Skip to main content
SecureAuthSecureAuth
Air-Gapped Release — Now Available

Modern Identity For Isolated Environments

Enterprise-grade identity and access management purpose-built for air-gapped, classified, and critical infrastructure networks. Zero cloud dependency. Full MFA and FIDO2 on-premises. Complete audit compliance.

75%

of orgs use MFA for remote OT access — but air-gapped environments are typically excluded

SANS ICS/OT, 2025

87%

year-over-year spike in ransomware attacks on the industrial sector

Dragos, 2024

65%

of OT environments had insecure remote access conditions in 2024

Dragos, 2024

Reality Check

What Your Air-Gapped Environment Actually Faces

The assumptions that keep critical infrastructure vulnerable—and the operational realities that demand a purpose-built identity platform.

Common Assumption

“Our air gap keeps us secure.”

The 2026 NERC CIP Roadmap acknowledges the air gap is a myth. Ransomware targets the physics of the grid, and every USB drive, maintenance laptop, and firmware update is an ingress path. Without strong identity, isolation is a single layer—not a strategy.

Operational Reality

Identity is the real perimeter

CISA and international partners confirm that adversaries win by abusing access through compromised identities and overprivileged accounts. When you can’t rely on the network, you must secure the identity and the transaction.

Common Assumption

“Passwords are enough for isolated systems.”

Shared credentials on SCADA HMIs and network switches are the #1 finding in OT security assessments. Without MFA, a single compromised password gives an adversary the same access as your most trusted operator.

Operational Reality

MFA must work entirely offline

Cloud-dependent MFA (SMS, push, cloud FIDO) is impossible in air-gapped environments. Operators need phishing-resistant authentication that runs on local infrastructure with no external calls—ever.

When Identity Fails In Isolated Environments

5:12 AM — Power Grid Control Room

The Locked-Out Operator

A shift operator’s password expires at a substation with no internet. Without on-premises self-service reset, they wait 4 hours for a technician to drive on-site. Meanwhile, automated alerts go unacknowledged and grid stability degrades.

2:30 PM — Water Treatment Facility

The Shared Credential

Three operators share one login for the SCADA system because individual MFA was never possible without cloud services. A disgruntled contractor uses the shared account to alter chemical dosing parameters. The audit log shows nothing actionable.

11:45 PM — Defense Network Operations

The Unpatched IdP

The identity server hasn’t been upgraded in 3 years because every available update requires cloud FIDO services the classified network can’t reach. Known CVEs remain unpatched, and the compliance team flags the gap every quarter.

Business Outcomes

The Impact Of Purpose-Built Air-Gapped Identity

SecureAuth AirGap delivers measurable improvements across security posture, operational efficiency, and compliance readiness.

95%

Reduction in Credential-Based Risk

Phishing-resistant FIDO2 and enforced MFA eliminate the primary attack vector for air-gapped environments: compromised passwords and shared credentials.

4h→5m

Password Reset Resolution

On-premises helpdesk verification replaces physical site visits for credential resets. Operators regain access in minutes instead of waiting hours for a technician.

100%

Audit Event Coverage

Every authentication, enrollment, reset, and admin action is logged locally. Compliance teams get complete evidence without assembling it manually from disparate systems.

0

External Dependencies

No cloud services, no internet callbacks, no SMS gateways. The entire identity platform operates within your sovereign boundary with zero external connections.

1

Single ISO Deployment

Deploy the full identity stack from a single ISO image. Modular microservices mean you can upgrade FIDO or Mobile services independently without platform downtime.

24/7

Identity Availability

Redundant IdP servers ensure authentication never goes down. Designed for continuous operations where identity outages have real-world safety consequences.

Platform Capabilities

Everything You Need. Nothing That Phones Home.

SecureAuth AirGap delivers the full lifecycle of modern identity—authentication, enrollment, management, and compliance—entirely within your isolated environment.

Phishing-Resistant Authentication, Fully On-Premises

Every authentication flow executes entirely within your air-gapped boundary. No cloud callbacks, no SMS gateways, no push notification infrastructure. Operators authenticate to workstations, applications, and network equipment using enterprise-grade MFA that was built for isolation.

FIDO2 & Passkeys Hardware security keys and platform authenticators with on-premises attestation and verification
Mobile TOTP Time-based codes via SecureAuth, Google, or Microsoft Authenticator. 30-second rotation using device clock only
YubiKey HOTP Event-based hardware OTP for zones where mobile devices are prohibited. No batteries or Bluetooth needed
RADIUS MFA Step-Up Second-factor challenge for network switch, router, and firewall access via RADIUS protocol
Per-Application Policy Different MFA requirements by device type, criticality level, or operator role

Authentication Flow

1Operator initiates login (workstation, app, or switch)

2SecureAuth IdP validates identity via AD/LDAP

3MFA challenge issued (FIDO2 / TOTP / HOTP)

4Second factor verified locally on-premises

5Access granted & full event logged to SIEM

Spotlight: Network Infrastructure Security

RADIUS Authentication For Critical Network Equipment

Network switches, routers, and firewalls are the backbone of OT environments. SecureAuth brings MFA-protected RADIUS authentication entirely on-premises.

