RESTHeart Cloud
RESTHeart Cloud is the cloud-based service that provides you with the infrastructure to run RESTHeart applications.
Best of breed Cloud
RESTHeart Cloud runs on AWS and Mongo Atlas. It is crafted from the experience of SoftInstigate matured on the ground in dozens of real world projects.
SoftInstigate is the company behind RESTHeart and an ISV Partner of MongoDB
Out-of-the-box features
You get all the out-of-the-box features of RESTHeart.
- JWT, Basic and Digest Authentication
- Powerfull Declariative Authorization
- A superb Data API, with REST, GraphQL and Websocket API on MongoDB
Plugins
You can deploy and run your RESTHeart plugins.
- Services to implement Web Services
- Interceptors to snoop and modify requests at different stages of the request life cycle
- Initializers to execute custom logic and schedule recurring tasks on service startup
Plans
RESTHeart Cloud comes in two standard plans, for most of small to medium sized applications needs, plus a custom plan with a tailored infrastructure.
RESTHeart instance | Database storage | |
---|---|---|
Cloud standard | 0,5GB RAM, 0,5 vCPU | 5GB |
Cloud Plus | 1GB RAM, 1vCPU |
10GB |
Security
RESTHeart Cloud adopts the best security practices.
RESTHeart instance | Database instance | |
---|---|---|
Network Isolation | RESTHeart instances are deployed in a unique Virtual Private Cloud (VPC). Access is granted to an HTTP load balancer only. Instances are not directly accessible from the public Internet. | Databases are deployed in a unique Virtual Private Cloud (VPC) with dedicated firewalls. Access is granted by VPC Peering. The database is not directly accessible from the public Internet. |
Role-based access management | RESTHeart provides Authentication and Authorization services. It can handle different authentication and authorization schemes, including handling users and permissions stored in MongoDB collections. | role-based access rules to control which users can access, manipulate, and delete data in your databases. |
End-to-end encryption | All network traffic is encrypted via HTTPS protocol, using Transport layer Security (TLS). | All network traffic is encrypted using Transport layer Security (TLS). Encryption for data at rest is automated using encrypted storage volumes. |