Skip to content






Service manager

API Explorer

TORO Cloud deployment

TORO Cloud is a service offered by TORO which allows your TORO Integrate instance to be provisioned and used over the internet with TORO's pay-per use model. This service includes the setup, hosting, infrastructure, security, maintenance, and monitoring of your TORO Integrate instance.

This type of deployment is characterized by:

  • Lack of hardware investments
  • Easy and quick setup
  • Zero need for maintenance
  • Improved dependability
  • Scalability
  • Cost-effectiveness; and
  • The ability to manage data from anywhere

Which plan should I choose?

The Cloud Edition comes in multiple types of plans. The plan you subscribe to will determine the maximum invokes you can execute per month, the number of allowed Integrate users, whether your instance will be served in a dedicated or multi-tenant environment, and the cost of subscription.


TORO Cloud enforces the following protocols to keep your TORO Integrate instance secure for you:

  • PFS1
  • SSL2/TLS3
  • HTSTS4 in all HTTPS5 endpoints in SaaS

Data protection

TORO Cloud's infrastructure is GDPR6 compliant. Got questions? Let us know, and we'll get back to you.

Back-end access and support

While your TORO Integrate instance will reside in TORO Cloud, you will not have direct access to the file system, database structure, and network infrastructure used by the instance. Dealing with any of these aforementioned systems will require the assistance of TORO's support team, who will be more than happy to address and resolve your concerns.

Want more control?

If you would like more control over your instance and the resources it uses or sits on top on, perhaps a different deployment model would suit your needs more.


Potential TORO Cloud subscribers should consider the customization options provided, as well as limits imposed, by this type of deployment such as:

  • The Cloud Edition plan to subscribe to, which defines:

    • Usage limits (maximum invokes per month)
    • The maximum number of Integrate packages
    • The maximum number of Integrate users
    • The number of CPU cores to be provisioned for the instance
    • Storage restrictions
  • Custom domain name(s)

    By default, TORO Cloud instances are accessible via a generated domain name (e.g but it is possible to use your own custom domain name by adding a CNAME entry to your DNS configurations to point to TORO's generated domain.

  • Back-end access

  • Linking on-premise servers or remote applications (e.g connecting an external database)


To subscribe to TORO Cloud, you must:

  1. Log in to the TORO Marketplace.
  2. Select TORO Cloud from the navigation panel on the left.
  3. Click the Subscribe for TORO Cloud button.

How to subscribe to TORO Cloud

After which, you will be redirected to this page to choose which TORO Cloud subscription you want.

Try TORO Cloud for free!

With TORO Sandbox, you can try out TORO Cloud for free for 30 days.

Startup and shutdown

Via Marketplace

After you've subscribed to TORO Cloud, you can start or stop TORO Cloud instances via the TORO Marketplace using the following steps:

  1. Click TORO Cloud from the left sidebar.
  2. Select the TORO Cloud instance you want to restart.
  3. Click the start or stop button at the top right side (under the Status display).

Marketplace - start/stop button for TORO Cloud

Contact us

You may also contact support to start or stop instances for you.

Via Coder Cloud

Starting Coder Cloud v1.5.3, you may now restart or shutdown your TORO Integrate instance from Coder Cloud. To do this, right click on your instance in the Coder Navigator view and then select Shutdown.

Shutdown instance from Coder Cloud

The restart option would appear when Coder Cloud is accessed while the associated TORO Integrate instance is down.

  1. Perfect Forward Secrecy or PFS is a security protocol that secures a session by generating a new Diffie-Hellman key for each session. 

  2. Secure Sockets Layer or SSL is a the standard protocol used to implement cryptography to provide secure exchange of data over a network. 

  3. Transport Layer Security or TLS is the more secure successor of SSL which focuses on cryptographic security, interoperability, extensibility, and relative efficiency. 

  4. HTTP Strict Transport Security is a web security policy that aims to secure HTTPS websites against MITM attacks. 

  5. Hyper Text Transfer Protocol Secure or HTTPS is the secure version of the HTTP protocol. 

  6. General Data Protection Regulation is a regulation in European Union (EU) law that requires businesses to protect the personal data and privacy of all individuals belonging to the EU.