An open-source zero-trust networking platform that makes network services invisible to unauthorized users with cryptographic identity and end-to-end encryption.
OpenZiti is an open-source zero-trust networking platform that creates a secure overlay network where services are invisible to unauthorized users. It replaces traditional VPNs and open ports by requiring every connection to be authenticated with cryptographic identity, authorized by policy, and encrypted end-to-end. The platform works with existing applications via lightweight tunnelers and new applications via embedded SDKs for the strongest security model.
Developers, DevOps engineers, and security teams building or managing secure applications across clouds, IoT environments, or hybrid infrastructure who need to eliminate VPNs and open ports. It's also for organizations implementing zero-trust security models for both human and non-human workloads.
Developers choose OpenZiti because it provides true zero-trust networking with 'dark services' that have no listening ports, eliminating the attack surface entirely. Its unique combination of cryptographic identity for everything, end-to-end encryption, and flexible deployment models (from no-code tunnelers to embedded SDKs) makes it practical for both brownfield and greenfield environments.
The parent project for OpenZiti. Here you will find the executables for a fully zero-trust, programmable network @OpenZiti
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Services have zero listening ports, making them invisible to scanners and unauthorized users, as highlighted in the Key Capabilities section, eliminating traditional attack surfaces.
Supports three models—Network, Host, and Application Access—allowing migration from no-code tunnelers to embedded SDKs for gradual adoption, detailed in the Three Deployment Models section.
Uses libsodium for encryption and mTLS for authentication, ensuring data security from source to destination without trusting intermediate networks, per the Zero Trust section.
Fine-grained policies based on cryptographic identities enable real-time access revocation, closing active connections instantly, as stated in the Policy-Driven Access capability.
Managing controller, edge routers, and identities requires significant DevOps effort, with production deployments needing careful planning beyond the quick starts, as indicated in the Getting Started section pointing to external documentation.
SDKs are spread across multiple repositories (e.g., Go, C, Java), leading to potential inconsistencies in updates, documentation, and support levels, which can hinder integration.
The overlay network and encryption layers introduce additional latency and overhead, which may not suit real-time or high-throughput applications, though smart routing mitigates this partially.
OpenZiti is an open-source alternative to the following products: