All Products
Search
Document Center

Bastionhost:Selection guide

Last Updated:Mar 31, 2026

Bastionhost offers three editions to fit different security requirements, asset scales, and compliance needs. This guide helps you identify the right edition based on your scenario.

For a full feature breakdown, see Feature comparison.

Choose your edition

Ask yourself these three questions to narrow down your choice:

1. Do you need Chinese cryptographic algorithm compliance?

  • Yes → Chinese Cryptographic Algorithm Edition

2. Do you have any of the following requirements?

  • Manage assets across multiple clouds, on-premises data centers, or isolated network domains

  • Manage databases, web applications, or non-host assets

  • Require a Service Level Agreement (SLA) of 99.95% or higher (active-active dual-engine architecture)

  • Manage assets across multiple Alibaba Cloud accounts

Yes → Enterprise Dual-Engine Edition

3. Do you manage fewer than 500 hybrid assets (Linux and Windows host types only) with basic O&M security needs?

  • Yes → Basic Edition

Note: If you're unsure which edition fits, start with the Basic Edition. It covers the O&M security fundamentals for most small and medium-sized businesses and can be upgraded as your needs grow.

Edition comparison

The following table compares all three editions across key capability areas.

CapabilityBasic EditionEnterprise Dual-Engine EditionChinese Cryptographic Algorithm Edition
Scale
Recommended asset count50–500 hybrid assets500+ assetsSame as Enterprise Dual-Engine Edition
Typical industriesSmall and medium-sized businessesGovernment, finance, gaming, online education, ITGovernment, education, and industries requiring Chinese cryptographic compliance
Architecture
Deployment modelSingle-engine, cloud architectureDual-engine, active-activeSame as Enterprise Dual-Engine Edition
SLAStandardUp to 99.95%Same as Enterprise Dual-Engine Edition
Primary and secondary zonesSupported (avoids single point of failure)Supported
Domain name access modeSupportedSupportedSupported
Server Load Balancer (SLB) integrationSupportedSupportedSupported
Access control
Fine-grained O&M access and behavior authorizationSupportedSupportedSupported
User management (RAM, Active Directory, LDAP)SupportedSupportedSupported
Multi-account asset management via Resource Directory (RD)SupportedSupported
Identity source integration (DingTalk, Lark, Azure AD) via IDaaSSupportedSupported
O&M operations
Command whitelist and blacklistSupportedSupportedSupported
O&M approval for risky commandsSupportedSupportedSupported
Real-time O&M monitoring and blockingSupportedSupportedSupported
Session auditSupportedSupportedSupported
Host assets (Linux and Windows)SupportedSupportedSupported
Database O&M (RDS, self-managed, third-party; MySQL, SQL Server, PostgreSQL, Oracle)SupportedSupported
Web application O&MSupportedSupported
Application O&M with access whitelist/blacklistSupportedSupported
Automation and efficiency
Automated O&M jobs (batch script distribution)SupportedSupported
Automatic password and key rotationSupportedSupported
Multicloud and hybrid
Cross-network access via network domain proxySupportedSupported
Hybrid cloud deployment (on-premises, other clouds, cross-account)SupportedSupported
Compliance
Chinese cryptographic algorithm encryptionSupported
Chinese cryptographic two-factor authenticationSupported

What's next