Why RADIUS Matters In Air-Gapped Environments

Critical infrastructure relies on hundreds or thousands of network devices—each one a potential entry point. RADIUS provides centralized AAA management, but without MFA integration, it depends on shared secrets and local accounts that adversaries actively target.

SecureAuth extends RADIUS with multi-factor authentication that works entirely within the air gap. Operators authenticate to switches and routers using their enterprise identity plus a second factor—no cloud callbacks, no SMS, no push notifications required.

Centralized AAA Single identity authority for all network equipment
MFA Step-Up TOTP or HOTP challenge via RADIUS protocol
Per-Device Policy Different requirements by device criticality
Full Audit Trail Every network access event logged to SIEM
Offline Reset Helpdesk credential reset without external connectivity

RADIUS MFA Flow

1Operator connects to network switch

2Switch forwards credentials via RADIUS

3SecureAuth IdP validates identity (AD/LDAP)

4MFA challenge issued (TOTP / YubiKey HOTP)

5Operator provides second factor

6Access granted & event logged to SIEM

How We Compare

Air-Gapped IAM: SecureAuth Vs. Alternatives

Most identity platforms were built for the cloud. Here's how SecureAuth AirGap compares against common approaches to identity in isolated environments.

Zero cloud dependency

SupportedSecureAuthNot supportedCloud IAMSupportedLegacy IdPSupportedManual

FIDO2 / Passkeys (on-prem)

SupportedSecureAuthNot supportedCloud IAMNot supportedLegacy IdPNot supportedManual

Mobile TOTP (offline enrollment)

SupportedSecureAuthPartialCloud IAMPartialLegacy IdPNot supportedManual

YubiKey HOTP

SupportedSecureAuthNot supportedCloud IAMPartialLegacy IdPNot supportedManual

RADIUS with MFA step-up

SupportedSecureAuthNot supportedCloud IAMPartialLegacy IdPNot supportedManual

On-prem helpdesk MFA reset

SupportedSecureAuthNot supportedCloud IAMNot supportedLegacy IdPNot supportedManual

Single ISO deployment

SupportedSecureAuthNot supportedCloud IAMPartialLegacy IdPN/AManual

Modular microservice upgrades

SupportedSecureAuthNot supportedCloud IAMNot supportedLegacy IdPN/AManual

Complete SIEM audit logging

SupportedSecureAuthPartialCloud IAMPartialLegacy IdPNot supportedManual

Upgrade without breaking MFA

SupportedSecureAuthNot supportedCloud IAMNot supportedLegacy IdPN/AManual

Critical Infrastructure Use Cases

Built For The Most Demanding Isolated Environments

SecureAuth AirGap delivers enterprise IAM across every critical infrastructure sector where network isolation is mandatory—not optional.

USE CASE 01

Energy & Power Grid Operations

Protect access to SCADA/EMS systems, substation controls, and generation management consoles. RADIUS integration secures networking equipment across substations while maintaining NERC CIP compliance with full audit trails.

NERC CIPSCADARADIUSSubstations

USE CASE 02

Defense & Classified Networks

SIPRNet, JWICS, and other classified environments require air-gapped identity with no external dependencies. Phishing-resistant MFA with YubiKey HOTP and FIDO2 for workstation login, application access, and privileged operations.

NIST 800-171CMMCFIDO2YubiKey

USE CASE 03

Water & Wastewater Treatment

CISA has flagged water utilities as active targets for nation-state actors. On-premises MFA and identity verification prevent unauthorized manipulation of treatment control systems, pump stations, and SCADA HMIs.

CISA CPGsICS/SCADAOperator MFA

USE CASE 04

Manufacturing & Industrial OT

Secure access to PLCs, DCS platforms, and industrial control networks. RADIUS integration provides MFA-protected login to critical switches on the plant floor. Helpdesk verification enables secure resets without breaking production.

ISA/IEC 62443OT NetworksRADIUSHelpdesk Reset

USE CASE 05

Government & Intelligence Facilities

SCIFs and government data centers require identity assurance without any signal leaving the facility. Local FIDO2 enrollment, TOTP with offline QR provisioning, and comprehensive session audit meet FedRAMP High and FISMA requirements.

FISMAFedRAMPSCIFData Sovereignty

USE CASE 06

Nuclear & High-Security Facilities

Nuclear power plants operate under the strictest isolation requirements. Phishing-resistant authentication for reactor control systems, physical security integrations, and emergency operations—with zero external network calls.

NRC RegulationsZero External CallsPhysical Security

Frequently Asked Questions

Common Questions About Air-Gapped IAM

Ready To Modernize Identity In Your Isolated Environment?

See how SecureAuth AirGap delivers enterprise-grade IAM with zero cloud dependency. Our team will walk you through architecture, deployment, and compliance mapping for your environment.