Skip to content

ZeroTrustKerberosLink Deployment Architecture Comparison

This guide provides a comprehensive comparison of different deployment architectures for ZeroTrustKerberosLink, helping you select the optimal configuration for your enterprise environment.

Table of Contents

Overview

ZeroTrustKerberosLink can be deployed in various architectures to meet different enterprise requirements for availability, performance, compliance, and geographic distribution. This guide helps you understand the tradeoffs between different deployment models.

Deployment Architecture Comparison

Feature Single-Node Active-Passive HA Active-Active HA Multi-Region
Availability 99.5% 99.9% 99.99% 99.999%
Failover None Manual or automatic Automatic Automatic with geo-routing
Performance Good Good Better Best
Complexity Low Medium High Very High
Cost $ $$ $$$ $$$$
Scaling Vertical only Vertical primary Horizontal and vertical Global horizontal
Maintenance Downtime Required Minimal None None
Data Consistency N/A Strong Eventually consistent Eventually consistent
Disaster Recovery Manual backup/restore Automatic failover Automatic failover Multi-region resilience
Recommended For Development, small deployments Medium enterprises Large enterprises Global enterprises

Single-Node Architecture

Overview

A single-node deployment is the simplest architecture, with all ZeroTrustKerberosLink components running on a single server.

Diagram

┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                     Enterprise Environment                      │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐                      │
│  │              │        │               │                      │
│  │   Kerberos   │◄──────►│  ZTK Server   │                      │
│  │     KDC      │        │   (Single)    │                      │
│  │              │        │               │                      │
│  └──────────────┘        └───────┬───────┘                      │
│                                  │                              │
└──────────────────────────────────┼──────────────────────────────┘
                                   │
                                   │  Secure VPN/Direct Connect
                                   │
                                   ▼
┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                        AWS Cloud                                │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐      ┌────────────┐  │
│  │              │        │               │      │            │  │
│  │  IAM Roles   │◄──────►│  AWS STS      │◄────►│  AWS KMS   │  │
│  │              │        │               │      │            │  │
│  └──────────────┘        └───────────────┘      └────────────┘  │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘

Pros

  • Simple to deploy and manage
  • Lower cost
  • Minimal configuration required
  • Suitable for development and testing

Cons

  • No high availability
  • Single point of failure
  • Limited scalability
  • Maintenance requires downtime
  • Development and test environments
  • Small organizations with limited AWS usage
  • Proof of concept deployments
  • Environments with non-critical AWS access requirements

High-Availability Architectures

Active-Passive HA

Overview

An active-passive architecture consists of a primary node that handles all requests and a standby node that takes over if the primary fails.

Diagram

┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                     Enterprise Environment                      │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐                      │
│  │              │        │               │                      │
│  │   Kerberos   │◄──────►│  ZTK Primary  │                      │
│  │     KDC      │        │     Node      │                      │
│  │              │        │               │                      │
│  └──────────────┘        └───────┬───────┘                      │
│                                  │                              │
│                                  │                              │
│                          ┌───────▼───────┐                      │
│                          │               │                      │
│                          │  ZTK Standby  │                      │
│                          │     Node      │                      │
│                          │               │                      │
│                          └───────┬───────┘                      │
│                                  │                              │
└──────────────────────────────────┼──────────────────────────────┘
                                   │
                                   │  Secure VPN/Direct Connect
                                   │
                                   ▼
┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                        AWS Cloud                                │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐      ┌────────────┐  │
│  │              │        │               │      │            │  │
│  │  IAM Roles   │◄──────►│  AWS STS      │◄────►│  AWS KMS   │  │
│  │              │        │               │      │            │  │
│  └──────────────┘        └───────────────┘      └────────────┘  │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘

Pros

  • Improved availability (99.9%)
  • Automatic failover capability
  • Strong data consistency
  • Relatively simple to configure

Cons

  • Standby resources are idle during normal operation
  • Brief service interruption during failover
  • Limited horizontal scalability
  • Requires load balancer or DNS failover mechanism
  • Medium-sized enterprises
  • Organizations with moderate AWS usage
  • Environments with standard availability requirements
  • Budget-conscious organizations requiring HA

Active-Active HA

Overview

An active-active architecture consists of multiple nodes that all actively handle requests simultaneously, providing both high availability and load distribution.

Diagram

┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                     Enterprise Environment                      │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐                      │
│  │              │        │               │                      │
│  │   Kerberos   │◄──────►│  ZTK Node 1   │◄─┐                   │
│  │     KDC      │        │               │  │                   │
│  │              │        └───────────────┘  │                   │
│  └──────────────┘                           │                   │
│                                             │                   │
│                          ┌───────────────┐  │                   │
│                          │               │  │                   │
│                          │  ZTK Node 2   │◄─┼───────────┐       │
│                          │               │  │           │       │
│                          └───────────────┘  │           │       │
│                                             │           │       │
│                          ┌───────────────┐  │           │       │
│                          │               │  │           │       │
│                          │  ZTK Node 3   │◄─┘           │       │
│                          │               │              │       │
│                          └───────┬───────┘              │       │
│                                  │                      │       │
│  ┌──────────────┐                │                      │       │
│  │              │                │                      │       │
│  │ Load         │◄───────────────┴──────────────────────┘       │
│  │ Balancer     │                                               │
│  │              │                                               │
│  └──────┬───────┘                                               │
│         │                                                       │
└─────────┼───────────────────────────────────────────────────────┘
          │
          │  Secure VPN/Direct Connect
          │
          ▼
┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                        AWS Cloud                                │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐      ┌────────────┐  │
│  │              │        │               │      │            │  │
│  │  IAM Roles   │◄──────►│  AWS STS      │◄────►│  AWS KMS   │  │
│  │              │        │               │      │            │  │
│  └──────────────┘        └───────────────┘      └────────────┘  │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘

Pros

  • High availability (99.99%)
  • Horizontal scalability
  • Load distribution
  • No downtime during maintenance
  • Better performance under load

Cons

  • More complex configuration
  • Requires load balancer
  • Data synchronization challenges
  • Higher cost
  • Large enterprises
  • Organizations with high AWS usage
  • Mission-critical applications
  • Environments requiring high throughput

Multi-Region Architectures

Overview

A multi-region architecture deploys ZeroTrustKerberosLink across multiple AWS regions or geographic locations for global resilience and performance.

