This guide covers deploying Permify on Railway, either via a one-click template or manual setup.Documentation Index
Fetch the complete documentation index at: https://proxy-docs.permify.co/llms.txt
Use this file to discover all available pages before exploring further.
One-Click Deploy
The fastest way to get started:- A Permify instance with API authentication enabled
- A PostgreSQL database for persistent storage
- Private networking between services
What Gets Deployed
Permify Service
The template deploys the latest Permify container image with the following default configuration:| Variable | Default Value | Description |
|---|---|---|
PERMIFY_DATABASE_ENGINE | postgres | Database backend |
PERMIFY_DATABASE_URI | Auto-configured | Connection string to PostgreSQL |
PERMIFY_AUTHN_ENABLED | true | Enable API authentication |
PERMIFY_AUTHN_METHOD | preshared | Authentication method |
PERMIFY_AUTHN_PRESHARED_KEYS | Auto-generated | 32-character secret key |
PERMIFY_LOG_LEVEL | info | Logging verbosity |
PostgreSQL Database
A dedicated PostgreSQL instance is provisioned and connected to Permify over Railway’s private network. The database connection is configured automatically—no manual setup required.Connecting Your Application
After deployment, add these environment variables to your application service to connect to Permify:Available Endpoints
Permify exposes two ports:| Port | Protocol | Description |
|---|---|---|
| 3476 | HTTP/REST | REST API and health checks |
| 3478 | gRPC | High-performance gRPC API |
Both ports are accessible over Railway’s private network by default. To expose them publicly, configure a public domain in your Railway service settings.