Production readiness checklist
A focused checklist for delivering a production-ready authentication system that's secure, reliable, and compliant
Before launching your authentication system to production, you need to ensure that every aspect of your implementation is secure, tested, and ready for real users. This checklist is organized in the order teams typically implement features when going live, starting with defining your requirements and moving through core flows to advanced features.
Use this checklist systematically to verify that your authentication implementation meets production standards. Each section addresses critical aspects of a production-ready authentication system, from security hardening to user experience testing.
Define your auth surface
Section titled “Define your auth surface”Determine which authentication methods and features you need at launch. This prevents enabling features you don’t need and helps focus your testing efforts.
Core authentication flows
Section titled “Core authentication flows”Verify that your core authentication flows work correctly and handle errors gracefully. These are the essential flows every application needs.
Network and firewall configuration
Section titled “Network and firewall configuration”If you’re enabling enterprise SSO or SCIM provisioning for your customers, verify network access early to avoid deployment blockers.
Domains to whitelist for customer VPNs and firewalls
If your customers deploy Scalekit behind a corporate firewall or VPN, they need to whitelist these Scalekit domains:
| Domain | Purpose |
|---|---|
<your-environment>.scalekit.com | Your Scalekit environment URL (admin portal and authentication; replace this with your actual Scalekit environment URL) |
cdn.scalekit.com | Content delivery network for static assets |
docs.scalekit.com | Documentation portal |
fonts.googleapis.com | Font resources |
Replace <your-environment>.scalekit.com with your actual Scalekit environment URL from the Scalekit dashboard.
Enterprise auth
Section titled “Enterprise auth”If you’re supporting enterprise customers, configure SSO, SCIM provisioning, and the admin portal.
SSO flows
Section titled “SSO flows”SCIM provisioning
Section titled “SCIM provisioning”Admin portal
Section titled “Admin portal”Customization
Section titled “Customization”Ensure your authentication experience matches your brand identity and custom requirements.
User and organization management
Section titled “User and organization management”Configure how users and organizations are managed in your application.
If you’re implementing role-based access control (RBAC), verify these authorization items:
MCP authentication
Section titled “MCP authentication”If you’re implementing MCP authentication for AI agents, verify these items.
Monitoring, logs, and incident readiness
Section titled “Monitoring, logs, and incident readiness”Set up monitoring to track authentication activity and troubleshoot issues quickly.