Help Center

Self host setup checklist

With self-hosting, your team is responsible for infrastructure, security, and operational responsibilities. Use this checklist to understand the additional overhead involved with self-host deployments.

Pre-deployment planning

  • Choose self hosted deployment method (Linux standard/manual/offline, Windows standard/offline, or Kubernetes)

  • Define server/VM specs and hosting environment (environment variables, firewall or proxy)

  • Select database option (packaged MSSQL, separate MSSQL, Unified)

  • Decide on SSL certificate approach

  • Plan network architecture, firewall or proxy rules, access controls

  • Scalability planning

  • Certificate selection for secure data in-transit

Support links:

Stakeholder selections

Select key roles:

  • Project lead

  • Executive sponsor

  • Server admin

  • Docker admin

  • Network admin

  • Firewall admin

  • Support/help desk admin

  • Database admin

  • Identity provider admin

  • SMTP admin

  • Security and compliance admin

  • Backups admin

  • Business continuity admin

  • Disaster recovery admin

  • Device management admin

Security and compliance decisions

  • Choose between SSO integration or Bitwarden authentication

  • Select provisioning method (SCIM, Directory Connector)

  • Define backup strategy (frequency, retention)

  • Identify regulatory compliance needs (HIPAA, SOC2)

  • Plan user roles, permissions, and organizational structure

Support links:

Server provisioning, configuration, database setup

  • Provision servers/VMs meeting min specs

  • Configure Windows-specific requirements

  • Install Docker, Docker compose

  • Configure database system

  • Test database connectivity strings and authentication

  • Implement database security best practices

  • Obtain installation ID and key from Bitwarden hosting portal

  • Create dedicated Bitwarden system user and directory structure

  • Configure SSL certificates and HTTPS encryption

Support links:

Backup and disaster recovery implementation

  • Implement backup schedules for server and database

  • Configure off-site backup and retention policies

  • Test backup integrity and restoration procedures

  • Document backup and recovery processes

  • Set up monitoring and alerting for backup failures

  • Evaluate backup methods

  • Create disaster recovery runbooks

Support links:

User provisioning and directory integration

  • Enable SCIM provisioning in admin console

  • Obtain SCIM URL and API key from Bitwarden

  • Configure identity provider

  • Map user attributes and group memberships

  • Test SCIM synchronization

  • Download and install directory connector

  • Configure server URL and authentication

  • Set up directory source connection

  • Configure sync filters, user/group mappings

Support links:

Deployment and go-live preparation

  • Complete final security review and sign off from stakeholders

  • Set up production monitoring and alerting systems

  • Coordinate with network and security teams for go-live

Monitoring

  • Monitor system performance and adoption metrics

  • Conduct post-implementation review with stakeholders

  • Plan ongoing maintenance and update procedures

  • Document lessons learned and process improvements

  • Schedule regular security audits and policy reviews

Support links:

Change management and training

  • Develop communication plan for organization

  • Create timeline for rollout announcements and milestones

  • Prepare exec updates on security benefits and ROI

  • Schedule admin and end-user training

  • Plan ongoing communication and feedback channels

  • Set up support processes and escalation procedures