Skip to main content
Repo-ProvenPublic

Deployment And Access Model

Make public marketing, product app access, previews, production domains, and rollback targets explicit.

Deployment content distinguishes crawlable public pages from product subdomains, protected previews, authenticated app access, and secondary hosting.

Owner

Runtime and deployment

Audience

Operators, release managers, technical buyers, and customer implementation teams

Source authority

Runtime topology owns domain and deployment evidence.

Implemented workflows

  • Vercel preview
  • Production promotion
  • DNS and TLS verification
  • Login URL configuration
  • Rollback evidence capture

System responsibilities

  • Maintain topology registry
  • Validate product subdomain routing
  • Record preview protection posture

Data inputs and outputs

  • www hosts marketing
  • product subdomains host app access
  • evidence pages link to proof without embedding auth
Boundary

Public outside, protected detail inside.

Marketing deployment does not create new auth flows or expose tenant runtime actions.

Architecture visuals

Diagrams explain the operating logic.

Mermaid diagram

Public And App Access Boundary

Separates public marketing, gated evidence, and authenticated app access.

flowchart LR
  www[www.healthdatainmotion.com] --> publicPages[Public solution and proof pages]
  publicPages --> gated[Evidence room requests]
  publicPages --> datamotion[datamotion app access]
  publicPages --> dqm[dqm app access]
  publicPages --> atlas[atlasnexus app access]
  datamotion --> auth[Authenticated runtime]
  dqm --> auth
  atlas --> auth
  auth --> privateData[PHI and tenant operations stay private]
Known limits

What remains gated, deferred, or status-bound.

Product subdomains are promotion-critical and require DNS/TLS/login proof before live claims.