Diagram

┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                     Enterprise Environment                      │
│                                                                 │
│  ┌──────────────┐        ┌───────────────┐                      │
│  │              │        │               │                      │
│  │   Kerberos   │◄──────►│  ZTK Region 1 │◄─┐                   │
│  │     KDC      │        │   Cluster     │  │                   │
│  │              │        └───────────────┘  │                   │
│  └──────────────┘                           │                   │
│                                             │                   │
│                          ┌───────────────┐  │                   │
│                          │               │  │                   │
│                          │  ZTK Region 2 │◄─┼───────────┐       │
│                          │   Cluster     │  │           │       │
│                          └───────────────┘  │           │       │
│                                             │           │       │
│  ┌──────────────┐                           │           │       │
│  │              │                           │           │       │
│  │ Global Load  │◄──────────────────────────┘           │       │
│  │ Balancer     │                                       │       │
│  │              │◄──────────────────────────────────────┘       │
│  └──────┬───────┘                                               │
│         │                                                       │
└─────────┼───────────────────────────────────────────────────────┘
          │
          │  Secure VPN/Direct Connect
          │
          ▼
┌─────────────────────────────────────────────────────────────────┐
│                                                                 │
│                      AWS Global Cloud                           │
│                                                                 │
│  ┌──────────────────────────┐    ┌──────────────────────────┐   │
│  │                          │    │                          │   │
│  │     AWS Region 1         │    │     AWS Region 2         │   │
│  │                          │    │                          │   │
│  │  ┌─────────┐ ┌────────┐  │    │  ┌─────────┐ ┌────────┐  │   │
│  │  │         │ │        │  │    │  │         │ │        │  │   │
│  │  │IAM Roles│ │AWS STS │  │    │  │IAM Roles│ │AWS STS │  │   │
│  │  │         │ │        │  │    │  │         │ │        │  │   │
│  │  └─────────┘ └────────┘  │    │  └─────────┘ └────────┘  │   │
│  │                          │    │                          │   │
│  └──────────────────────────┘    └──────────────────────────┘   │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘

Pros

  • Highest availability (99.999%)
  • Geographic redundancy
  • Disaster recovery built-in
  • Reduced latency for global users
  • Regional compliance capabilities

Cons

  • Highest complexity
  • Most expensive option
  • Data synchronization challenges across regions
  • Requires global load balancing
  • Global enterprises
  • Organizations with strict disaster recovery requirements
  • Multi-national companies
  • Applications requiring global low-latency access

Scaling Considerations

Vertical Scaling

Increasing resources (CPU, memory) on existing nodes:

  • When to use: When request volume increases but not enough to justify additional nodes
  • Advantages: Simpler to implement, no additional configuration needed
  • Limitations: Hardware limits, potential downtime during scaling

Horizontal Scaling

Adding more nodes to the deployment:

  • When to use: When authentication request volume exceeds capacity of optimally-sized nodes
  • Advantages: Linear scaling, no theoretical upper limit, no downtime
  • Limitations: Requires load balancer, more complex configuration, data synchronization challenges

Scaling Recommendations by User Count

Number of Users Number of AWS Accounts Recommended Architecture Minimum Nodes Node Specifications
<500 <10 Single-Node 1 2 vCPU, 4GB RAM
500-2,000 10-50 Active-Passive HA 2 4 vCPU, 8GB RAM
2,000-10,000 50-200 Active-Active HA 3 8 vCPU, 16GB RAM
10,000-50,000 200-1,000 Active-Active HA 5+ 16 vCPU, 32GB RAM
>50,000 >1,000 Multi-Region 8+ (4+ per region) 16+ vCPU, 32+ GB RAM

Industry-Specific Recommendations

Financial Services

  • Recommended Architecture: Active-Active HA or Multi-Region
  • Key Considerations:
  • PCI-DSS compliance requires high availability
  • Transaction volume can be bursty, requiring scalability
  • Consider active-active in multiple availability zones
  • Implement comprehensive audit logging
  • Enable FIPS-compliant encryption

Healthcare

  • Recommended Architecture: Active-Passive HA or Active-Active HA
  • Key Considerations:
  • HIPAA compliance requires business continuity
  • PHI access tracking requires comprehensive logging
  • Consider geographic redundancy for large hospital networks
  • Implement emergency access procedures
  • Enable extended log retention (6+ years)

Government

  • Recommended Architecture: Active-Active HA or Multi-Region
  • Key Considerations:
  • FedRAMP compliance requires high availability
  • Consider AWS GovCloud deployment
  • Implement PIV/CAC integration
  • Enable FIPS-compliant encryption
  • Consider air-gapped or isolated deployments for classified environments

Retail/E-commerce

  • Recommended Architecture: Active-Active HA
  • Key Considerations:
  • Seasonal traffic patterns require scalability
  • Global presence may require multi-region
  • Focus on performance during peak shopping periods
  • Consider cost optimization during off-peak times

Technology/SaaS

  • Recommended Architecture: Multi-Region
  • Key Considerations:
  • Global customer base requires low latency
  • Continuous deployment requires zero-downtime architecture
  • Consider containerized deployment for flexibility
  • Implement CI/CD pipeline integration