Contact Us

Build Trust

  • Integrity
  • Authenticity
  • Privacy
  • Control

Build Applications That Trust Data-in-Motion Across Cloud Services, Beyond Data Centers, Through Gateways.

Ockam has a simple developer experience and powerful primitives that orchestrate end-to-end encryption, key management, authorization policy enforcement, and mutual authentication between distributed applications - at massive scale.

Solution image
Let's Build Trust

Open Source

Join our community, start a discussion, read some code, or file an issue.

Go to GitHub

Start Building

Let’s build an application together in a step-by-step guide.

Go to the Guide

Ockam Orchestrator

Sign up for Ockam Orchestrator - Now in Private Availability. Coming to AWS Marketplace in September.

Contact us

Simple Tools

1. Use Ockam
tools image

Get Ockam

Install Ockam using Homebrew, Docker, Terraform, or Rust’s Cargo.


Set Up an Ockam Project

Enroll with Ockam Orchestrator, and generate identity keys.


Move Data with Trust

Build a demo that creates an end-to-end encrypted, mutually authenticated communication between two local applications - via a round trip through the cloud.

Infrastructure background image
2. Get Trust

Build Complex Infrastructure

A lot happened in this demo. We started two applications; echo_service and an echo_client. Each is local but, imagine that these applications were in two separated private networks. Each application then generated a unique cryptographic identity and a Vault to protect it.

The echo_service used Ockam Orchestrator to register an address with an Ockam Relay. A Relay can transparently forward messages to the to echo_service - even if its running behind a NAT without an exposed port.

The echo_service started a Secure Channel Listener and waited for an authenticated channel to be established.

Next, the echo_client used Ockam Orchestrator to create a mutually authenticated, end-to-end encrypted, bi-directional, Secure Channel to the echo_service.

Now that the applications have built Trust, echo_client can send a "Hello Ockam" message, and echo_service can echo "Hello Ockam" back.

Infrastructure image

Features of Ockam

Managing data in motion is really, really hard. We’ve thought of the details and have reduced the vulnerability surface of your data to something manageable.

Developer First

Stripe did it for payment rails.

Twilio did it for telecom.

Ockam abstracts away complex infrastructure and cryptography orchestration to empower millions of developers.

Cloud Native

Ockam is built for enterprise scale.

Add-ons are ready-made connectors to your hosted authentication, database, and message broker services.

Open Source

Ockam’s protocols become ever more secure through transparency, community feedback, and scrutany.

Add-ons can be built by anyone to create new hardware key vaults or cloud service connectors.

Zero Trust

Ockam messaging is *actually* end-to-end encrypted, so it can trustfully move data across networks that should not be trusted.

Transports are agnostic and pluggable so Ockam’s protocols can work across any network topology.

Key Management

Private keys are created inside of all of your applications. They never leave the hardware environment.

Orchestration, revocation, and rotation of keys are built in, so you have one less thing to worry about.

BYO Auth Engine

Ockam Add-ons empower you to use your existing authentication, attribute-based (ABAC) authorization tools.

Bring your own Okta, Auth0, OAuth, AWS, Azure, Google or Web3 IAM tools. Ockam has an Add-on for that!

How is Ockam Used?

Ockam can, and should, be used between every application, everywhere.

Orchestrate at Scale image

Orchestrate at Scale

Modern applications are made up of an unmanageable number of ephemeral microservices. They are distributed, multi-cloud, and rely upon dozens of cloud marketplace services. With so many endpoints that need to interoperate, it’s become impossible to manage.

Ockam’s key generation and handshake protocols allow for dynamic, massive-scale orchestrations across complex network topologies.

Get Out of the Middle image

Get Out of the Middle

You are building an app that moves data from over-there to over-there. Perhaps it’s a message service like Kafka or RabbitMQ?

You don’t want to be liable for data that moves through your service; Particularly if its HIPAA or PCI protected data!

Ockam’s end-to-end encryption originates at the data-source and terminates at the data-target , so your app-in-the-middle can not decipher data-in-motion.

Trust Anything, Anywhere image

Trust Anything, Anywhere

If you access data in a VPC, you are exposing your applications to threats by exposing your VPC to the internet.

Ockam’s inlets and outlets create topologies that eliminate threats from the internet for applications in VPCs. Effectively, your data can move from from VPC to VPC without exposing either application to the internet. Virtually, the applications are running next to each other in the same environment.

Ockam is for you

Ockam Orchestrator

Ockam Orchestrator enables distributed applications to Trust Data-in-Motion at scale - with ease.

Ockam offers Orchestrator as a managed service through the AWS marketplace.

We are committed to empowering all developers. That’s why we sponsor your hobby projects. All applications should be built with Trust.

Orchestrator was built for builders that build big things. It can move massive amounts of data through dynamic and complicated service architectures.


Recommended for your side project.

  • Two Collaborators
  • Limited Scale
  • Basic Authorization
  • Limited Addons
  • Free


Recommended for your team at work.

  • Team Collaboration
  • Scaleable
  • Enterprise Authorization
  • All Add-ons
  • SLA
Stars icons image
OSS Contributors
OSS Contributors icons image
Crate Downloads
Crate Downloads icons image

Developers Love Ockam

Build a Demo App

© 2022 All Rights Reserved