Security You Can Trust
Identity Mesh runs entirely within your network. Your identity data never leaves your infrastructure, protected by DPAPI encryption, Windows Negotiate auth, and comprehensive audit logging.
Security Posture
Built for on-premises deployment with enterprise security at every layer
Identity Mesh is designed as on-premises software that deploys within your own data center or private infrastructure. Your identity data stays entirely within your network — there is no cloud dependency, no external data transfer, and no multi-tenant shared infrastructure. This architecture gives you complete data sovereignty and control over your security posture.
Security Features
Secret Protection
Connection strings, passwords, and sensitive configuration values are encrypted using Windows DPAPI and resolved at runtime via {{secret:name}} references.
- DPAPI-encrypted secrets
- TLS for connector connections
- Runtime secret resolution
Access Control
Role-based access control with Windows Negotiate authentication (Kerberos/NTLM) for the Admin UI and API.
- Role-based access control (RBAC)
- Windows Negotiate auth (Kerberos/NTLM)
- Least-privilege principle
Comprehensive Auditing
Every identity operation is logged with full context — before/after values, confidence scores, connector source, and timestamps.
- Before/after value tracking
- Run history per connector
- Admin action logging via API
On-Premises by Design
Your data never leaves your infrastructure
Windows Service Deployment
Installed as a Windows Service via MSI on your own servers. No cloud infrastructure required.
Your SQL Server Database
All identity data, audit logs, and configuration are stored in your own SQL Server instance.
Air-Gapped Compatible
No outbound internet connections required. The sync engine operates entirely within your network perimeter.
Complete Data Sovereignty
You control where your data resides, how it's backed up, and who has access. No third-party data processing.
Security Documentation
We're happy to share details about our security architecture
Need to evaluate Identity Mesh for your security and compliance requirements? Contact us for an architecture overview, deployment guide, and answers to your security questionnaire.
Request DocumentationHave Security Questions?
Our team is ready to discuss your requirements and answer any questions about our security posture.