1
deployment boundary
Run the connector or sealing orchestrator in your own cloud account, tenant, or cluster.
Run high-volume Publisher orchestration in your own cloud with function or Kubernetes deployments while sealing stays in Trusted Signatures' secure service.
Ready to run a live trust check?
Publisher Cloud gives enterprise teams the same standards-based PDF sealing capability as Publisher, but with orchestration deployed inside your own cloud environment. Use functions or Kubernetes-based services to handle high-volume document flows while keeping your networking, observability, and automation inside your platform boundary.
When to use Publisher Cloud
Use it when central platform teams need document-sealing orchestration to run inside their own Azure, AWS, Google Cloud, or Kubernetes environment for throughput, governance, or integration reasons.
1
deployment boundary
Run the connector or sealing orchestrator in your own cloud account, tenant, or cluster.
2
deployment patterns
Deploy as a function-based service or Kubernetes workload depending on your platform model.
Enterprise
throughput profile
Designed for high-volume document pipelines, scheduled jobs, and event-driven workloads.
0
private link required by default
Standard outbound HTTPS is the common starting point for production rollout.
Operational Fit
Best fit for enterprise teams that already operate event-driven functions, containers, or Kubernetes services.
Platform teams
High-volume ops
Security teams
Product teams
Run a function or Kubernetes-based service inside your Azure, AWS, GCP, or private cluster environment.
Your service receives internal document jobs, prepares the request, and calls Trusted Signatures over outbound HTTPS.
The sealed output flows back into your application, queue, storage, or downstream delivery pipeline.
Use Azure Functions, AWS Lambda, Google Cloud Functions, or similar serverless runtimes when you want elastic scaling for bursty or event-driven document flows.
Talk through architectureRun a long-lived service, worker pool, or job-based connector in Kubernetes when you need tighter runtime control, custom networking, or large-scale batch orchestration.
Discuss Kubernetes rolloutIntegrate with Power Automate, Logic Apps, Functions, queues, and storage accounts for enterprise document workflows.
See cloud connector docsWire sealing into Lambda, Step Functions, EventBridge, Cloud Run, GKE, EKS, AKS, or your own cluster-operated worker model.
See cloud connector docsCapability Summary
Deploy the orchestration layer in your own cloud, scale with functions or Kubernetes, keep secrets in your platform, and preserve standards-based sealing and reader-native validation.
Deploy the service in your own account, tenant, subscription, or cluster.
Choose serverless elasticity or container-orchestrated control depending on your platform.
Designed for batch operations, queues, scheduled jobs, and event-driven sealing triggers.
Production rollout starts with standard egress to Trusted Signatures.
Store credentials in Key Vault, Secrets Manager, Secret Manager, or equivalent controls.
Expose a controlled internal service to business applications instead of embedding sealing logic everywhere.
Recipients still verify in Acrobat/Reader and compatible PAdES viewers.
Trusted Signatures continues to handle secure signing operations with managed key custody.
Use outbound HTTPS from your runtime environment. Teams can layer their own egress policies, firewall rules, and cloud-network controls.
Keep API credentials in your cloud-native secrets platform and scope access to the deployment that submits sealing jobs.
Run logging, alerting, autoscaling, and deployment lifecycle with the same tooling you already use for internal services.
Standardize sealing as an internal cloud service with deployment automation, queue processing, and runtime controls that match your platform standards.
Discuss deployment designKeep orchestration, secrets, and audit telemetry inside existing cloud controls while using standards-based sealing and managed signing custody.
Security overviewPublisher Cloud preserves the same ISO 32000/PDF signature structures and X.509-based validation behavior as Publisher. Optional timestamping and long-term validation evidence can still be part of the sealing workflow, while your orchestration layer stays under your cloud operations model.
Recipients do not need a custom viewer or plugin. Trust verification remains document-native in Acrobat/Reader and other compatible PAdES viewers, subject to reader trust-store configuration.
Review service boundaries, managed signing custody, and validation behavior.
Open trust docsPlan API-driven integration and operational rollout for internal cloud services.
Open cloud connector docsMap network, custody, and deployment responsibilities to enterprise review criteria.
Open security overviewPublisher Cloud is positioned for enterprise deployments that want a predictable platform model for running the orchestration layer in their own environment. Final planning depends on deployment shape, expected volume, and whether you pair it with Publisher Identity.
Validate Deployment Fit
Use the same trust-validation flow as Publisher while planning an enterprise deployment pattern that fits your cloud boundary, scaling model, and governance controls.