Using OpenZiti? Add your project to our adopters page!

Help spread the word of OpenZiti to world, and let us help you tell the world you’re using OpenZiti! If you’re interested in getting your project added to the list. The link provided should make it clear somehow and indicate if this is a commercial or open source offering. We look forward to seeing how the community uses OpenZiti!

Choose From the Following

[By providing this issue you certify that you are permitted to share the information and grant the OpenZiti project the rights to display this information on our github repo and doc pages.]

  • Create a github issue. Provide the following information.
    • Project Name
    • Link to project site
    • Description of project
    • Link to logo
  • Reply back to this Discourse thread with the information mentioned above and we’ll add the PR for you:
    • Project Name
    • Link to project site
    • Description of project
    • Link to logo
  • Fork the repo and put up a pull request and ask the maintainers to merge

Template for submission would resemble the following:

Project Name: <name here>
Link to project site:<site url here>
Description of project: <a few brief words - up to 30 ish>
Link to logo: <img on open internet>

Here’s the example we added for NetFoundry:

Project Name: NetFoundry
Link to project site:
Description of Project: NetFoundry SaaS provides management, orchestrations, support, and SLAs for OpenZiti networks
Link to logo:

My project is focused on taking my submission for the recent NetFoundry hackathon challenge to the next level.

“Turn users accounts dark with Ziti”

This provides a simple quick win for any business that wants to progress their journey towards Zero Trust Networks.

SSL/TLS server based certificates only solve 50% of the problem
The remaining 50% is delivered using “client certificates”

Through a “zitified” reverse proxy server, businesses can quickly roll out client certificates by enrolling users into their “ziti” network. This provides the means to manage client certificates at scale that was not previously possible.

The current user experience relies on the use of the Ziti Edge application to enrol users into the network. This will transition to the Browzer implementation when it becomes available.

Definitely keen to road test the beta version when available :slight_smile:

The value of this solution is that it provides a simple first step along the journey towards “Zero Trust Networks”… which the US Govt have a mandate for.

By starting with a reverse proxy server, you can quickly turn user account management functions dark… without having to manage a separate instance of the application. All that is needed is to redirect user account management traffic to a “zitified” network endpoint.

Based upon a simple scenario, this outcome can be delivered within 24 hours that is delivered in parallel with existing business operations. i.e you don’t need to zitify your whole network to get started… just turn your user accounts dark.

Once all of your users are transitioned across, you can disable access to user accounts over the public internet… and restrict access to only enrolled users over a Ziti network

This provides businesses a tactical initiative that they can quickly adopt that sends a clear message to the market

we are solving the remaining 50% of the security problem that SSL / TLS cannot

Since my submission, with a lot of help from @TheLumberjack :slight_smile: , I have resolved the certificate conflicts that I experienced during the demonstration.

I am now beefing up the Goloang code base to deal with the redirects from the target server… along with a few other remaining certificate issues that relate to self signed certificate authorities.

Despite this, this solution is only intended to provide a starting point, rather than a holistic solution.

The next step is for businesses to implement a deeper implementation by “zitifying” their application servers. As this happens, there is no need for the reverse proxy service because the AppWAN is being managed at a deeper layer within the business infrastructure.

My hope is that this simple initiative can encourage businesses to bring forward their plans to adopt Zero Trust Networks as BaU sooner rather than later.

That is definitely exciting. I think you are asking me to put the PR up for you? :slight_smile: I’m happy to do that but I need it to be succinct and I think it’s best if you get to use your own words, which I’ll copy and paste into the PR.

If that’s the case - please update the post or comment back with just this information:

Project Name: <name here>
Link to project site:<site url here>
Description of project: <a few brief words. up to 30 ish words>
Link to logo: <img on open internet>

If you’re not ready for us to update the adopters page yet - no worries. It’s definitely exciting to see the progress you’ve made!

1 Like

Cool… I will work on a more concise version :)… and arrange for a page to showcase the project. I will revert back when ready.

Project Name: HackBunker

  • darkLABS – Zero Trust Product Development
  • darkAPI – Zero Trust Integrations
  • darkLOGIN – Zero Trust User Accounts
  • darkADB – Walletless Connection to Oracle Autonomous Database

Link to project site:

Description of project:
To open up a Zero Trust conversation in the C-Suite and Boardrooms of Blue-chip companies with a suite of products.

Link to logo:

we can provide eps and pdf versions as needed

The logo seems to link to discourse’s CDN. I went to the website. Can/should I use this link (from the website) or another?

PR is here: Add hackbunker to by dovholuknf · Pull Request #755 · openziti/ziti · GitHub
It will show up looking like this:

1 Like