Enterprise-Grade Security for Real-Time
Authentication, authorization, and audit at the protocol layer. Your IdP becomes MQTT identity. The broker enforces every rule, for every client and every agent.
We put the security in MQTT.
Not bolted on. Not a wrapper. Security primitives baked into the broker, the wire, and the identity model.
Foundations
The non-negotiables: transport, tenant isolation, and data protection. Everything else builds on these.
Enterprise-Grade WSS Security
TLS 1.3 encryption for all WebSocket connections. Perfect forward secrecy, modern cipher suites, no plaintext fallbacks.
Organization Isolation
Complete data separation between tenants. Each organization operates in its own isolated namespace with dedicated credentials and access controls.
Data Protection
Messages encrypted in transit. Optional message persistence with encryption at rest. Automatic data retention policies.
ACL v2: Policy-Based Access Control
Define topic-level permissions with identity-aware policies. ACL v2 introduces variable bindings, preset templates, a built-in policy simulator, and CLI tooling for version-controlled deployments.
{
"version": "2.0",
"default_action": "deny",
"rules": [{
"topic": "/{email}/inbox",
"action": "subscribe",
"effect": "allow"
}, {
"topic": "/broadcast/#",
"action": "subscribe",
"effect": "allow"
}]
} Your JWT Is Your MQTT Identity
Your user's existing JWT, issued by Supabase, Firebase, Auth0, Clerk, or any custom OIDC provider, is their MQTT identity. The broker verifies the signature against your IdP, and the claims inside become ACL variable bindings. No token exchange, no shadow user table, no parallel auth flow.
Traffic Governed at the Broker
ACL is evaluated at the MQTT broker before messages reach your application. Not middleware, not an API gateway. Every publish and subscribe is checked against the policy, for every client, every agent, every service.
Pre-Application Enforcement
Unauthorized messages never reach your code. The broker rejects them at the protocol layer.
Agent-Isolated by Default
Multi-agent systems get broker-enforced isolation. Each agent_id claim scopes its topics; no rule, no read.
Audit at the Wire
Every authz decision logged at the broker. No app-level logging required for compliance.
Advanced Security
For organizations with regulatory, isolation, or scaling requirements beyond the default.
Bring Your Own Auth (BYOA)
Integrate your existing identity provider. Support for OIDC, JWT, and custom authentication webhooks for seamless SSO.
Private Endpoints
Dedicated infrastructure with private network connectivity options. Available on enterprise contracts.
Custom Retention Policies
Define custom data retention periods to meet your compliance requirements. Automatic purging and archival options.
Dedicated Infrastructure
Single-tenant deployment options for organizations with regulatory or performance requirements. Custom scaling agreements available.
Security disclosure
Found a vulnerability? Report it responsibly. We acknowledge within 24 hours and coordinate disclosure on a case-by-case basis.
security@cloudsignal.ioReady for Secure Real-Time?
Start with our free tier or contact us for enterprise security requirements.
Questions about security? security@cloudsignal.io