On-Premises Security

Security You Can Trust

Identity Mesh runs entirely within your network. Your identity data never leaves your infrastructure, protected by DPAPI encryption, Windows Negotiate auth, and comprehensive audit logging.

Security Posture

Built for on-premises deployment with enterprise security at every layer

Identity Mesh is designed as on-premises software that deploys within your own data center or private infrastructure. Your identity data stays entirely within your network — there is no cloud dependency, no external data transfer, and no multi-tenant shared infrastructure. This architecture gives you complete data sovereignty and control over your security posture.

Security Features

Secret Protection

Connection strings, passwords, and sensitive configuration values are encrypted using Windows DPAPI and resolved at runtime via {{secret:name}} references.

  • DPAPI-encrypted secrets
  • TLS for connector connections
  • Runtime secret resolution

Access Control

Role-based access control with Windows Negotiate authentication (Kerberos/NTLM) for the Admin UI and API.

  • Role-based access control (RBAC)
  • Windows Negotiate auth (Kerberos/NTLM)
  • Least-privilege principle

Comprehensive Auditing

Every identity operation is logged with full context — before/after values, confidence scores, connector source, and timestamps.

  • Before/after value tracking
  • Run history per connector
  • Admin action logging via API

On-Premises by Design

Your data never leaves your infrastructure

Windows Service Deployment

Installed as a Windows Service via MSI on your own servers. No cloud infrastructure required.

Your SQL Server Database

All identity data, audit logs, and configuration are stored in your own SQL Server instance.

Air-Gapped Compatible

No outbound internet connections required. The sync engine operates entirely within your network perimeter.

Complete Data Sovereignty

You control where your data resides, how it's backed up, and who has access. No third-party data processing.

Security Documentation

We're happy to share details about our security architecture

Need to evaluate Identity Mesh for your security and compliance requirements? Contact us for an architecture overview, deployment guide, and answers to your security questionnaire.

Request Documentation

Have Security Questions?

Our team is ready to discuss your requirements and answer any questions about our security posture.