ZITADEL

An identity platform built for developers, powering secure access for all users and apps.

Accessing ZITADEL

  • Startup may take several minutes on first run.
  • Open your browser and visit: https://<SERVER_IP>.sslip.io
  • A browser warning is expected due to the self-signed certificate.

Logging in to the Admin Console

Go to: https://<SERVER_IP>.sslip.io/ui/console

Use the initial admin credentials:

  • Username: zitadel-admin@zitadel.<SERVER_IP>.sslip.io
  • Password: Password1!

Important Files and Directories

  • Main installation directory: /root/zitadel
  • Base Docker Compose configuration: /root/zitadel/docker-compose-base.yaml
  • Nginx Docker Compose configuration: /root/zitadel/docker-compose-nginx.yaml
  • Nginx configuration (external TLS): /root/zitadel/nginx-external-tls.conf
  • Self-signed TLS certificate and key: /root/zitadel/selfsigned.crt & /root/zitadel/selfsigned.key
  • PostgreSQL persistent data: Stored in the Docker volume data
  • ZITADEL login client token: /root/zitadel/login-client.pat

Managing the Deployment

Check container status:

cd /root/zitadel
docker compose -f docker-compose-base.yaml -f docker-compose-nginx.yaml ps

View logs:

cd /root/zitadel
docker compose -f docker-compose-base.yaml -f docker-compose-nginx.yaml logs -f

Restart all services:

cd /root/zitadel
docker compose -f docker-compose-base.yaml -f docker-compose-nginx.yaml restart

Health Checks

Check ZITADEL gRPC health:

grpcurl --insecure <SERVER_IP>.sslip.io:443 zitadel.admin.v1.AdminService/Healthz

Check HTTP health endpoint:

curl --insecure https://<SERVER_IP>.sslip.io/admin/v1/healthz

Currently unavailable.

Application Details