JIL Sovereign Technologies, Inc. · Deployment Document · JIL-DD-CUST-001

Customer Deployment Checklist.

Everything your IT, identity, network, compliance, and procurement teams need to configure on your side before JIL Sovereign can go live in your environment. Hand this document to those teams as a single source of truth — every required + recommended action is itemized with the exact endpoint, ID, or document name.

Companion to JIL on Snowflake · Technical Design Document and JIL Cloud Architecture. Updated whenever a new external dependency lands.

01 Identity, SSO & SCIM

Your identity provider becomes the authoritative source for who can sign into the JIL customer portal. We do not maintain a separate password store for federated users.

ItemWhat you doStatus
SSO (OIDC or SAML 2.0) Register JIL as a relying party in your IdP (Okta / Azure AD / Ping / Auth0). We accept either OIDC (/oauth/callback) or SAML 2.0 (POST-binding). We provide the metadata XML / OIDC discovery URL after contract. Required
SCIM 2.0 provisioning Push user lifecycle events to JIL: create, update, deactivate. Endpoint: https://customer.jilsovereign.com/scim/v2/. We issue a bearer token per tenant. SCIM avoids "stale users" risk after employees leave your org. Required
Group-to-role mapping Map your IdP groups to JIL roles: SIU_ANALYST, SIU_SUPERVISOR, COMPLIANCE_OFFICER, READ_ONLY_AUDITOR, TENANT_ADMIN. We send a worksheet — you fill in the group names from your directory. Required
MFA enforcement JIL trusts your IdP's MFA decision. If your IdP requires MFA for the JIL app, we honor that. If not, JIL can enforce a step-up MFA on sensitive actions (Authorize Tier 2, sign CREB™) via WebAuthn. Required
Session policy Session lifetime, idle timeout, concurrent-session limits — we use your IdP defaults unless you specify overrides. Recommended
Service account for SCIM Create a non-human IdP account with permissions only to call SCIM. Rotate its bearer token quarterly. Required

02 Network Egress Whitelisting

If your network team operates an outbound firewall, allow-list the following hostnames + ports. All traffic is TLS 1.2+. PrivateLink alternatives are listed where they exist — prefer those for production.

DestinationHostname / endpointPortPurpose
Snowflake (the data + attestation plane)
Your Snowflake account<account-locator>.snowflakecomputing.com443Native data, T1 + AVA SQL, SPCS service-to-Snowflake calls
Snowflake account regional*.<region>.snowflakecomputing.com
(e.g., *.us-east-1.snowflakecomputing.com)
443OAuth, regional metadata, internal Snowflake routing
Snowflake stage backend*.s3.<region>.amazonaws.com (or Azure / GCS analog)443Stage uploads (PUT) + downloads (GET) for COPY INTO
Snowflake image registry<account-locator>.registry.snowflakecomputing.com443SPCS docker push / pull
(Recommended) Snowflake PrivateLinkPer region — Snowflake provisions on request443Replaces public hostnames with VPC-local DNS — removes egress entirely
AWS Bedrock + SageMaker (LLM / model layer used by Ava agentic checks)
Bedrock runtime — us-east-1bedrock-runtime.us-east-1.amazonaws.com443Claude / Llama / Titan inference for Ava agentic Tier 1→2 routing
Bedrock runtime — us-west-2bedrock-runtime.us-west-2.amazonaws.com443Failover region for Bedrock
Bedrock model invokebedrock.us-east-1.amazonaws.com
bedrock.us-west-2.amazonaws.com
443Model metadata + invoke (lower-rate APIs)
SageMaker runtimeruntime.sagemaker.us-east-1.amazonaws.com443Custom-model inference endpoints (when a tenant runs their own model)
SageMaker control planeapi.sagemaker.us-east-1.amazonaws.com443Endpoint management, autoscaling
STS (AssumeRole for tenant IAM)sts.amazonaws.com443Cross-account role assumption when JIL writes to your S3
(Recommended) AWS PrivateLink for Bedrockbedrock-runtime-fips.<region>.amazonaws.com via VPC endpoint443Private connectivity, FIPS-compliant; HIPAA-eligible
JIL Sovereign hosts
Customer portalcustomer.jilsovereign.com443SIU analyst UI
Customer API (proxy)retail-api.jilsovereign.com443Auth + engagement API the portal calls
JIL marketing / docsjilsovereign.com443Public docs, TDDs, status
Attestyx (per-tx integrity)attestyx.com443Per-transaction Attestyx API (separate Global Hands 501c3 product) if customer subscribes
External data feeds (JIL calls these from inside SPCS once all-in; outside today)
SAM.gov exclusions APIapi.sam.gov443Federal exclusion list refresh
OFAC sanctions servicesanctionslistservice.ofac.treas.gov443OFAC CSL XML feed
UN sanctionsscsanctions.un.org443UN consolidated sanctions XML
UK OFSI sanctionsofsistorage.blob.core.windows.net443UK HMT sanctions XML
DOJ press releaseswww.justice.gov443Healthcare-fraud press release JSON
Google Maps Platformmaps.googleapis.com
addressvalidation.googleapis.com
443Premise classification (Places, Geocoding, Street View, Address Validation)
If your team can only allow-list IPs (not hostnames)
Snowflake publishes their IP ranges per region in their SYSTEM$ALLOWLIST function — we will share the exact list for your account region. AWS publishes IP ranges as JSON at https://ip-ranges.amazonaws.com/ip-ranges.json (filter by service=BEDROCK + region). For our hosts we publish a static IP allowlist at jilsovereign.com/.well-known/jil-allowlist.json (refreshed if Cloudflare rotates).

