BastionZero is built on a unique zero-trust cryptographic protocol for secure remote access. It ensures that the BastionZero platform never becomes a single point of compromise and is so secure, scalable, and invisible that you and your users won't even notice it's there.
Every access to an infrastructure target is controlled by a BastionZero OpenPubKey Token. This is a souped-up OIDC token, which has signatures from two independent roots of trust: your Single Sign On Provider (SSO) and BastionZero’s cloud service. Targets grant access only after they cryptographically validate the token against both roots of trust. This way, neither BastionZero’s cloud service, nor your SSO, create a single point of compromise for your infrastructure.
Our protocol is completely transparent to the user -- it looks just like SSO + MFA. But under the hood, each time a user (Alice) logs into BastionZero, her client chooses a fresh key that it stores locally on her machine. Her key is then certified (in the BastionZero OpenPubKey token) by the two roots of trust: the BastionZero cloud service and the SSO. Alice then uses her key to sign all her messages. This ensures that our cloud service does not have privileged access to your infrastructure targets and cannot tamper with your users’ connections.
Our cloud service never has privileged access to your targets. Every message in the MrZAP protocol includes the hash of the previous message and the signature of the dispatching party. This prevents the cloud service from altering messages or injecting its own commands into the user’s connections.