TideCloak

    Add auth to your app and get built-in cyber immunity

    Everything you'd expect from modern IAM, but with security built into the fabric

    Technology validated by universities & global experts

    UK Government
    Deakin
    NTT Research
    University of Wollongong
    Australian Government
    Cyrise
    Nassaure
    OECD
    QBE Acellicity
    RMIT

    ADD

    Insurance Protection

    Interested in complementing cryptographic assurances with the gold standard in cyber-insurance?

    Contact us

    APPLY FOR

    Alpha Program

    Apply for access to our direct engagement program and have the Tide team assist with building your dream platform.

    Read more

    Build fast. Sleep easy.

    TideCloak is a drop-in Keycloak-compatible IAM immune by Tide's Cybersecurity Fabric. It locks identities, data and access rights with keys no one - not admins, your cloud, vendors (even us) - can ever hold, so your controls keep working even in worst-case breaches.

    01CONNECT

    BYOiD

    Empower users to "bring their own identity" only they control, and sign-in with absolutely no change to the user experience. All, with the robust security of a digital wallet. No one is holding a repository of passwords any longer. Users can never be impersonated. Compromised users pose no risk to others. Circumvention of the authentication process is no longer possible.

    BYOiD
    02DECREE

    Tamper-proof Authorization

    Flexible, policy-driven authorisation that's sealed by an authority key no one ever holds and no single entity can abuse. Every seal is a proof that validation was successfully completed in a incorruptible process.

    Tamper-proof Authorization
    03ENTITLE

    Quorum Enforced Governance

    No more "god-mode". A compromised administrator cannot abuse their privilege, workflow processes cannot be circumvented, and accountability is baked in.

    Quorum Enforced Governance
    04CONCEAL

    Immunity-Sealed E2EE

    End-to-End Encryption that binds each session to a one-time, device-specific key and uses it to create a verifiably secure tunnel to your service - ensuring only the legitimate client can access the data, and hermetically sealing the loop between authentication, authorization, authority, and secure service consumption.

    Immunity-Sealed E2EE
    05SIMPLIFY

    Comprehensive IAM features

    Add authentication, authorization and user data security for your applications with ease. Built on top of Keycloak, RedHat's enterprise-grade Identity and Access Management solution GitHub Stars31k, TideCloak adds a plug-and-play provable-immunity layer to the comprehensive feature set below.

    Comprehensive IAM features

    Comprehensive standard feature set

    Single Sign-On (SSO)

    One login across all your apps.

    Open Standards

    OIDC and OAuth 2.0 compatible. Future SAML support.

    User Federation

    Sync with LDAP/Active Directory.

    Centralized User Mgmt

    Users, groups, and role mapping in one place.

    No Lock-In

    Easy on and offboarding with no business continuity threat.

    Varied Authorization Models

    RBAC, ABAC, UBAC, CBAC.

    Zero Knowledge Password auth

    No artefact stored anywhere.

    Passwordless

    2nd factor with security keys and biometrics.

    User Self-Service

    Account console for profile, credentials, sessions, consents.

    Admin Console & API

    Full admin UI plus REST Admin API.

    Session & Token Control

    Rotation, revocation, token exchange, remember-me.

    Theming & Branding

    Customizable UI.

    Adapters & Integrations

    Client libraries for popular stacks.

    Kubernetes-Ready

    Container-friendly with HA clustering options.

    Audit & Events

    Admin/user event logs for compliance and troubleshooting.

    Extensible by Design

    SPI plugins for custom authenticators, mappers, providers.

    Start building!

    Create your cyber-immune app in under 10 mins.
    Build fast. Sleep easy.