NG-Key
NG-Key
Secure mobile enrollment and access control
Security area

NG-Key security overview

A public security overview for NG-Key access control, covering platform security foundations, FIDO2 and WebAuthn credentials, credential-media handling, deployment quality pipelines, ledger-backed traceability, and protected runtime boundaries.

Security principles

Access-control security depends on platform security across identity, runtime, delivery, and the final access decision.

NG-Key is designed for access control, so the security model starts with platform security: strong user authentication, protected credential handling, encrypted and integrity-protected communication paths, tightly controlled administration, and deployment discipline before code reaches production.

This page summarizes the most important security points before going deeper into the detailed security whitepaper and PDF download, including credentials, reader technologies, delivery quality, and ledger-backed traceability.

Platform security foundation

Privileged administration, secret storage, protected transport, runtime segmentation, and operational visibility create the baseline on which secure access control depends.

Credentials and media technologies

Passkeys with FIDO2 and WebAuthn capable flows strengthen identity assurance, while credential-media assignments and DESFire-linked identifiers support deployments that also use physical media.

Deployment quality and rollout security

Production delivery is stronger when every rollout passes repeatable quality gates such as asset builds, formatting checks, static analysis, and tests before immutable runtime images are promoted.

Ledger-backed traceability

Access audits, permission changes, and related commercial or handover events gain stronger accountability when canonical events, hashes, and verification trails remain inspectable.

Security visual

A concise visual for platform security, delivery quality, and traceability.

The security overview combines authentication, protected transport, deployment quality, runtime boundaries, and event traceability into one procurement-ready story for reviewers and stakeholders.

It complements the detailed written sections below and the downloadable security whitepaper for deeper technical review.

Security overview visual
NG-Key security visual

The visual highlights the relationship between strong authentication, secure delivery, and ledger-backed visibility in the NG-Key platform.

Important security points
  • Use explicit role ownership and least-privilege administration instead of informal shared access or long-lived broad permissions.
  • Use passkeys and FIDO2 or WebAuthn capable credential flows where stronger user-device binding is required, and keep enrollment and ownership review explicit.
  • Where physical media is used, keep card or transponder assignments reviewable and consistent across reader scope, including DESFire-linked identifiers where supported by the deployment path.
  • Protect client, platform, broker, and service traffic with HTTPS, TLS, or equivalent encrypted transport controls wherever the deployment path allows it, and keep end-to-end encryption enabled where the full path supports it.
  • Keep sensitive integration secrets and stored keys encrypted at rest and out of source control and plain-text configuration.
  • Keep critical database and service traffic on protected network paths and segmented runtime boundaries, and keep production secrets on target hosts or equivalent protected secret stores.
  • Run production delivery through validated Git and CI/CD pipelines with repeatable build, lint, static analysis, and test stages before runtime promotion.
  • Use audit history, telemetry, blockchain-backed ledger events, and commercial event traces together because security-relevant anomalies often surface first as operational or fulfillment irregularities.