Your data scientists want freedom. Your security team wants control. And your load balancer just wants clear instructions. This is where Domino Data Lab F5 comes into play, becoming the unspoken referee between performance and policy.
Domino Data Lab powers enterprise-scale data science—versioning experiments, managing compute, and enforcing governance across clouds. F5, on the other hand, masters the flow of traffic through layers of security, routing, and availability. Put them together, and you get a unified system that can scale safely without a tangle of ACLs or improvised reverse proxies.
When configured correctly, Domino sits behind F5 like a secure, high-traffic storefront. F5 handles TLS termination, enforces Zero Trust principles, and integrates identity via providers like Okta or Azure AD using OIDC. Domino receives clean, validated requests and maps identity to its own internal roles and projects. The result is a consistent authentication chain from the corporate perimeter down to the container your notebook runs in.
You can think of this flow in three layers.
First, access. F5 authenticates users and filters requests before they touch Domino.
Second, mapping. Domino matches those identities to internal permissions that align with existing LDAP or SSO memberships.
Third, execution. Jobs and models run only under allowed contexts, and everything is logged for compliance—SOC 2, HIPAA, or whatever acronym your auditor loves most.
If something feels off, check session persistence. Domino services can live across multiple pods, so F5 needs sticky sessions for endpoints that maintain WebSocket connections. Also, rotate SSL certificates in both Domino and F5 routinely. Nothing ruins a demo faster than a certificate warning mid-pitch.