MCPHub LabRegistryopenziti/ziti
openziti

openziti/ziti

Built by openziti 4,058 stars

What is openziti/ziti?

The parent project for OpenZiti. Here you will find the executables for a fully zero-trust, programmable network @OpenZiti

How to use openziti/ziti?

1. Install a compatible MCP client (like Claude Desktop). 2. Open your configuration settings. 3. Add openziti/ziti using the following command: npx @modelcontextprotocol/openziti-ziti 4. Restart the client and verify the new tools are active.
🛡️ Scoped (Restricted)
npx @modelcontextprotocol/openziti-ziti --scope restricted
🔓 Unrestricted Access
npx @modelcontextprotocol/openziti-ziti

Key Features

Native MCP Protocol Support
Real-time Tool Activation & Execution
Verified High-performance Implementation
Secure Resource & Context Handling

Optimized Use Cases

Extending AI models with custom local capabilities
Automating system workflows via natural language
Connecting external data sources to LLM context windows

openziti/ziti FAQ

Q

Is openziti/ziti safe?

Yes, openziti/ziti follows the standardized Model Context Protocol security patterns and only executes tools with explicit user-granted permissions.

Q

Is openziti/ziti up to date?

openziti/ziti is currently active in the registry with 4,058 stars on GitHub, indicating its reliability and community support.

Q

Are there any limits for openziti/ziti?

Usage limits depend on the specific implementation of the MCP server and your system resources. Refer to the official documentation below for technical details.

Official Documentation

View on GitHub
<!-- markdownlint-disable MD033 -->

Build Status Go Report Card GoDoc Discourse License GitHub Stars

OpenZiti

OpenZiti is an open-source zero-trust networking platform that makes network services invisible to unauthorized users. Every connection, whether from a user, a service, a device, or a workload, is authenticated with cryptographic identity, authorized by policy, and encrypted end-to-end.

OpenZiti works with both existing applications (using lightweight tunnelers with no code changes required) and new applications (using embedded SDKs for the strongest zero-trust model). This makes it practical for both brownfield environments and greenfield development.

Created and sponsored by NetFoundry. Licensed under Apache 2.0.

<p align="center"> <img src="./doc/images/openziti-architecture.svg" alt="OpenZiti Architecture: Controller, Edge Routers, SDKs, and Tunnelers" width="100%"/> </p>

Table of Contents


Use Cases

OpenZiti enables you to extend zero-trust anywhere for any use case, including non-human workloads and workflows, across multiple networks and third parties. The following are some common use cases.

Replace VPNs

Provide secure access to internal services without VPN clients, split tunneling headaches, or concentrator bottlenecks. Each service is individually authorized. No "once you're in, you can reach everything" problem.

Dark APIs and Services

Make APIs and services invisible to the internet. Zero listening ports means zero attack surface. Authorized clients connect through OpenZiti; everyone else sees nothing.

IoT and Non-Human Identity

Give every device, sensor, and machine a unique cryptographic identity. OpenZiti's identity model works for non-human workloads just as well as human users, providing strong authentication for the machine-to-machine connections that make up the majority of modern network traffic.

Zero Trust Workloads

Secure workload-to-workload communication across clouds and environments. Services authenticate each other with cryptographic identity, not network location. No shared secrets, no IP allowlists, no ambient authority.

Agentic AI

Secure agent-to-service and agent-to-agent communication with cryptographic identity for every AI participant. MCP servers, tool endpoints, and private LLMs stay dark, with no listening ports or public URLs. Agents authenticate with strong, unique identities and reach only the resources that the policy allows, so autonomous workflows get the access they need without ambient authority over everything else.

Multi-Cloud and Hybrid Connectivity

One overlay network across AWS, Azure, GCP, on-prem data centers, and edge locations. No cloud-specific networking tools, no VPN tunnels between environments, no complex peering arrangements.

Self-Hosted Service Access

Access home lab or self-hosted services like Nextcloud, Home Assistant, media servers, and development environments from anywhere. No open router ports, no dynamic DNS, no reliance on third-party tunnel services. You control the entire path.

Kubernetes and Cross-Cluster Services

Connect services across Kubernetes clusters without complex ingress rules, service mesh sidecars, or VPN tunnels between clusters. Works beyond Kubernetes, supporting connecting k8s services to VMs, bare metal, IoT devices, or anything else on the overlay.


