What to expect
Some key insight to consider when interacting with the Identity Plus selfauthority platform.
Everything X.509 certificates & mutual TLS
There are no user-names, no passwords, the identity anchor is your device and the X.509 client certificate associated.
All Identity Plus services operate solely over mtutual TLS and while X.509 certificates do not need mTLS, mTLS is dependant on X.509 client certificates, therefore nothing will work without them
Identity and Access Control are independent
Identity and Access control are separate functions, with fully independent ownership. As a service or organization you should not expect to control identities. You don't need to - you strongly control access.
As clients, you should not expect to manage your identity with any one of the services you access. Your identity is yours, you manage it in Identity Plus.
Open Source - use, modify, contribute
Most of the Selfauthority toolkit is available as open source. You can use them at their full capacity both on the identity and access control services, in this latter case with any plan - including free plan.
Feel free to modify the code and tailore it to your needs, and we would be greatful if you contributed your additions to the repo in case they are complementary. You can also submit feature request and suggestions or vote to steer the direction of the development
Command line identity management
The primary tool for provisioning, renewing, and managing mTLS identities from the command line. Built in Go - compile once for any platform.
Identity wrapper for legacy TCP clients
A transparent TCP forwarder that gives any legacy client a full mTLS identity with no code modifications. The application believes it communicates locally over plain text; Persona wraps that traffic in a mutually authenticated TLS channel before it leaves the machine.
Identity manager for Mobile Devices
The human-facing Self-Authority identity. A cryptographic mTLS ID that lives on the phone to enable connection level, the TLS layer authentication - before any application, login page, or session is involved.
Command line identity management
A high-precision reverse proxy built natively on mTLS. Drop it in front of any HTTP or TCP service and enforce Identity Gated Execution - no code changes to the upstream service required. Authentication happens at the connection layer, before any application data is exchanged.
Identity wrapper for legacy TCP clients
Brings mTLS identity directly into WordPress. Authentication happens at the TLS layer before the login page loads. The admin panel becomes structurally inaccessible to any device without a valid mTLS ID, regardless of application-layer vulnerabilities.
Let us know if you think we can help
LEGAL
Copyright © 2025,
Identity Plus, Inc., New Hampshire, USA,
All rights reserved