Skip to content

Toro Cloud Dev Center

TORO Cloud deployment

TORO Cloud is a service offered by TORO which allows your Martini instance to be provisioned and used over the internet with TORO's pay-per use model. This service includes the setup, hosting, infrastructure, security, maintenance, and monitoring of your Martini instance.

This type of deployment is characterized by:

  • Lack of hardware investments;
  • Easy and quick setup;
  • Zero need for maintenance;
  • Improved dependability;
  • Scalability;
  • Cost-effectiveness; and
  • The ability to manage data from anywhere.

Which plan should I choose?

The Martini Online Edition comes in multiple types of plans. The plan you subscribe to will determine the maximum invokes you can execute per month, the number of allowed Martini users, whether your instance will be served in a dedicated or multi-tenant environment, and the cost of subscription.


TORO Cloud enforces the following protocols to keep your Martini instance secure for you:

  • PFS1
  • SSL2/TLS3
  • HSTS4 in all HTTPS5 endpoints in SaaS

Data protection

TORO Cloud's infrastructure is GDPR6 compliant. Got questions? Let us know, and we'll get back to you.

Back-end access and support

While your Martini instance will reside in TORO Cloud, you will not have direct access to the file system, database structure, and network infrastructure used by the instance. Dealing with any of these aforementioned systems will require the assistance of TORO's support team, who will be more than happy to address and resolve your concerns.

Want more control?

If you would like more control over your instance and the resources it uses, perhaps a different deployment model would suit your needs more.


Potential TORO Cloud subscribers should consider the customization options provided, as well as limits imposed by this type of deployment such as:

  • Which plan under the Online Edition to subscribe to, which defines:

    • Usage limits (maximum invokes per month)
    • The maximum number of Martini packages
    • The maximum number of Martini users
    • The maximum number of Martini endpoints
    • The maximum number of JMS destinations
    • The number of CPU cores to be provisioned for the instance
    • The amount of RAM to be provisioned for the instance
    • Storage restrictions
  • Custom domain name(s)

    By default, TORO Cloud instances are accessible via a generated domain name (e.g ${code} but it is possible to use your own custom domain name. This is done by adding a CNAME entry that points to TORO's generated domain in your DNS configurations.

  • Back-end access

  • Linking on-premise servers or remote applications (e.g connecting an external database)


To subscribe to TORO Cloud, follow the steps below:

  1. Log in to the TORO Marketplace.
  2. Select Martini Online from the navigation panel on the left.
  3. Click the Subscribe for TORO Cloud button.
  4. Choose which TORO Cloud subscription you would like, as shown below.

How to subscribe to TORO Cloud

Startup and shutdown

Via the TORO Marketplace

After you've subscribed to TORO Cloud, you can start or stop TORO Cloud instances via the TORO Marketplace using the following steps:

  1. Click TORO Cloud from the left sidebar.
  2. Select the TORO Cloud instance you would like to restart.
  3. Click the start or stop button at the top right side (under the Status display).

Marketplace - start/stop button for TORO Cloud

Contact us

You may also contact support to start or stop instances for you.

Via Martini Online

You can also restart or shutdown your Martini instance from Martini Online. To do this, right click on your instance in the Navigator view and then select Shut Down.

Shutdown instance from Martini Online

The restart option will appear when Martini Online is accessed while the associated Martini instance is down.

  1. Perfect Forward Secrecy or PFS is a security protocol that secures a session by generating a new Diffie-Hellman key for each session. 

  2. Secure Sockets Layer or SSL is a the standard protocol used to implement cryptography to provide secure exchange of data over a network. 

  3. Transport Layer Security or TLS is the more secure successor of SSL which focuses on cryptographic security, interoperability, extensibility, and relative efficiency. 

  4. HTTP Strict Transport Security is a web security policy that aims to secure HTTPS websites against MITM attacks. 

  5. Hyper Text Transfer Protocol Secure or HTTPS is the secure version of the HTTP protocol. 

  6. General Data Protection Regulation is a regulation in European Union (EU) law that requires businesses to protect the personal data and privacy of all individuals belonging to the EU.