Skip to content
@build-trust

Ockam

Build secure-by-design applications that can Trust Data-in-Motion.

Trust for Data-in-Motion

Ockam is a suite of open source programming libraries and command line tools to orchestrate end-to-end encryption, mutual authentication, key management, credential management, and authorization policy enforcement – at massive scale.

Modern applications are distributed and have an unwieldy number of interconnections that must trustfully exchange data. To trust data-in-motion, applications need end-to-end guarantees of data authenticity, integrity, and confidentiality. To be private and secure by-design, applications must have granular control over every trust and access decision. Ockam allows you to add these controls and guarantees to any application.

Quick Start

Let's build a solution for a very common secure communication topology that applies to many real world use cases. We'll build our first example using Ockam Command but it is just as easy to build end-to-end trustful communication using Ockam Programming Libraries

An application service and an application client running in two private networks wish to securely communicate with each other without exposing ports on the Internet. In a few simple commands, we’ll make them safely talk to each other through an End-to-End Encrypted Cloud Relay.

Install Ockam Command

If you use Homebrew, you can install Ockam using brew.

# Tap and install Ockam Command
brew install build-trust/ockam/ockam

This will download a precompiled binary and add it to your path. If you don’t use Homebrew, you can also install on Linux and MacOS systems using curl.

curl --proto '=https' --tlsv1.2 -sSf \
    https://raw.githubusercontent.com/build-trust/ockam/develop/install.sh | sh

After the binary downloads, please move it to a location that is in your shell's $PATH

mv ockam /usr/local/bin

End-to-end encrypted and mutually authenticated communication

Next, step through the following commands to setup secure and private communication between our application service and an application client.

# Check that everything was installed correctly by enrolling with Ockam Orchestrator.
#
# This will create a Space and Project for you in Ockam Orchestrator and provision an
# End-to-End Encrypted Cloud Relay service in your `default` project at `/project/default`.
ockam enroll
ockam project information --output json > default-project.json

# -- APPLICATION SERVICE --

# Start an application service, listening on a local ip and port, that clients would access
# through the cloud encrypted relay. We'll use a simple http server for this first example but
# this could be any other application service.
python3 -m http.server --bind 127.0.0.1 5000

# In a new terminal window, setup an ockam node, called `s`, as a sidecar next to the
# application service. Then create a tcp outlet, on the `s` node, to send raw tcp traffic to the
# service. Finally create a forwarder in your default Orchestrator project.
ockam node create s --project default-project.json
ockam tcp-outlet create --at /node/s --from /service/outlet --to 127.0.0.1:5000
ockam forwarder create s --at /project/default --to /node/s

# -- APPLICATION CLIENT --

# Setup an ockam node, called `c`, as a sidecar next to our application client. Then create an
# end-to-end encrypted secure channel with s, through the cloud relay. Finally, tunnel traffic
# from a local tcp inlet through this end-to-end secure channel.
ockam node create c --project default-project.json
ockam secure-channel create --from /node/c --to /project/default/service/forward_to_s/service/api\
  | ockam tcp-inlet create --at /node/c --from 127.0.0.1:7000 --to -/service/outlet

# Access the application service, that may be in a remote private network though the end-to-end
# encrypted secure channel, via your private and encrypted cloud relay.
curl --head 127.0.0.1:7000

Private and secure by design

In the example above, we’ve created two nodes and established an end-to-end secure channel between them through an encrypted cloud relay. For the sake of simplicity, we ran both ends on a single machine but they could also be run on completely separate machines with the same result: an end-to-end encrypted and mutually authenticated secure channel.

Distributed applications that are connected in this way can communicate without the risk of spoofing, tampering, or eavesdropping attacks irrespective of transport protocols, communication topologies, and network configuration. As application data flows across data centers, through queues and caches, via gateways and brokers - these intermediaries, like the cloud relay in the above example, can facilitate communication but cannot eavesdrop or tamper data.

You can establish secure channels across networks and clouds over multi-hop, multi-protocol routes to build private and secure by design distributed applications that have a small vulnerability surface and full control over data authenticity, integrity, and confidentiality.

Trust for data-in-motion

Behind the scenes, the above commands generated unique cryptographically provable identities and saved corresponding keys in a vault. Your orchestrator project was provisioned with a managed credential authority and every node was setup to anchor trust in credentials issued by this authority. Identities were issued project membership credentials and these cryptographically verifiable credentials were then combined with attribute based access control policies to setup a mutually authenticated and authorized end-to-end secure channel.

