next: Kubernetes deployment mode
  • Overview
  • Overall structure
  • Deployment plan

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.