opendesk

OpenDesk (often stylized as openDesk) is the German federal government’s sovereign, open-source digital workplace suite, developed and maintained by ZenDiS (Zentrum für Digitale Souveränität in der öffentlichen Verwaltung), a publicly owned GmbH under the Federal Ministry of the Interior (BMI). Launched around 2024 (with version 1.0 in October 2024), it serves as a secure, EU-sovereign alternative to Microsoft 365 or Google Workspace for public administrations.

It integrates mature open-source tools into a unified, customizable platform:

The full suite emphasizes digital sovereignty (data residency in Germany/EU, no foreign jurisdiction access), transparency (fully open-source), BSI C5 compliance (German federal cloud security standard), and GDPR/DSGVO alignment. It’s used by German federal ministries, state governments (e.g., MPK conferences), and even international bodies like the ICC.

Important: Like LaSuite, openDesk is not a single app but a composed stack. Official deployments use Kubernetes (often via Helm charts or helmfile) for production. Self-hosting is fully supported via the community edition on Open CoDE (Germany’s public GitLab instance at gitlab.opencode.de).

How to deploy as securely as possible (step-by-step, maximum sovereignty & hardening)

To match or exceed official deployments (e.g., those on IONOS, STACKIT, or Sovereign Cloud Stack), prioritize German/EU-certified infrastructure, audited open-source components, and zero-trust principles.

1. Choose sovereign & certified infrastructure (critical for true sovereignty)

2. Source code & deployment artifacts (official & verifiable)

3. Authentication & identity (zero-trust base)

4. Deployment methods (production-ready)

Kubernetes + Helm/helmfile is the official/recommended way for scale and security:

  1. Get a compliant K8s cluster (e.g., via SCS, STACKIT, or self-managed with kubeadm + security hardening).
  2. Clone repo: git clone https://gitlab.opencode.de/bmi/opendesk
  3. Use helmfile (preferred in many guides) or direct Helm:
    • Install helmfile if needed.
    • Customize helmfile/environments/.../values.yaml (or sample.gotmpl): set domains, secrets, storage classes, ingress, etc.
    • Run helmfile sync or helm install/upgrade.
  4. Alternative: Docker Compose for testing/small setups (not production).
  5. GitOps: Use FluxCD or ArgoCD to manage deployments declaratively.

Expose only via ingress controller (e.g., NGINX with mTLS, cert-manager for Let’s Encrypt/internal CA).

5. Hardening & security controls (apply everywhere)

6. Operational security & governance

Summary: Maximum security checklist

For public administrations, contact ZenDiS via https://www.opendesk.eu/en/contact or book a demo — they provide guidance, pilots, and sometimes managed hosting. For self-host/private use, start with the SCS guide (https://github.com/SovereignCloudStack/opendesk-on-scs) or quickstart in the repo — it’s one of the best-documented paths.

This setup delivers security comparable to (or better than) official German government instances while remaining fully sovereign and open-source. If you need help with a specific component (e.g., helm values for Nextcloud or Jitsi hardening), share your target scale/infra!