Architecture

Deterministic compliance architecture for multi-authority execution.

This page consolidates the technical proof: system topology, run-state controls, authority failure containment, and extensibility boundaries.

High-Level Architecture

Platform adapters, execution core, and authority connectors.

The master diagram shows where reliability boundaries are enforced across the full stack.

Regulatrix – Compliance Orchestration Engine

Regulatrix – Compliance Orchestration EngineEnterprise architecture of the Regulatrix compliance orchestration engine spanning adapter, execution, authority connector, and control layers.Platform Adapter LayerRegulatrix Execution EngineAuthority Submission BoundaryAuthority Connector LayerObservability and ControlShopifyERP SystemsPOS SystemsCustom APIsWebhook IngestSignature VerificationIdempotency Guard (ReplayProtection)Event NormalizationRun State MachineValidation EngineTransformation LayerDigital Signing ModuleAudit LoggerRetry SchedulerSubmission OrchestratorZATCA (KSA)FTA (UAE)PEPPOL (EU)Future Authority PluginsStructured LoggingMetricsDistributed TracingCircuit BreakerDead Letter QueueAccepted State
Platform adapters feed a controlled execution core, authority submissions cross an explicit risk boundary, and accepted outcomes remain traceable through integrated observability controls.

Run State Machine

Controlled state transitions with deterministic progression.

Database-level transition guards prevent invalid jumps and preserve consistent run outcomes.

Regulatrix - Run State Progression

Regulatrix - Run State ProgressionCompliance-grade state progression with explicit terminal outcomes and controlled retry re-entry.QueuedValidateTransformSignSubmitFinal: AcceptedRetry ScheduledFinal: Rejected

State Transition Notes

  • Idempotent execution is enforced before transition commits.
  • State transition guard is enforced at the database layer.
  • Audit logs are captured at each state transition.
  • Submit to Accepted represents terminal success.
  • Submit to Rejected represents terminal failure.
  • Retry Scheduled returns to Validate through controlled re-entry.
Compliance-grade state progression with explicit terminal outcomes and controlled retry re-entry.

Retry and Circuit Breaker

Failure containment for unstable authority windows.

Circuit-breaker states and bounded retry loops reduce cascading operational failures.

Authority Degradation and Recovery - Circuit Breaker Model

Authority Degradation and Recovery - Circuit Breaker ModelBreaker states constrain authority risk, while retries and DLQ controls prevent cascading failure.Closed (NormalOperation)Open (AuthorityBlocked)Half-OpenRetry Loop (BackoffStrategy)Dead Letter Queue

Breaker Control Notes

  • Failure threshold counter determines when the breaker opens.
  • Probe window timing gates half-open recovery checks.
  • Probe success closes the breaker and resumes normal operations.
  • Probe failure returns the breaker to open state.
  • Retry loop uses exponential backoff scheduling.
  • Dead-letter queue captures runs after max retry exhaustion.
Breaker states constrain authority risk, while retries and DLQ controls prevent cascading failure.

Plugin Architecture

Country plugins extend a stable execution core.

Extensibility is layered so country-specific requirements do not destabilize shared run controls.

Country-neutral core

Execution reliability controls, state progression rules, and replay-safe ingestion remain shared across all markets.

Country plugin layer

Tax authority requirements, document validation rules, and signature specifics are isolated by jurisdiction plugin.

Platform adapter layer

Shopify, ERP, POS, and custom adapters normalize source events before run creation.

Authority connectors

Connectors encapsulate transport protocols, response mapping, and failure semantics per authority.