Admin permissionsA user with Admin permissions is required in order to deploy the stack and create the resources described below. Resources used are subject to change in the future, which is why we currently recommend Admin permissions (and an isolated AWS account, mentioned below).
Dedicated AWS AccountWe recommend deploying the Platform in an isolated AWS account. This reduces the risk of errors, such as hitting AWS service resource limits, and overall makes things simpler to manage.
The default parameters are appropriate for many organizations. The installation requires providing an ACM certificate matching a valid public DNS record. There are two options to proceed with this step that are described below:
This is the recommended approach. It will require validating a domain of your setup to emit a valid certificate that could be used in this setup.
Go to the ACM console of the region
Click on Request a certificate
Click Next to Request a Public Certificate
Choose your domain and validation Method and click on Request
The certificate will remain pending until you validate, depending on the chosen method.
Access the certificate ID entry and follow the instructions to validate the certificate. Copy its ARN. Once you finish validating it, the status will change to green.
Use the certificate ARN in the AwsCertificateArn parameter when deploying the stack.
Once the deployment has completed (you should see “CREATE_COMPLETE” on all items under “Stacks”), click on the stack.
Click on the Outputs tab and copy the load balancer address value.
Use this value to create a CNAME record in your DNS management service pointing to the domain specified in your certificate.
If you want to test it without publishing it in your DNS system, obtain the load balancer’s public IP and add it to your Hosts file.
This will allow you to visit the app address using the DNS configured in the certificate.
It’s possible to bring your own identity provider to authenticate your users with Hoop.
A custom identity provider can be specified in the Server Settings page. Refer to our SSO documentation for more details.
You’ll need to update if you want to keep your installation in sync with the latest releases.
Make sure to see exactly the changes on our release page to plan the updates carefully.
Go to CloudFormation > Select the installed stack > Click on Update
Choose Replace Existing Template and enter the URL below, which corresponds to your deployment region:
Double-check that the URL pasted into shows the same region as the AWS console highlights when you click on the region in the upper right. E.g., if “Virginia” is shown and the drop-down highlights us-east-1, then us-east-1 should appear as the URL (three times).
Ensure that “Stack failure options” is set to “Roll back all stack resources” and select Next.
If deployment issues arise, we may ask you to change this, but if set to preserve, CF will refuse to deploy certain types of changes.
Check both of the boxes around permissions at the bottom and select Update Stack.
You don’t need to wait for the change set to load.
Occasionally monitor the status of the deployment — some updates can take hours, others just minutes.
If the stack update does fail please take a screenshot of the failure under “Events” in the stack. If it says that a nested stack failed to deploy, include a screenshot of the “Events” in the failed nested stack. We apologize for the issue! CloudFormation is a very sensitive and particular system, as well as being subject to transient issues from an array of AWS services.