This article provides a comprehensive, step-by-step guide to deploying Rimo3 Workspaces in your Azure subscription. It mirrors the full deployment flow as experienced in the platform, including detailed explanations of why each step exists and the strong security measures embedded throughout.
The goal of this guide is to provide not only instructions, but also the reasoning behind each decision point, so you understand how Rimo3 ensures a secure, reliable, and enterprise-ready deployment.
Before beginning deployment, you need to have a Workspace created inside the Rimo3 platform. Once your Workspace exists, you have two sign-in options:
Local user credentials
Microsoft Entra ID (recommended)
We strongly recommend using Entra ID with your Microsoft account for a more secure and streamlined login experience.
If this is your first time opening the workspace, you will be guided through the Rimo3 Deployment Wizard.
The first step in the deployment journey is generating a Registration Key. This key is a short-lived JWT token issued by Rimo3’s secure backend services. It is generated on demand when you click the button, and it is automatically copied to your clipboard.
Key Facts:
⚠️ Important: Never share or distribute the registration key. After registration, new secure tokens are automatically issued to the deployed components, so the registration key itself is not reused.
Once the registration key has been generated and copied, the Take me to Azure! button is enabled, allowing you to launch the Azure Marketplace (MPO) deployment flow.
Clicking Take me to Azure! launches the Azure Marketplace wizard, which guides you through configuring and deploying the Rimo3 components into your subscription. The process involves multiple configuration steps.
You’ll select:
Important role requirements:
Rimo3 will not touch any resources outside of the chosen resource group.
Paste the registration key you copied from the Rimo3 platform into the field and confirm it. This securely links your Azure deployment to your Rimo3 SaaS tenant.
Next, you will configure networking. You can select an existing VNet or create a new one.
Best practices:
Here you configure a dedicated storage account. This storage is used for:
We strongly recommend creating a storage account dedicated to Rimo3 to ensure clean separation.
At this step you configure an Azure Key Vault to securely store sensitive data:
Rimo3 follows Azure and NIST best practices:
Provide details for the Gateway VM:
VM SKU and size can be adjusted later after deployment to match workload requirements.
Finally, review all configuration details and click **Create**. Azure will immediately run a validation script to check the registration key. If invalid, the deployment aborts and resources are cleaned up.
If validation succeeds, Azure deploys the resources: VNet, Storage, Key Vault, and Gateway VM. The Gateway VM is automatically configured with:
Back in the Rimo3 portal, you can track deployment progress across three stages:
The Continue Ascent! button remains disabled until the registration key is validated and the Gateway is successfully registered. Once these steps complete, the button is enabled to proceed.
At this step, Rimo3 validates that your deployment meets all requirements. Two agent statuses must show as Online: the Gateway and the Persistent Task Runner.
Click Run checks to perform comprehensive validations:
Any issues are flagged for remediation. You can also export a PDF health check report for distribution to internal teams.
Now you define the operating system images for your Rimo3 workspace. You can choose from vanilla Azure Marketplace images or your own custom images.
Detailed Roles:
Congratulations, you’ve completed the deployment! Your Rimo3 Workspace is now live and ready to use.
From here, you can:
Rimo3 emphasizes security throughout deployment:
The Rimo3 deployment process typically takes 20–30 minutes end-to-end. It combines transparency, automation, and enterprise-grade security to give you a fully operational workspace quickly.
With your Rimo3 Workspace now live, you can immediately begin discovery, testing, modernization, and migration — all while knowing the foundation was deployed securely and according to best practices.
Welcome to the Summit! 🏔️