Docs

Cloud setup checklist

With cloud hosting, Bitwarden manages the infrastructure, security, and operational responsibilities. Use this checklist to understand the organizational and user management requirements for cloud deployments.

Pre-deployment planning

  • Determine cloud server region (US, EU)

  • Choose authentication strategy (Email or SSO via identity provider)

  • Select encryption type (Master Password or Trusted Device)

  • Define user provisioning approach (Manual, Directory Connector, SCIM, Just-in-Time SSO)

  • Define vault ownership strategy (Individual vaults vs. Organization-only)

  • Identify user groups for rollout phases

Support links:

Stakeholder selections

Select key roles:

  • Project lead

  • Identity provider admin

  • Executive sponsor

  • Security and compliance admin

  • Support/help desk admin

  • Device management admin (for client deployment)

  • Business continuity admin

  • Directory/user management admin

Security and compliance decisions

  • Determine cloud server region (US, EU)

  • Choose authentication strategy (Email or SSO via identity provider)

  • Select encryption type (Master Password or Trusted Device)

  • Define user provisioning approach (Manual, Directory Connector, SCIM, Just-in-Time SSO)

  • Define vault ownership strategy (Individual vaults vs. Organization-only)

  • Identify user groups for rollout phases

Support links:

Organizational build-out and configuration

  • Identify Organization Owner(s) (recommend two for redundancy)

  • Add additional administrators to the organization

  • Configure enterprise policies (before user invitation)

  • Select collection management settings

  • Create collections for administrators and users to share

  • Create groups for managing users

  • Assign collections to groups

  • Test 'Read Only' and 'Hide Password' options

  • Add test items to collections

Support links:

User provisioning and directory integration

  • Enable SCIM provisioning in admin console

  • Configure identity provider

  • Map user attributes and group memberships

  • Test SCIM synchronization

  • Download and install directory connector

  • Configure sync filters, user/group mappings

Support links:

Deployment and go-live preparation

  • Complete final security review and sign off from stakeholders

  • Set up production monitoring and alerting systems

  • Coordinate with network and security teams for go-live

Monitoring

  • Monitor system performance and adoption metrics

  • Conduct post-implementation review with stakeholders

  • Plan ongoing maintenance and update procedures

  • Document lessons learned and process improvements

  • Schedule regular security audits and policy reviews

Support links:

Change management and training

  • Develop communication plan for organization

  • Create timeline for rollout announcements and milestones

  • Prepare exec updates on security benefits and ROI

  • Schedule admin and end-user training

  • Plan ongoing communication and feedback channels

  • Set up support processes and escalation procedures