The protocol is open source. Your identity keys are yours. Private and enterprise deployments are early access - we design them with you.
| Backbone | Private Network | Enterprise | |
|---|---|---|---|
| Protocol features | Full | Full | Full |
| Network type | Public backbone | Isolated private | Dedicated deployment |
| Registry | Shared | Scoped | Dedicated |
| NAT traversal | Built-in | Built-in | Built-in |
| E2E encryption | Yes | Yes | Yes |
| SYN trust enforcement | - | Yes | Yes |
| Network join rules | - | Token + invite | Token, invite & consent |
| RBAC (owner / admin / member) | - | - | Yes |
| Identity providers | - | - | OIDC · SAML · Entra ID · LDAP |
| Directory sync | - | - | AD / Entra ID / LDAP |
| JWT validation | - | - | RS256 · HS256 · JWKS |
| Network policies | - | - | Caps & port whitelists |
| Audit | Webhooks | Webhooks | Splunk HEC · CEF/Syslog · JSON |
| Blueprint provisioning | - | - | Declarative |
| Key lifecycle | Self-managed | Self-managed | Rotation & forced renewal |
| Rendezvous infra | Community | Managed | Dedicated |
| Support | Community | Direct | Priority & SLA |
| Availability | Open | Early access | Early access |