All posts

How to Configure Caddy Domino Data Lab for Secure, Repeatable Access

Your data science team is ready to ship a new model, but your security policy says “no direct access,” and the infra team wants every connection logged. The result: waiting, Slack threads, and people questioning life choices. That’s where Caddy and Domino Data Lab together create a smarter path. Caddy is the web server that grew up. It handles TLS automatically, acts as a reverse proxy, and treats configuration like code instead of ceremony. Domino Data Lab is the enterprise data science platfo

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Your data science team is ready to ship a new model, but your security policy says “no direct access,” and the infra team wants every connection logged. The result: waiting, Slack threads, and people questioning life choices. That’s where Caddy and Domino Data Lab together create a smarter path.

Caddy is the web server that grew up. It handles TLS automatically, acts as a reverse proxy, and treats configuration like code instead of ceremony. Domino Data Lab is the enterprise data science platform built for controlled collaboration, with secure workspaces, reproducibility, and governance out of the box. Together they let teams move datasets and services behind a unified identity-aware gateway without dragging ops into every permission change.

The workflow is simple. Caddy terminates TLS and enforces identity via OIDC or SAML, connecting to providers like Okta or Azure AD. Domino receives those authenticated sessions, links them to workspace roles, and enforces compute quotas or data access based on group membership. Everything stays visible in audit logs, and you avoid the sprawl of custom tokens or one-off API keys.

A typical setup uses Caddy’s reverse proxy directive pointing to Domino’s workspace endpoint. Instead of rebuilding internal routing or inventing custom middleware, you define per-project rules once. Caddy handles certificate rotation, while Domino manages compute and storage isolation. Security and speed, finally in the same sentence.

Best practices:

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Rotate OIDC secrets every 90 days and validate issuer metadata for compliance.
  • Map Domino roles to identity groups directly from your provider to avoid manual ACL drift.
  • Keep logging at debug during testing, then lock down to info level in production for clearer incident traces.
  • Use short TTLs for session cookies to tighten exposure windows.

Key benefits:

  • Faster provisioning of data science environments.
  • Built-in TLS and identity enforcement at the edge.
  • Auditable access patterns for SOC 2 and GDPR.
  • Reduced back-and-forth between infosec and data teams.
  • Lower attack surface since services never expose raw APIs.

This integration matters most for developer velocity. With Caddy managing identity flow, engineers spend less time waiting for approvals and more time running experiments. They can test endpoints, deploy notebooks, and trust every request is already verified and logged.

AI agents joining the workflow add another twist. Automations that pull data or trigger runs through Domino benefit from an identity-aware proxy. Prompt injection or rogue sessions get blocked before they hit sensitive models. You protect both human and automated users with the same guardrails.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of relying on docs and reminders, you define the rule once and watch it get applied everywhere. Real consistency, without constant policing.

How do I connect Caddy and Domino Data Lab?
Use OIDC or SAML, configure Caddy as a forward auth agent, and point Domino at that endpoint. After identity federation is complete, all sessions use the same provider-backed authentication flow for secure repeatable access.

In short, Caddy and Domino Data Lab combine predictable identity with transparent data access. You get stronger compliance and fewer headaches without losing speed.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts