Licensing for GovTech & Defense
Open source verification for air-gapped classified networks. Security teams can audit every line. No black boxes.
Open source transparency for high-security environments
In classified and high-security environments, you can't deploy black-box software. Our verification library is MIT-licensed and open source - your security team can audit every line of code.
- Full source code access
MIT-licensed client library. Build from source for maximum trust.
- No network calls
Verification happens entirely offline. Zero data exfiltration risk.
- Self-hosted option
Deploy the entire platform on your own infrastructure.
┌─────────────────────────────────────┐
│ Classified Network (Air-Gap) │
│ ┌────────────────────────────────┐ │
│ │ Your Application │ │
│ │ ┌──────────────────────────┐ │ │
│ │ │ Licenz Client (OSS) │ │ │
│ │ │ • Auditable Rust code │ │ │
│ │ │ • No network calls │ │ │
│ │ │ • Hardware binding │ │ │
│ │ └──────────────────────────┘ │ │
│ └────────────────────────────────┘ │
│ │
│ License File (signed, offline) │
└─────────────────────────────────────┘
↑
│ File transfer (sneakernet)
│
┌───────┴───────────────────────────┐
│ Admin Network (Connected) │
│ License Management Portal │
└───────────────────────────────────┘ Built for compliance requirements
Designed with government and defense security standards in mind
NIST Cryptographic Standards
RSA-SHA256 and Ed25519 signatures following NIST recommendations. AES-256-GCM for encryption.
Audit Logging
Complete audit trail for license operations. Track all validation attempts and administrative actions.
Source Code Audit
Full access to client library source. Your security team can review before deployment to classified systems.
Self-Hosted Deployment
Run the entire platform on your own infrastructure. No data leaves your control.
Zero Network Dependencies
License validation requires no network calls. Safe for completely isolated networks.
RBAC & Access Control
Granular role-based access control. Control who can generate, revoke, and manage licenses.
Government and defense applications
Defense Contractors
License software deployed on classified networks where security audits are mandatory and vendor lock-in is a risk.
- • Mission-critical applications
- • Weapons systems software
- • Intelligence analysis tools
- • Secure communications
Government Agencies
Federal, state, and local government software with strict procurement and security requirements.
- • Law enforcement systems
- • Emergency services
- • Critical infrastructure
- • Administrative software
Intelligence Community
Software for air-gapped networks where open source transparency is a security requirement.
- • Analysis platforms
- • Data processing tools
- • Secure enclaves
- • SCIF deployments
GovTech Vendors
ISVs selling to government customers who need compliant, auditable licensing solutions.
- • FedRAMP-path products
- • StateRAMP compliance
- • Public safety software
- • Civic technology
Procurement-friendly
We understand government procurement processes
Transparent pricing
Public pricing eliminates negotiation cycles
No vendor lock-in
Open source client, export your data anytime
Flat annual pricing
Predictable costs for budget planning
Custom contracts available
We work with government legal requirements
Ready for auditable licensing?
Open source transparency for high-security environments.