03 Snowflake Setup

If you already have a Snowflake account (any edition), JIL can either share into your account or write to a tenant-isolated database in our account that you read. The choice has compliance + cost implications.

OptionWhat you doWhen to choose
A. BYO Snowflake (recommended for PHI) You provide a Snowflake account locator + region. We share data into your account via Snowflake Data Sharing. Your account, your storage, your governance. PHI processing · data residency requirements · existing Snowflake investment · single-pane analytics
B. Reader account on JIL Snowflake JIL provisions a Reader Account inside our Snowflake instance. You log in to read findings. No data leaves our perimeter. Pre-production demos · low-volume engagements · customers who don't yet have Snowflake
C. Hybrid (write back to your S3) Findings sync from Snowflake to a customer-controlled S3 bucket via Snowflake external stage. Bring-your-own-bucket. Customer prefers blob storage of record · downstream tools read from S3

What you provide (for Option A)

04 Compliance & Legal Documents

DocumentBetweenStatus
BAA (Business Associate Agreement) Customer ↔ JIL Sovereign Technologies, Inc. Required if PHI
BAA (separate) Customer ↔ Snowflake (if Option A above) Required if PHI + Option A
BAA (separate) Customer ↔ AWS (Bedrock + SageMaker fall under AWS HIPAA-eligible services) Required if PHI
MSA + SOW Customer ↔ JIL Sovereign Technologies, Inc. Required
Data Use Agreement Customer ↔ JIL (specifies what JIL can do with customer data; default is "process for the customer's benefit only, no model training, no aggregation across tenants") Required
SLA Customer ↔ JIL (uptime, response, RPO/RTO targets per tier subscription) Required
SOC 2 Type II report (from JIL to customer) JIL provides under NDA Recommended for InfoSec review
HITRUST CSF certification (from JIL to customer) JIL provides certification details under NDA Recommended for healthcare buyers
SIG / CAIQ vendor questionnaire Customer issues — JIL responds (we maintain a current SIG-Lite + CAIQ v4) Standard for procurement

05 Webhooks & Downstream Integrations

If your SIU intake / case-management system needs to ingest JIL findings programmatically, configure these endpoints on your side.

