Skip to main content
The Maverics Orchestrator sits at the center of your identity infrastructure — handling authentication tokens, user attributes, client secrets, and session data on every request. That makes it a critical piece of your security posture. These guides walk you through the four pillars of securing your Maverics deployment so that sensitive data stays protected in transit, at rest, and under audit. The four pillars are: TLS for encrypting connections between clients, the Orchestrator, and your upstream applications; secrets management for keeping credentials out of config files by integrating with external vaults; authorization policies for controlling who can access what through multiple access control models — roles, attributes, policies, and external policy decision points; and compliance for audit logging and regulatory reporting. Work through them in any order — each guide stands on its own.

Guides