End-to-End VMS Architecture

Complete Vendor Journey Map

1

Web Access

Vendor traffic is cleaned by Cloudflare WAF and routed to our dedicated VM.

HTTPS
2

Authentication

Keycloak verifies identity & 2FA against our local PostgreSQL database.

JWT Token
3

Application Core

Backend processes UI logic. Documents save to MinIO, data saves to Postgres.

4

Firewall Routing

App data is instantly encrypted by the Edge Firewall to prepare for transport.

IPsec Tunnel
5

Client SAP (On-Prem)

Data arrives securely inside the Client's internal CPI Middleware via VPN.

Phase 1: Zero-Trust Login

Replacing AWS Cognito with Local Enterprise Security

Vendor

Web Browser

Access
VM 1

Reverse Proxy

Nginx Entry

Redirect
VM 2

Keycloak

Identity Provider

Verify Credentials
LXC 1

PostgreSQL

Auth DB Data

Phase 2: Localized Data Processing

Replacing AWS RDS and S3 to eliminate recurring fees

Vendor UI

Uploads PDF

POST Request
VM 3

Kong API

Validates Token

Approved
Docker

Backend

Node.js Engine

Save File
LXC 2

MinIO

Object Storage

Save DB
LXC 1

Postgres

Relational Data

Phase 3: Direct SAP Sync

Bridging the gap between our Proxmox Server and your Enterprise Network

Docker

Backend App

Generates PO

Trigger

Our Firewall

Edge Gateway

IPsec VPN Tunnel

Your Firewall

Accepts Tunnel

Internal Route

SAP CPI

Middleware

Slide 1 of 4