Webhook eventWhere you receiveAuth
tier1.finding.createdYour endpoint — e.g., https://siu.uhg.com/api/jil/findingsHMAC-SHA256 signed payload (shared secret you provide); we sign every webhook
ava.plan.issuedSame / different endpoint per your choiceSame HMAC scheme
ava.plan.authorizedNotifies your governance team that a Tier 2 spend was approvedSame
tier2.evidence.deliveredPer-case evidence pack arrivalSame
tier3.creb.sealedCourt-Ready Evidence Bundle finalized + on-chain anchor confirmedSame

Retries: exponential backoff for 24 hours, DLQ after. Replay endpoint available on demand.

06 Operational — SIEM Log Forwarding & Alerts

StreamFormatDestination options
Customer-portal access logJSON (one event per line)Splunk HEC · Sumo Logic Collector · Datadog · S3 + Athena · Kafka (your topic)
API audit trailJSON, includes IP, user, action, evidence refSame
Authorize-action eventsJSON, includes PO# / Customer Agreement #Same
Tier 1/2/3 attestation receiptsJSON with content hash + on-chain anchor (if Tier 3)Same
JIL platform health eventsJSON, severity-taggedPagerDuty / Opsgenie webhook · Slack / Teams · Email

Status page subscription: status.jilsovereign.com — your team subscribes for incident notifications. Webhook hookup to your incident-management system available.

07 Custom Branding (Optional)

ItemWhat you provideEffect
Custom subdomaine.g., jil.uhg.com — you create a CNAME to customer.jilsovereign.comCustomer portal under your domain
TLS certificateWe can manage via ACME on the CNAME, or you can provideCert ownership is your call
Tenant logo + accent colorSVG + hex colorRenders top-left of portal for your users
Login screen co-brandingYour logo + "Sign in with <your IdP>" button textReinforces SSO journey
Email-from addresse.g., jil-alerts@uhg.com via DKIM/SPF delegationSystem emails from your domain

08 Go-Live Timeline

A typical enterprise deployment from contract-signature to first production batch — assuming the customer can move at standard enterprise procurement velocity.

PhaseDurationCritical path on customer side
Week 1BAA + MSA + SOW executionProcurement, legal, InfoSec sign-off
Week 1-2Snowflake setupIf BYO: account provision + share acceptance; if reader: just user provisioning
Week 2SSO + SCIM setupIdentity team registers JIL as SP + configures SCIM push
Week 2Network whitelistingNetwork team adds the egress allow-list (Section 02)
Week 2-3Webhook + SIEM integrationEngineering team builds the webhook receiver + log forwarder
Week 3First production batch ingestionCustomer provides claim data (CSV / Snowflake share / S3) — JIL runs T1 in ≤ 4 hours from receipt
Week 3-4First AVA plan reviewed + first Tier 2 authorizationSIU analyst signs into the portal, reviews the plan, authorizes
Week 4+Steady stateDaily / weekly / per-engagement cadence per the SLA
Compressed timeline
For a customer with an existing Snowflake account, a fully-staffed identity team, and a pre-existing BAA template, end-to-end is achievable in 2-3 weeks. The procurement track is almost always the bottleneck.

09 Who to Contact

Your JIL deployment touches at least five of your internal teams. We provide a named lead for each.

Your teamJIL counterpartWhat they coordinate
Procurement / LegalJIL Deal DeskMSA, BAA, SOW, DPA, SLA
InfoSec / GRCJIL SecuritySIG questionnaire, SOC 2 / HITRUST review, penetration test scope
Identity / IAMJIL Solutions EngineeringSSO, SCIM, group mapping, MFA policy
Network / Cloud OpsJIL Solutions EngineeringEgress allow-list, PrivateLink, regional configuration
Data EngineeringJIL Data EngineeringSnowflake share, S3 stage, data residency, schema mapping
SIU / Compliance OfficersJIL Customer SuccessLOB profile, engagement onboarding, recurring cadence, playbook