TrigGuard
TRIGGUARD DEPLOY_AUTH

Deployment Authorization

Gate production deployments with cryptographic authorization. Every deploy gets a signed receipt.

The Problem

Production deployments are irreversible. Once code is running, you can't un-deploy it. Bad deploys cause outages, data loss, and security incidents.

Most teams rely on manual approval in Slack or email. That doesn't scale, creates bottlenecks, and leaves no cryptographic proof of who authorized what.

The TrigGuard Solution

Add one API call before your deploy command. TrigGuard evaluates the deployment against your policies and returns a decision.

Pre-Deploy Gate

Block deploys that violate policy. Time windows, branch protection, environment restrictions.

Signed Receipts

Every authorized deploy gets a cryptographic receipt. Verify offline. Audit forever.

CI/CD Integration

GitHub Actions, GitLab CI, CircleCI, ArgoCD. Native integration in 5 minutes.

Fail-Closed

If TrigGuard can't evaluate, the deploy is blocked. No silent failures.

GitHub Actions Example

# Block unauthorized deploys
- name: TrigGuard Authorization
  uses: trigguard/authorize@v1
  with:
    surface: deploy.release
    action: promote-to-production
    context: |
      commit: ${{ github.sha }}
      branch: ${{ github.ref_name }}
      actor: ${{ github.actor }}

- name: Deploy (only if PERMIT)
  if: steps.trigguard.outputs.decision == 'PERMIT'
  run: ./deploy.sh

Policy Examples

Business Hours Only Block deploys after 6pm or on weekends
Main Branch Only Block deploys from feature branches
Approval Required Require explicit approval for production
Rate Limiting Max 3 deploys per hour

Start Protecting Deploys

Add deployment authorization to your CI/CD pipeline in under 10 minutes.