Features

Ocelot-Cloud is offered in two editions.The Freemium Edition is designed to meet the needs of casual and small-scale users. The commercial features of the Premium Edition are for users who require more advanced functionality.

Business Philosophy

  • Safety is always free: Features required to run the platform safely are never paywalled.
  • Freemium is fully usable: The free edition supports real, long-term self-hosting.
  • Professional operation is premium: Paid features focus on organizational control, governance, and compliance.
  • No artificial upgrade pressure: Premium features are purely additive. Freemium functionality is never removed.

Features by Edition

Below are the key features. A check mark means the feature is available, and a cross means it’s not available in the associated edition.

FeatureFreemiumPremium
App Store
Networking
Certificate
Users
Access Policy
Network Protection
Backups
Maintenance
Single Sign-On
Terminal
Report
Group
Monitoring
Retention
Email
Compliance

Apps Store

The App Store is the central location for downloading and installing apps and updates. Anyone can upload their own apps.

The Ocelot Store Client (OSC) is a CLI tool designed to enable developers manage apps in the App Store. When run locally, it scans for newer versions of Docker images, applies updates, performs automated health checks, and, if successful, uploads the updated app to the App Store for distribution. This automates the majority of the work required for third-party app maintenance. w

Networking

When an app is installed, Ocelot-Cloud acts as a network proxy so that users can immediately access the app through a subdomain.

Certificate

Ocelot-Cloud enables you to generate certificates that encrypt network data transmitted between users’ browsers and the app.

Users

Create user accounts and assign them to other people to grant them access to the apps.

Access Policy

Admins can set an access policy for each individual app, such as:

  • authenticated: Only logged-in users can access the app.
  • public: Anyone can access the app without logging in. This is ideal for blogs, forums, or websites.

Network Protection

The HTTP protection layer enforces a maximum request body size, per-IP rate limiting, and server timeouts.

Backups

Create backups of your apps on an external server, and restore them when needed. Also, backups enable effortless migration between servers, reducing the process to just a few clicks.

Maintenance

Ocelot-Cloud runs a background maintenance agent that automatically updates installed apps, creates backups, and removes outdated backups.

Single Sign-On

Provides integrated identity and single sign-on (SSO) capabilities based on OpenID Connect (OIDC). It can act both as an identity provider, allowing users to authenticate once and access all connected apps, and as an OIDC client, enabling authentication via external identity providers such as Google, GitHub, or other OIDC-compliant services.

Terminal

Provides secure, browser-based shell access to app containers. It allows administrators to directly interact with running apps for tasks such as initial setup, troubleshooting, maintenance, configuration changes, and advanced debugging, without requiring SSH access to the host system.

Report

Administrators receive reports about maintenance events, such as updates or backups of apps.

Group

Groups provide granular access control. Users are assigned to groups, and groups are granted access to apps. This makes managing permissions easier, especially in larger organizations.

Monitoring

In digital infrastructure, logs, metrics, and other telemetry data are often scattered across multiple apps. Ocelot-Cloud centralizes the collection of this data, including system metrics (CPU, memory, disk, and network utilization) and usage statistics. A built-in GUI provides visualization and analysis, offering a unified view.

Ocelot-Cloud uses collected data to send administrators alerts about critical events, such as high CPU load or low disk space.

Retention

Apps generate data that accumulates over time. A retention policy determines how long this data is kept before it is automatically deleted. This helps to manage storage efficiently by removing outdated data.

Email

The email function simplifies user invitations and enables password resets. It also allows system reports to be sent about important events, such as updates, backups, and critical system conditions.

Compliance

Administrators can define and manage compliance documents such as terms of service, privacy policies, or codes of conduct. Users can be required to explicitly agree to these documents before accessing the platform. Each consent is recorded as evidence to help protect administrators in the event of future legal disputes.