New: Offline-first licensing with cryptographic validation. Learn more
Use Case

Licensing for GovTech & Defense

Open source verification for air-gapped classified networks. Security teams can audit every line. No black boxes.

Open source transparency for high-security environments

In classified and high-security environments, you can't deploy black-box software. Our verification library is MIT-licensed and open source - your security team can audit every line of code.

  • Full source code access

    MIT-licensed client library. Build from source for maximum trust.

  • No network calls

    Verification happens entirely offline. Zero data exfiltration risk.

  • Self-hosted option

    Deploy the entire platform on your own infrastructure.

Security Architecture
┌─────────────────────────────────────┐
│     Classified Network (Air-Gap)    │
│  ┌────────────────────────────────┐ │
│  │  Your Application              │ │
│  │  ┌──────────────────────────┐  │ │
│  │  │ Licenz Client (OSS)      │  │ │
│  │  │ • Auditable Rust code    │  │ │
│  │  │ • No network calls       │  │ │
│  │  │ • Hardware binding       │  │ │
│  │  └──────────────────────────┘  │ │
│  └────────────────────────────────┘ │
│                                     │
│  License File (signed, offline)     │
└─────────────────────────────────────┘
        ↑
        │ File transfer (sneakernet)
        │
┌───────┴───────────────────────────┐
│   Admin Network (Connected)       │
│   License Management Portal       │
└───────────────────────────────────┘

Built for compliance requirements

Designed with government and defense security standards in mind

NIST Cryptographic Standards

RSA-SHA256 and Ed25519 signatures following NIST recommendations. AES-256-GCM for encryption.

Audit Logging

Complete audit trail for license operations. Track all validation attempts and administrative actions.

Source Code Audit

Full access to client library source. Your security team can review before deployment to classified systems.

Self-Hosted Deployment

Run the entire platform on your own infrastructure. No data leaves your control.

Zero Network Dependencies

License validation requires no network calls. Safe for completely isolated networks.

RBAC & Access Control

Granular role-based access control. Control who can generate, revoke, and manage licenses.

Government and defense applications

Defense Contractors

License software deployed on classified networks where security audits are mandatory and vendor lock-in is a risk.

  • • Mission-critical applications
  • • Weapons systems software
  • • Intelligence analysis tools
  • • Secure communications

Government Agencies

Federal, state, and local government software with strict procurement and security requirements.

  • • Law enforcement systems
  • • Emergency services
  • • Critical infrastructure
  • • Administrative software

Intelligence Community

Software for air-gapped networks where open source transparency is a security requirement.

  • • Analysis platforms
  • • Data processing tools
  • • Secure enclaves
  • • SCIF deployments

GovTech Vendors

ISVs selling to government customers who need compliant, auditable licensing solutions.

  • • FedRAMP-path products
  • • StateRAMP compliance
  • • Public safety software
  • • Civic technology

Procurement-friendly

We understand government procurement processes

Transparent pricing

Public pricing eliminates negotiation cycles

No vendor lock-in

Open source client, export your data anytime

Flat annual pricing

Predictable costs for budget planning

Custom contracts available

We work with government legal requirements

Ready for auditable licensing?

Open source transparency for high-security environments.