Typical needs
- SSO and identity integrations
- Auditability and compliance controls
- Self-hosted or dedicated deployment models
- Monitoring, alerting, and operational runbooks
Where to start
- Self-hosted: /enterprise/deployment/self-hosted/overview
- Security posture: /enterprise/security/overview
- Monitoring: /enterprise/monitoring/overview
How to evaluate fit
- Identify your deployment model (self-hosted vs. dedicated)
- Confirm identity requirements (SSO, provisioning)
- Confirm observability and incident response expectations