provides users with flexible deployment options tailored to their specific requirements, which can be understood broadly as two models: Full SaaS and Hybrid SaaS. Each deployment model offers distinct features and benefits, allowing organizations to choose the option that best aligns with their needs and infrastructure preferences. Each deployment model also comes with its own security considerations.Documentation Index
Fetch the complete documentation index at: https://docs.maia.ai/llms.txt
Use this file to discover all available pages before exploring further.
Full SaaS deployment
In Full SaaS, Matillion manages the entire infrastructure, including deployment and security measures. Users benefit from a hassle-free experience, as Matillion ensures seamless updates and robust security protocols. The Matillion-hosted serves as the backbone, handling execution tasks and securely accessing customer secrets stored in the Matillion Hosted Vault.
The full architecture for this deployment model can be seen below.
Security considerations
Authentication mechanisms It’s crucial to ensure strong authentication mechanisms between Matillion containers (where Matillion software components run) and hosted s. Matillion employs secure authentication protocols to prevent unauthorized access, ensuring robust security for data and system integrity. Role-Based Access Control (RBAC) s can be optionally granted limited access to a user’s Cloud account by supplying Matillion with IAM (Identity and Access Management) credentials. When implementing RBAC, it’s essential to follow the principle of least privilege, assigning roles and permissions judiciously to restrict access only to necessary resources and functionalities.Hybrid SaaS deployment
Hybrid SaaS empowers users to deploy and manage their own execution s within their private cloud infrastructure. This option grants users full control over security measures, network isolation, and access controls. Users can implement stringent security measures, including network segmentation and access restrictions, to safeguard their data effectively.
The full architecture for this deployment model can be seen below.
