NIE ConsoleOperations
LIVE AZURE
Prudential Financial
...
Infrastructure
Live Gateway Status
Real-time health checks against the NIE Gateway deployed on Azure Container Apps. All calls are live HTTPS requests to the production endpoint.

⚙ System Components

NIE Gatewaychecking...
Engine Versionchecking...
Redis (Channel 2)checking...
Event Hubs (Channel 3)checking...
Azure RegionWest US 2
TLS1.3 (Azure Front Door)

🔗 Endpoint

https://nie.xsoccorp.com
Role Management
Register NIE Roles
Define attestation-floor-enforced roles. Each role specifies the minimum hardware trust level and maximum session TTL. Roles are signed with the admin key and cannot be tampered.

🔐 Register New Role

📋 Registered Roles

Role IDFloorTTLStatus
User Enrollment
Enroll Users and Devices
Enroll a user-device pair into NIE. The gateway generates a device fingerprint (SHA-256 of TPM seed), user factor hash, and binding key. The device is paired cryptographically. No password is created.

👤 Enroll New User

👥 Enrolled Users

UserDeviceRoleLocationDevice FPStatus
Live Attestation
Authenticate via NIE Gateway
Select an enrolled user to perform a live attestation against the Azure gateway. The gateway validates the sealed token through the six-check pipeline and returns a session handle.

🔒 Attest Enrolled User

📋 Active Sessions

UserSession HandleLatencyStatus
Authorization
Resource Access Control
Test resource authorization using an active session handle. Every authorization call re-checks the revocation cache. If the device was revoked between attestation and authorization, the call fails immediately.

✅ Authorize Resource Access

Revocation
Three-Channel Device Revocation
Revoke a device across all three channels simultaneously: in-process cache (instant), Redis persistence (channel 2), and Event Hubs fan-out to SIEM/SOC (channel 3). Propagates globally in under 30 seconds.

🚫 Revoke Device

Channel 1: In-process cache
Channel 2: Redis persistence
Channel 3: Event Hubs (SIEM/SOC)
Geofencing
Location-Bound Policy Enforcement
Define geographic zones that constrain where attestation is accepted. A device outside an authorized zone is denied regardless of valid credentials. The zone check is part of the attestation pipeline, not a separate policy layer.

🌎 Geofence Zones

HQ Newark
Shelton CT
Dresher PA

📍 Zone Policies

ZoneRadiusRoles AllowedFloor OverrideStatus
Newark, NJ (HQ)5 kmAll rolesNoneActive
Shelton, CT3 kmadvisor, analystTpmHardwareActive
Dresher, PA2 kmadvisorTpmRequiredActive
Jacksonville, FL5 kmAll rolesNonePending
Remote (VPN)Globalread-onlyTpmRequiredActive
Providence Audit Trail
Immutable Event Log
Every identity event is recorded in the Providence hash-chained audit trail. Entries are append-only, externally anchored every 5 minutes, and cannot be cleared even with full cloud access. Cryptographic non-repudiation via DSKAG session key HMAC.

📜 Event Stream

Waiting for events...