Skip to content

Overview

HySecure Deployment

Accops HySecure Gateway is a platform-agnostic Zero Trust-based Application Access Gateway with versatile deployment options. It can be seamlessly installed on any hypervisor, physical device (bare metal), or cloud environment, catering to your needs.

HySecure provides robust control over endpoints, contextual access, device entry control, and a flexible policy framework. It enables strong authentication through various methods such as OTP delivered via FIDO, SMS token, email token, biometrics, push notifications, device hardware ID, and PKI, etc. including QR code-based passwordless authentication.

HySecure serves as a critical cornerstone in an organization’s secure remote access system. They are equipped with a high availability feature built for robustness and disaster recovery.

Deployment Diagram

High Availability - An overview

High Availability (HA) ensures a system's long-term operational performance and accessibility without interruption.

Clusters play a pivotal role in achieving High Availability (HA) by providing redundancy, load balancing, and failover capabilities. A cluster refers to a group of interconnected computers (nodes) that work together to provide a unified computing resource.

The primary goal of clustering in HA is to ensure the reliability and availability of services by distributing workload and providing failover support.

Here are some key aspects of clusters in HA:

  1. High Availability (HA): In a cluster, if one node fails, another node can take over its workload without service interruption, minimizing downtime and improving reliability.
  2. Load Balancing: Clusters use load balancing to distribute workloads among nodes evenly. This optimizes resource usage and prevents individual nodes from becoming overloaded.
  3. Shared Resources: Clusters often use shared storage or resources like databases and file systems that all nodes can access. By centralizing data storage, shared databases minimize the risk of data loss and ensure continuous availability even if individual nodes fail.
  4. Cluster Management: Cluster management includes robust tools and software to monitor node health, manage failover processes, and configure cluster settings for efficient and reliable operation, this ensures High Availability to be maintained.

Components of HA Cluster

Here, we will briefly explain the Active and Standby nodes in an HA cluster and understand the failover mechanism.

  • Active Node: The Active or Primary node within a High Availability (HA) cluster fulfills several critical roles. It is used for load balancing. It serves client requests, executes applications, processes data and transactions, and manages user interactions. Hosting the database governs all the user’s policies and is primarily responsible for ensuring operational services and accessibility.
  • Standby Node: The Standby or Secondary node in an HA cluster is ready to take over operations from the Active node in case of failure or planned maintenance. It mirrors the configuration and state of the Active node to ensure seamless continuity of services and monitors its health status to assume the Active role when needed quickly.
  • Real Node: In a multi-node cluster, all nodes except the Active and Standby nodes are Real Nodes. These nodes do not have a configuration database and load balancing. Their primary responsibility is to service the requests assigned to them by a Primary Node.
  • Failover Mechanism: A failover mechanism switches roles between Active and Standby nodes in an HA cluster. When the Active node encounters hardware failure, software crash, or scheduled maintenance, the Standby node is automatically promoted to the new Active node, ensuring uninterrupted end-user services.

Active and Standby nodes are crucial for maintaining uninterrupted service delivery in HA clustering. Their coordinated operation and failover capabilities are essential for business continuity and meeting SLAs in various industries and applications.

Types of deployments

HySecure can be installed on any hypervisor, on-premises, physical device (bare metal), or cloud environment, catering to the organization’s needs.

The deployment scenarios include:

Note

The ISO image can be provided as per the requirement on the Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI).