Security You Can Trust
Identity Mesh runs entirely within your network. Your identity data never leaves your infrastructure, protected by DPAPI encryption, Windows Negotiate auth, and comprehensive audit logging.
Security Posture
Built for on-premises deployment with enterprise security at every layer
Identity Mesh is designed as on-premises software that deploys within your own data center or private infrastructure. Your identity data stays entirely within your network — there is no cloud dependency, no external data transfer, and no multi-tenant shared infrastructure. This architecture gives you complete data sovereignty and control over your security posture.
Security Features
Secret Protection (DPAPI + AES-256)
Connection strings, passwords, API keys, and sensitive configuration values are encrypted at rest using Windows DPAPI and resolved at runtime via {{secret:name}} references. Secrets are never stored in plaintext.
- AES-256 encryption via Windows DPAPI
- Machine-bound keys (LocalMachine scope)
- TLS 1.2+ for all connector connections
- Runtime-only decryption (secrets never in config files)
Access Control
Role-based access control with Windows Negotiate authentication (Kerberos/NTLM) for the Admin UI and API.
- Role-based access control (RBAC)
- Windows Negotiate auth (Kerberos/NTLM)
- Least-privilege principle
Comprehensive Auditing
Every identity operation is logged with full context — before/after values, confidence scores, connector source, and timestamps.
- Before/after value tracking
- Run history per connector
- Admin action logging via API
Encryption Architecture
How Identity Mesh protects secrets at rest and in transit
Secrets at Rest — Windows DPAPI
Identity Mesh uses the Windows Data Protection API (DPAPI) to encrypt all secrets stored in the SQL database. DPAPI is a built-in Windows cryptographic service that provides symmetric encryption without requiring your application to manage encryption keys directly.
How DPAPI Works
- AES-256 encryption — DPAPI uses AES-256-CBC (Advanced Encryption Standard with 256-bit keys) as its underlying cipher. This is the same encryption standard used by governments and financial institutions worldwide.
- Machine master key — The AES key is derived from the Windows machine's master key, which is itself protected by the machine's DPAPI system key. This key is bound to the specific server where Identity Mesh is installed.
- No key management burden — You do not need to generate, rotate, store, or distribute encryption keys. Windows handles key lifecycle automatically through the LSA (Local Security Authority).
- Non-exportable — Encrypted secrets cannot be decrypted on a different machine. Even if the SQL database is copied, the secrets remain encrypted and unreadable without the originating server's machine key.
LocalMachine Scope
Identity Mesh encrypts secrets using the LocalMachine scope by default. Any process running on the server can decrypt the secret, but it cannot be decrypted on any other machine. This is the recommended scope for Windows services.
CurrentUser Fallback
When secrets are initially created via the Admin API (running as a service account), they may use CurrentUser scope. The engine automatically attempts CurrentUser first, then falls back to LocalMachine for seamless decryption regardless of scope.
What Gets Encrypted
{{secret:name}} Data in Transit
TrustServerCertificate configurable License Protection
Identity Mesh licenses are cryptographically signed using RSA-4096 with SHA-256 signatures. The public key is embedded in the engine binary, and the license file is verified on every sync cycle. License files cannot be tampered with or forged — any modification invalidates the RSA signature.
On-Premises by Design
Your data never leaves your infrastructure
Windows Service Deployment
Installed as a Windows Service via MSI on your own servers. No cloud infrastructure required.
Your SQL Server Database
All identity data, audit logs, and configuration are stored in your own SQL Server instance.
Air-Gapped Compatible
No outbound internet connections required. The sync engine operates entirely within your network perimeter.
Complete Data Sovereignty
You control where your data resides, how it's backed up, and who has access. No third-party data processing.
Security Documentation
We're happy to share details about our security architecture
Need to evaluate Identity Mesh for your security and compliance requirements? Contact us for an architecture overview, deployment guide, and answers to your security questionnaire.
Request DocumentationHave Security Questions?
Our team is ready to discuss your requirements and answer any questions about our security posture.