Technical Library
Here we gather our most in-depth architectural guides, advanced security manuals, and best-practice documents. These resources are created to provide certified developers with the knowledge necessary to build exceptionally secure, scalable, and maintainable solutions.
Exclusive Access for Certified Developers
This library contains proprietary knowledge about the Corporate Framework's internal architecture and advanced use cases. Access to download this material is therefore strictly reserved for our network of certified developers.
Please sign in to the Developer Hub to get full access to all downloads and webinars.
Architectural Guides & E-books
In-depth, technical documents about the "how" and the "why"
E-book: Architecting for Scale – From 1,000 to 1 Million Users
A technical guide on how to use the framework's Operations engine, Queue system, and Redis caching layer to design and build applications that can handle massive growth in traffic and data.
Sign in to Download
Guide: Extending the Framework – Building Custom Modules
An advanced guide for experts, demonstrating how to build your own reusable modules that integrate seamlessly with the framework's core events and services.
Sign in to Download
E-book: The Official Performance Tuning Guide
Optimize your application for maximum performance. This guide covers advanced database indexing strategies, effective caching patterns, and methods for profiling and debugging performance bottlenecks in your code.
Sign in to Download
Guide: Advanced Workflow Patterns with the Operations Engine
A collection of best-practice code examples for building complex, multi-step asynchronous workflows with the job queue, including advanced error handling, state management, and chained jobs.
Sign in to Download
Security Deep Dives
Proprietary knowledge about our security architecture
Technical Paper: The Framework's Security Layers
An in-depth look at how our "Defense in Depth" strategy is implemented in the code. This paper reviews the specific cryptographic libraries we use, our secure boot process, and the design of our Access Control kernel.
Sign in to Download
Guide: Implementing Custom Access Control Policies
A technical guide demonstrating how to extend the built-in Access Management system with your own complex business rules and dynamic permissions.
Sign in to Download
Webinar: Migrating from v2 to v3 – A Technical Walkthrough
A recording of our technical webinar for developers on how to safely and efficiently migrate an existing application from Framework v2.x to v3.x, including how to handle breaking changes.
Sign in to Watch
Implementation Datasheets & Guides
Concrete "how-to" references for complex features
Datasheet: API Rate Limiting & Security
A technical cheat sheet for developers describing best practices for secure interaction with the API, including handling rate limits, token security, and preventing abuse.
Sign in to Download
Guide: Mastering Digital Signature Workflows
An in-depth guide with code examples for implementing advanced signing flows, such as multiple signers, sequential approval, and integration with Document Templates.
Sign in to Download
Datasheet: Open Data Integration Connectors
A technical reference on how to configure and use the built-in connectors to fetch and normalize data from public data sources like business registries and other national APIs.
Sign in to Download