Your applications can make granular access control decisions at every request because they can be certain about the source and integrity of all data and instructions. You place zero implicit trust in network boundaries and intermediaries to build applications that have end-to-end application layer trust for all data in motion.

Powerful protocols, made simple

Underlying all of this is a variety of cryptographic and messaging protocols. We’ve made these protocols safe and easy to use in any application.

No more having to think about creating unique cryptographic keys and issuing credentials to all application entities. No more designing ways to safely store secrets in hardware and securely distribute roots of trust. Ockam’s integrated approach takes away this complexity and gives you simple tools for:

End-to-end data authenticity, integrity, and privacy in any communication topology

  • Create end-to-end encrypted, authenticated secure channels over any transport topology.
  • Create secure channels over multi-hop, multi-protocol routes - TCP, UDP, WebSockets, BLE, etc.
  • Provision encrypted relays for applications distributed across many edge and cloud private networks.
  • Make legacy protocols secure by tunneling them through mutually authenticated and encrypted portals.
  • Bring end-to-end encryption to enterprise messaging, pub/sub and event streams - Kafka, RabbitMQ etc.

Identity-based, policy driven, application layer trust – granular authentication and authorization

  • Generate cryptographically provable unique identities.
  • Store private keys in safe vaults - hardware secure enclaves and cloud key management systems.
  • Operate scalable credential authorities to issue lightweight, short-lived, attribute-based credentials.
  • Onboard fleets of self-sovereign application identities using secure enrollment protocols.
  • Rotate and revoke keys and credentials – at scale, across fleets.
  • Define and enforce project-wide attribute based access control policies - ABAC, RBAC or ACLs.
  • Integrate with enterprise identity providers and policy providers for seamless employee access.

Deep Dives

Next let's dive into a step-by-step guide on our command line and programming libraries.

  • Ockam Command Command line tools to build and orchestrate highly secure distributed applications. Orchestrate nodes, vaults, identities, credentials, secure channels, relays, portals and more. 👉

  • Ockam Programming Libraries Rust, Elixir and soon Typescript libraries to build secure by design applications for any environment – from highly scalable cloud infrastructure to tiny battery operated microcontroller based devices. 👉

Learn more about Ockam

Pinned Loading

  1. ockam ockam Public

    Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

    Rust 4.5k 563

  2. ockam-documentation ockam-documentation Public

    Markdown files that are used to generate docs.ockam.io

    7 15

  3. homebrew-ockam homebrew-ockam Public

    Homebrew Formula for Ockam

    Ruby 4 3

  4. ockam-meetings ockam-meetings Public

    Ockam Community Meetings

    14 4

  5. ockam-website ockam-website Public

    Source Code for the Ockam.io Website

    MDX 58 48

Repositories

Showing 10 of 14 repositories
  • ockam-website Public

    Source Code for the Ockam.io Website

    build-trust/ockam-website’s past year of commit activity
    MDX 58 Apache-2.0 48 2 6 Updated Dec 28, 2024
  • ockam Public

    Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

    build-trust/ockam’s past year of commit activity
    Rust 4,492 Apache-2.0 563 321 (109 issues need help) 80 Updated Dec 28, 2024
  • ockam-documentation Public

    Markdown files that are used to generate docs.ockam.io

    build-trust/ockam-documentation’s past year of commit activity
    7 Apache-2.0 15 1 1 Updated Dec 19, 2024
  • ockam-ebpf Public
    build-trust/ockam-ebpf’s past year of commit activity
    Rust 0 Apache-2.0 0 0 0 Updated Dec 15, 2024
  • homebrew-ockam Public

    Homebrew Formula for Ockam

    build-trust/homebrew-ockam’s past year of commit activity
    Ruby 4 3 1 (1 issue needs help) 2 Updated Dec 12, 2024
  • .github Public
    build-trust/.github’s past year of commit activity
    0 5 2 1 Updated Dec 11, 2024
  • benthos Public Forked from redpanda-data/connect

    Fancy stream processing made operationally mundane

    build-trust/benthos’s past year of commit activity
    Go 1 855 0 1 Updated Sep 21, 2024
  • terraform-provider-ockam Public

    Terraform Provider for Ockam

    build-trust/terraform-provider-ockam’s past year of commit activity
    Go 5 Apache-2.0 4 2 6 Updated Sep 12, 2023
  • kafka-demo Public
    build-trust/kafka-demo’s past year of commit activity
    1 0 0 0 Updated Jun 5, 2023
  • build-trust/demo-influxdb-telegraf’s past year of commit activity
    Shell 1 0 1 0 Updated Mar 9, 2023

Sponsors

  • @bogdanpopey
  • @mattgreg

Most used topics

Loading…