Prerequisites
DNS, SSL, and Ingress
You can secure and route traffic to RegScale using your own certificates and ingress services or via cloud-native options.
Common Options
Option | Description |
---|---|
Existing Infrastructure | Use your organization’s DNS, SSL, and ingress controller. |
Cloud + Public Cert | Use a public CA-issued cert and deploy TLS secrets. |
Cloud + Self-Signed Cert | Generate a self-signed cert for air-gapped or internal networks. |
Standalone Deployment | Follow stand-alone SSL configuration. |
Licensing
RegScale offers two licensing options:
License | Description |
---|---|
Community Edition (CE) | Free to use, unrestricted, ideal for small teams or PoCs. |
Enterprise Edition (EE) | Includes additional features and support for large-scale or multi-tenant deployments. |
Install a License
- Log in with the
admin
account. - You’ll be redirected to the Config page if no license is installed.
- Paste your license key and save.
- A domain must be configured to complete license activation.
Get a License
Method | Description |
---|---|
CE | Register online. |
EE | Contact sales. |
Ports and Protocols
Port | Protocol | Purpose |
---|---|---|
443 | HTTPS | Web UI access |
1433 | TCP/IP | API <-> SQL Server |
389 | LDAP | Directory sync (optional) |
587 | SMTP | Email notifications |
Docker Hub Access
Whitelist these domains if outbound access is restricted:
- hub.docker.com
- index.docker.io
- registry-1.docker.io
- production.cloudflare.docker.com
Database Configuration
RegScale uses Microsoft SQL Server as its backend database.
Supported Versions
- SQL Server 2019 (recommended)
- SQL Server 2017
Earlier versions (2012–2016) may work but are not supported.
Supported Editions
- Express: Free, for testing or small PoCs.
- Standard: Recommended for most production environments.
- Enterprise: Optional for very large-scale deployments.
- Azure SQL: Supported. Use Basic tier or higher.
Recommended Settings
- Enable backups and geo-replication
- Use Transparent Data Encryption (TDE)
- In Azure, enable SQL Defender and Automatic Tuning
Example Connection String
Server=tcp:{yourdatabase}.database.windows.net,1433;
Initial Catalog=ATLAS;
Persist Security Info=False;
User ID={your_username};
Password={your_password};
MultipleActiveResultSets=False;
Encrypt=True;
TrustServerCertificate=False;
Connection Timeout=30;
Updated 20 days ago