Provisioning Overview
This checklist outlines the minimum information required to provision a HashSphere. Providing this information ensures your HashSphere is deployed in alignment with your organization's needs.
Provisioning a HashSphere is a shared process between your team and the HashSphere team. This page lists the minimum inputs needed to deploy an environment.
Before deployment begins, we work with you to understand a small set of foundational requirements. These inputs are critical because they determine:
Infrastructure placement and compliance alignment
Data residency and regulatory posture
Access control and identity integration
Core network identifiers used across integrations
These inputs allow the HashSphere team to design and deploy your environment in alignment with your organization’s infrastructure, security, and compliance requirements.
The sections below outline the primary topics discussed during provisioning.
Cloud provider and region selection
HashSpheres can be deployed on AWS or GCP.
HashSphere endpoints are exposed using:
Virtual Private Cloud Endpoints (AWS)
Private Service Connect (GCP)
For this reason, the cloud provider selected for the HashSphere must align with the cloud provider hosting the services that will interact with it. This ensures secure, private connectivity without requiring public internet exposure.
HashSpheres can be deployed to any supported region. Region selection is typically influenced by your existing infrastructure footprint, security policies, latency considerations, and data residency requirements.
The HashSphere team will work with you to determine the optimal deployment pattern based on your technical and regulatory requirements.
Data residency
Prior to provisioning, we clarify any data residency constraints that apply to your organization. These may include requirements for data to live within a single region, jurisdictional restrictions, or your internal governance policies.
Understanding these requirements ensures HashSphere components are deployed appropriately. It also ensures backup storage aligns with your constraints.
Identity and access integration
The HashSphere Console integrates with your enterprise identity provider to enable secure, role-based access. Prior to HashSphere provisioning, we confirm your identity provider (e.g. Okta, Ping), SSO integration requirements, and access model.
This allows your teams to monitor the network using your existing enterprise authentication framework without introducing separate credential systems.
Currency identifiers
Each HashSphere network requires core identifiers that are referenced by wallets, custody providers, explorers, SDKs, and partner integrations. We will confirm the following:
HashSphere currency name
HashSphere ticker symbol
Defining these identifiers upfront ensures consistent ecosystem representation and prevents downstream integration issues once your applications and partners are connected.
Admin key management
Each HashSphere includes an administrative key used for foundational network operations such as:
Creating initial accounts
Funding accounts for development
Supporting early integration and onboarding
Prior to provisioning, we identify the designated recipient for this key and a secure method of key delivery. Designating a responsible recipient ensures secure handling and minimizes operational risk.
Last updated

