Skip to content

Production readiness checklist

A focused checklist for delivering a production-ready authentication system that's secure, reliable, and compliant

Before launching your authentication system to production, you need to ensure that every aspect of your implementation is secure, tested, and ready for real users. This checklist is organized in the order teams typically implement features when going live, starting with defining your requirements and moving through core flows to advanced features.

Use this checklist systematically to verify that your authentication implementation meets production standards. Each section addresses critical aspects of a production-ready authentication system, from security hardening to user experience testing.

Determine which authentication methods and features you need at launch. This prevents enabling features you don’t need and helps focus your testing efforts.

Verify that your core authentication flows work correctly and handle errors gracefully. These are the essential flows every application needs.

If you’re enabling enterprise SSO or SCIM provisioning for your customers, verify network access early to avoid deployment blockers.

Domains to whitelist for customer VPNs and firewalls

If your customers deploy Scalekit behind a corporate firewall or VPN, they need to whitelist these Scalekit domains:

DomainPurpose
<your-environment>.scalekit.comYour Scalekit environment URL (admin portal and authentication; replace this with your actual Scalekit environment URL)
cdn.scalekit.comContent delivery network for static assets
docs.scalekit.comDocumentation portal
fonts.googleapis.comFont resources

Replace <your-environment>.scalekit.com with your actual Scalekit environment URL from the Scalekit dashboard.

If you’re supporting enterprise customers, configure SSO, SCIM provisioning, and the admin portal.

Ensure your authentication experience matches your brand identity and custom requirements.

Configure how users and organizations are managed in your application.

If you’re implementing role-based access control (RBAC), verify these authorization items:

If you’re implementing MCP authentication for AI agents, verify these items.

Set up monitoring to track authentication activity and troubleshoot issues quickly.