Prerequisites
- A supported operating system — The Orchestrator runs on Linux, macOS, Windows, and in containers. See the installation reference for full system requirements.
- An identity provider account — You need an account with an identity provider such as Azure AD or Okta. This is the system your users log into today.
- A target application — Any web application running on a URL you can reach from the machine where the Orchestrator will run.
Install and Configure
Install the Orchestrator
The Maverics Orchestrator is a small, lightweight runtime that deploys almost anywhere — on a virtual machine, in a container, or on bare metal. Installation takes just a few minutes.The Orchestrator sits between your users and your applications, handling authentication and identity routing so your apps do not have to. Think of it as an identity abstraction layer — it authenticates users against your identity provider and then forwards authenticated requests to your upstream applications.
- Console UI
- Configuration
The fastest way to get started is to download an evaluation bundle from the Maverics Console.
- Log in to the Maverics Console
- Navigate to Deployments and create a new Deployment
- Select Maverics storage as the configuration provider
- Open the Download Orchestrator Software modal
- Under Evaluation Bundles, download the bundle for your platform:
- Windows:
maverics-evaluation.zip - macOS:
maverics-evaluation.tar.gz - Linux:
maverics-evaluation.tar.gz
- Windows:
- Extract the bundle and run the Orchestrator binary
Connect your identity provider
An identity provider (IdP) is the system that manages your user accounts and handles login — services like Azure AD (now called Microsoft Entra ID), Okta, or Google Workspace. Connecting the Orchestrator to your IdP tells it where to send users when they need to authenticate.The Orchestrator uses Identity Fabric connectors to communicate with your IdP. Each connector handles the protocol details — OIDC, SAML, or LDAP — so you just need to provide your provider’s credentials and endpoint information.
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Define your first application route
An application route tells the Orchestrator which upstream application to protect and how to route traffic. When a user requests your application URL, the Orchestrator intercepts the request, authenticates the user against your IdP, and then forwards the authenticated request to your upstream service.This step connects the identity connector you just configured to a specific application — creating the link between “who the user is” and “what they can access.”
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Start and verify
With the Orchestrator installed, your identity provider connected, and your application route defined, you are ready to start the Orchestrator and confirm everything works.Start the Orchestrator and check its health endpoint to verify it is running:The health endpoint returns a JSON response showing the status of the Orchestrator:Next, open your application URL in a browser. You should be redirected to your identity provider’s login page. After authenticating, you will be redirected back to your application — now with a valid session managed by the Orchestrator.To add session management and identity header injection to this route, continue to the Protect Your First Application guide.
Success! Your Orchestrator is running and your first application route is
protected with single sign-on. Users authenticate through your identity
provider, and the Orchestrator manages the session lifecycle.
Troubleshooting
The Orchestrator fails to start
The Orchestrator fails to start
Check that the configuration file path is correct and that the file is valid
YAML. The Orchestrator logs the specific parsing error on startup — look for
a line starting with
error in the output. Common causes include indentation
issues, missing required fields, or referencing a connector name that does not
match the name in your connectors block.Identity provider connection fails
Identity provider connection fails
Verify that your IdP credentials (client ID, client secret, tenant ID) are
correct and that the Orchestrator can reach your IdP’s endpoints over the
network. If you are using environment variables for secrets, confirm they are
set in the shell where the Orchestrator is running. See the
secret providers reference for
alternative secret management options.
Browser shows a redirect loop or 502 error
Browser shows a redirect loop or 502 error
A redirect loop usually means the callback URL configured in your identity
provider does not match the Orchestrator’s expected redirect URI. Double-check
both sides. A 502 error means the Orchestrator cannot reach your upstream
application — verify the upstream URL is correct and the application is
running.