Production Checklist
Verify these items before deploying JITSudo to production.
Security
Section titled “Security”-
JWT_SECRETset to a strong, unique value (not the development default) - OIDC provider configured with proper redirect URI (
OIDC_REDIRECT_URI) - API keys generated and stored securely (raw key is only shown once on creation)
- Database connection uses TLS (
?sslmode=requireinDATABASE_URL) - JITSudo worker runs with a least-privilege IAM role scoped to Identity Center operations
Infrastructure
Section titled “Infrastructure”- PostgreSQL 15+ with automated backups and point-in-time recovery
- API server behind a load balancer with TLS termination
- Worker process running alongside the API server (shares
DATABASE_URL) - Health check endpoint (
GET /healthz) configured in load balancer -
IC_INSTANCE_ARNset on the worker for grant provisioning
Authentication
Section titled “Authentication”- Production OIDC provider configured (not Dex)
-
OIDC_GROUPS_CLAIMandOIDC_TENANT_CLAIMmatch your IdP’s token structure - At least one tenant created with a valid
aws_role_arn - At least one API key created for admin automation
Monitoring
Section titled “Monitoring”- Application logs forwarded to your logging platform (
LOG_LEVEL=infominimum) - Database connection pool metrics monitored
- AWS API rate limits monitored (Identity Center has low default limits)
- Worker job queue depth monitored (River stores jobs in PostgreSQL)
- Grant expiration and drift reconciliation health monitored
Access Control
Section titled “Access Control”- Cedar policies reviewed and tested for each tenant
- Notification channels configured for
request.pendingandgrant.activeevents at minimum - Break-glass emergency access policies in place with appropriate logging
- Approval timeouts configured to prevent stale pending requests