← Back to News

Cloud Exit Strategy, Part 1: Identity and Collaboration

Published on

This series outlines a practical strategy for moving from public cloud/SaaS back to on‑prem or self‑hosted providers like Vultr, Hetzner, or OVHcloud — with a focus on security, control, and predictable cost. We start with the keystone: identity. Then we layer in collaboration.

Why consider a cloud exit?

Guiding principles

Phase 0: Discovery and prerequisites

Phase 1: Identity foundation (Authentik)

Authentik can serve as your IdP of record and SSO hub using OIDC/SAML, with directory sync and MFA. Establish it first and integrate target apps into it before migration.

Deployment blueprint

Identity design

Cutover plan

  1. Stand up Authentik in a pilot environment, connect a few non‑critical apps
  2. Mirror users/groups from your current IdP; validate attributes and MFA flows
  3. Roll SSO to more apps in waves; keep old IdP as fallback during transition
  4. Switch auth for admin tooling last; document break‑glass access

Operational checks

Phase 2: Collaboration stack

Once SSO is reliable, move collaboration services one domain at a time. Recommended building blocks:

SSO and authorization

Hosting patterns: on‑prem vs providers like Vultr

Security & resilience

Migrations: sequence and rollback

  1. Stand up identity; integrate 2–3 low‑risk apps; test SSO, groups, MFA
  2. Migrate chat or wiki; collect feedback; tune resource sizing
  3. Move files/docs with phased team cutovers; keep read‑only access to the old system
  4. Decide on email last (biggest operational load); consider partial exit first

What’s next

This is the first in our Cloud Exit Strategy series. Next up: Networking and Zero‑Trust access (WireGuard/Tailscale, reverse proxies, and segmentation), followed by Observability & Backups, and then Email strategy.