Infrastructure
Live Gateway Status
Real-time health checks against the NIE Gateway deployed on Azure Container Apps. All calls are live HTTPS requests to the production endpoint.
⚙ System Components
NIE Gatewaychecking...
Engine Versionchecking...
Redis (Channel 2)checking...
Event Hubs (Channel 3)checking...
Azure RegionWest US 2
TLS1.3 (Azure Front Door)
🔗 Endpoint
https://nie.xsoccorp.com
Role Management
Register NIE Roles
Define attestation-floor-enforced roles. Each role specifies the minimum hardware trust level and maximum session TTL. Roles are signed with the admin key and cannot be tampered.
🔐 Register New Role
📋 Registered Roles
| Role ID | Floor | TTL | Status |
|---|
User Enrollment
Enroll Users and Devices
Enroll a user-device pair into NIE. The gateway generates a device fingerprint (SHA-256 of TPM seed), user factor hash, and binding key. The device is paired cryptographically. No password is created.
👤 Enroll New User
👥 Enrolled Users
| User | Device | Role | Location | Device FP | Status |
|---|
Live Attestation
Authenticate via NIE Gateway
Select an enrolled user to perform a live attestation against the Azure gateway. The gateway validates the sealed token through the six-check pipeline and returns a session handle.
🔒 Attest Enrolled User
📋 Active Sessions
| User | Session Handle | Latency | Status |
|---|
Authorization
Resource Access Control
Test resource authorization using an active session handle. Every authorization call re-checks the revocation cache. If the device was revoked between attestation and authorization, the call fails immediately.
✅ Authorize Resource Access
Revocation
Three-Channel Device Revocation
Revoke a device across all three channels simultaneously: in-process cache (instant), Redis persistence (channel 2), and Event Hubs fan-out to SIEM/SOC (channel 3). Propagates globally in under 30 seconds.
🚫 Revoke Device
Channel 1: In-process cache
Channel 2: Redis persistence
Channel 3: Event Hubs (SIEM/SOC)
Geofencing
Location-Bound Policy Enforcement
Define geographic zones that constrain where attestation is accepted. A device outside an authorized zone is denied regardless of valid credentials. The zone check is part of the attestation pipeline, not a separate policy layer.
🌎 Geofence Zones
HQ Newark
Shelton CT
Dresher PA
📍 Zone Policies
| Zone | Radius | Roles Allowed | Floor Override | Status |
|---|---|---|---|---|
| Newark, NJ (HQ) | 5 km | All roles | None | Active |
| Shelton, CT | 3 km | advisor, analyst | TpmHardware | Active |
| Dresher, PA | 2 km | advisor | TpmRequired | Active |
| Jacksonville, FL | 5 km | All roles | None | Pending |
| Remote (VPN) | Global | read-only | TpmRequired | Active |
Providence Audit Trail
Immutable Event Log
Every identity event is recorded in the Providence hash-chained audit trail. Entries are append-only, externally anchored every 5 minutes, and cannot be cleared even with full cloud access. Cryptographic non-repudiation via DSKAG session key HMAC.
📜 Event Stream
Waiting for events...