Skip to main content

General

The following resources are required for a fully functional Credo AI installation.

  • DNS record for Credo AI application endpoint
  • TLS private key & certificate for application endpoint
  • SMTP server (StartTLS supported)
  • Postgres database
  • AWS S3
  • OIDC identity provider with an OAuth2 authorization server

Postgres database and AWS S3

Credo AI application does not use volume storage as state is maintained in object storage and a relational database. It is recommended to apply related “Best Practices” for securing application data in these locations:

warning

The CredoAI application uses the public database schema for governance asset management. The configured database user must have write access to this schema.

tip

See the Postgres Database Setup Appendix for database setup instructions.

Single Sign-On (SSO)

The Credo AI application requires both an OIDC identity provider to authenticate users and an oauth2 authorization server to authorize users.

warning

Local user authentication is not an option for a self-hosted instance.

note

The OAuth2 specification has a helpful document on the difference between ID and access tokens and how they relate to application security.

tip

See the SSO with Okta OIDC for guidance on setting up SSO with Okta.