In a fast -paced digital environment today, where control of your data and infrastructure is increasingly important, Mandiri hosting has emerged as a transformative solution. This guide discusses more about utilization Pangolin And Authentic To create an independent hosting environment that is safe, scalable, and centralized. With a focus on professionals, IT teams, and developers who manage an important system for business, this comprehensive explanation will help you master infrastructure settings for complete data ownership and security.
Whether you migrate from a third party provider or prepare an optimized environment to run the application, this guide includes all important things – ranging from the configuration of inverted proxy to integrated identity management.
Why Self-Hosting? Three Pillars of Digital Ownership
This video emphasizes three important motivation for Mandiri Hosting:
- Complete data ownership
By posting your application on your own server or a trusted cloud solution, you make sure full control over your data and reduce dependence on third party services. - Improved security
Mandiri hosting allows you to build strong infrastructure with protection measures such as firewalls, encrypted tunnels, and sophisticated monitoring tools, thereby reducing the risk of vulnerability. - Integrated user access
Use tools like AuthenticYou can simplify user management while ensuring safe and centralized access to the application, anywhere.
By using Pangolin And AuthenticYou can achieve this goal easily. Pangolin functions as a tough upside down proxy and safe tunnel, while authentic provides an identity management system for integrated access control.
Steps -By -Panduan Steps to prepare Pangolin and Authentic
1. Choosing your hosting environment
You can:
- Use hardware on the spot (for example, a desktop or server that is reused).
- Benefit Cloud -based infrastructureThis video highlights Hetzner As a reliable and high -performance cloud provider at a reasonable price.
This guide focuses on applying architecture in the Hetzner environment. Tough arrangements include:
- Two servers: One for the Pangolin Reverse Proxy and one for the hosting application.
- A Private Subnet to isolate server communication safely.
2. Preparing Pangolin: Your Reverse Proxy and Your Safe Tunnel
What is pangolin?
Pangolin is an alternative source of open sources for proxy systems and commercial tunnels such as cloudflare. Pangolin allows safe traffic stomachs to your own applications while ensuring data privacy.
Installation Process:
- Prepare your DNS notes:
- Register a special domain for your application.
- Add three DNS notes:
- Domain Root (
@
), Point to your IP server proxy. - Wildcard subdomain (
*
), which allows dynamic subdomain for applications. - Subdomain for dashboard pangolin (
proxy.domainanda.com
).
- Domain Root (
- Install the pangolin:
- Use the installation script provided to spread Pangolin as a container docker.
- Set a SSL Wildcard Certificate for a safe connection.
- Prepare a firewall:
- Limit the open port to HTTP (80), HTTPS (443), and SSH (22).
- Use a private subnet to enable safe communication between servers.
- Activate Crowdsec for cyber security:
- Integrate crowdsec, an open source solution that offers intrusion detection and protection against bad activities.
- Add a special collection or rules for your application (for example, WordPress protection).
Main Benefits:
- Full control over the configuration of the inverted proxy.
- Elimination of dependence on external services such as cloudflare.
- Advanced security with integrated crowdsec.
3. Applying Authentic: Integrated Identity Provider
What is authentic?
Authentic is an open source identity provider that simplifies user authentication for your own posted applications. This provider supports OAUTH2, SAML, and LDAP, so that it is compatible with almost all company systems.
Installation Process:
- Docker repository cloning:
- Use the GIT repository provided to download the compose docker file that has been previously configured for authentic.
- Adjust the compose docker file to match the private network and your server port.
- Configure Database and SMTP settings:
- Prepare PostgreSQL as a Backend Database for Authentic.
- Enter SMTP credentials for email notifications (for example, user invitations, password rearrangement).
- Apply authentic:
- Run Docker Compose to launch authentic on a private network.
- Access the initial settings page to create an admin account and configure the system.
- Integrate with Pangolin:
- Add authentic as a resource in the Pangolin dashboard.
- Traffic route to authentic uses the specified subdomain (for example,
idp.domainanda.com
).
Main Features:
- User management is centered on your own posted applications.
- Support for external identity providers (for example, Microsoft Entra, Google Workspace).
- Licenses that can be discredited for business, offering cost -effective solutions.
4. Optimizing your environment
Persistent connection:
- Configure SystemD service To ensure that the Pangolin tunnel is automatically reconnected after the server is booted.
Best Practice Security:
- Disable root access and password -based authentication on the server.
- Use SSH locks for safe server access.
- Add two factors (2FA) authentications and security keys to the Authentic Admin account.
Backup strategy:
- Activate automatic reserves for the server.
- Synchronize application data to additional volumes or external storage solutions.
Main points
- Pangolin Offering alternative cloudflare that is posted by yourself for reverse proxy and safe tunneling, which ensures data ownership.
- Authentic Providing centralized identity management, simplifying access control for your own posted applications.
- Utilise Private Subnet And fire wall minimize cyber security risks.
- Crowdsec integration Ensure protection all the time from dangerous traffic.
- Use Hetzner Cloud Server or other reliable infrastructure providers for cost -effective performance and scalability.
- Routine reserves and strong security practices (for example, SSH keys, 2FA) are very important to protect the safe hosting environment.
Conclusion
Mandiri hosting with tools such as Pangolin and Authentics is a significant step towards achieving autonomy and control over your digital assets. By following the steps described above, you can create a safe, scalable, and integrated infrastructure to post important applications. This guide provides a foundation for transformative trips to Mandiri hosting, which empower you to take back control over your data and minimize dependence on external providers.
Explore various possibilities that can be opened by Mandiri hosting for your business or personal project. With the right architecture and devices, the future of digital sovereignty is on your fingertips.
Source: “🔥🔥 Definitive Mandiri Hosting Guide (2025) 🔥🔥 | SAFE AND Efficient Mandiri Hosting for the Future” – Webnestify, Youtube, August 26, 2025 –
Use: pinned for references. Short quotes are used for comments/reviews.
Related blog articles
Review Film
Berita Terkini
Berita Terkini
Berita Terkini
review anime
Gaming Center
Berita Olahraga
Lowongan Kerja
Berita Terkini
Berita Terbaru
Berita Teknologi
Seputar Teknologi
Berita Politik
Resep Masakan
Pendidikan
Comments are closed, but trackbacks and pingbacks are open.