Key Capabilities

CapabilityDescription
Dark ServicesServices have zero listening ports. Invisible to scanners and unauthorized users.
Identity for EverythingCryptographic identity for users, services, devices, and non-human workloads (NHI). Not IP-based.
Identity-Based OperationsManage networks through identities and policies instead of IP addresses and firewall rules. Simplifies operations and eliminates manual network configuration.
End-to-End EncryptionData encrypted from source to destination using libsodium. mTLS for authentication. Zero trust in the network path.
No VPNs or Open PortsConnections route through OpenZiti's overlay. No VPN clients, no inbound firewall rules, no exposed ports.
Smart RoutingMesh fabric with intelligent path selection for performance and reliability.
Flexible DeploymentEmbed SDKs, use tunnelers, or deploy at the network level. Mix and match per service.
Policy-Driven AccessFine-grained, identity-based policies. Access can be revoked in real time, closing active connections.
Programmable REST APIsFull management API for automation and integration. Web-based admin console included.
Fully Self-HostableRun the entire platform on your infrastructure. No vendor dependencies. Open source, Apache 2.0.

Three Deployment Models

OpenZiti supports three zero-trust models. Mix them in a single network and migrate between them over time.

Network Access

Deploy an OpenZiti edge router in a trusted network zone. Traffic enters the overlay from authenticated clients and exits into the private network where services run.

  • Code changes: None
  • Agent on service host: None
  • Security model: Identity-based access at the network boundary. Similar to a gateway, but with cryptographic identity and encrypted transport.

Host Access

Run an OpenZiti tunneler on the same host as your service. The tunneler handles identity, authentication, and encryption. The service only needs to accept connections from localhost.

  • Code changes: None
  • Setup: Install tunneler, enroll identity
  • Security model: Trust boundary at the host OS. Service is dark to the network and only reachable through the tunneler.

Application Access (Strongest)

Embed an OpenZiti SDK directly in client and/or server applications. The application itself holds the cryptographic identity and encrypts traffic in-process. No listening ports exist, not even on localhost.

  • Code changes: Yes
  • Security model: Strongest. End-to-end encryption in-process. Fully dark. Identity at the application layer, not the network, not the host.

Where to start: Many teams begin with Host Access (tunnelers) for existing services. It deploys in minutes with no code changes. For new development or high-security workloads, Application Access (SDKs) provides the strongest zero-trust posture.


Getting Started

The following Quick Starts show how to set up a local OpenZiti network for development, testing, and learning. For production deployments, see the product documentation at https://netfoundry.io/docs/openziti/category/deployments/.

Quick Start with Docker

The fastest way to get a local OpenZiti network running:

wget https://get.openziti.io/dock/all-in-one/compose.yml
docker compose up

This starts a controller, edge router, and the Ziti console in a single compose stack. The console is available at https://localhost:1280/zac/. From here you can create identities, define services, and configure access policies.

See the all-in-one Docker quickstart for full details including storage options, environment variables, and CLI usage.

Quick Start with the CLI

Download the latest ziti binary from GitHub Releases, then:

ziti edge quickstart

This brings up a local development network: controller, router, and a default admin identity. Ideal for testing and learning.

Learn More

ResourceDescription
IntroductionCore concepts and how OpenZiti works
Quickstart GuidesStep-by-step setup for local, Docker, and hosted environments
Zero Trust ModelsDeep dive into the three deployment models
Tunneler ReferenceGet started with zero code changes

Architecture

OpenZiti's overlay network runs on top of existing infrastructure: any IP network, any cloud, any combination. The core components:

Controller

The controller is the management plane. It handles:

  • Identity management: issues and verifies cryptographic identities (x509 certificates) for every participant in the network
  • Policy enforcement: defines which identities can access which services, through which edge routers
  • Network state: tracks routers, services, and topology; provides a REST API and web-based admin console for management

Edge Routers

Edge routers form the data plane, a mesh fabric that carries encrypted traffic between endpoints.

  • Public routers are reachable from the internet, serving as entry points to the network
  • Private ("dark") routers are deployed inside private networks with only outbound connections

Routers automatically discover each other, form mesh connections, and use smart routing to select the best path based on latency, throughput, and cost.

Endpoints: SDKs and Tunnelers

Endpoints are how applications and users connect to the OpenZiti network:

  • SDKs (Go, C, Python, Node.js, Java, Swift, C#): embed zero trust directly in your application. The app itself holds the identity and handles encryption. No sidecar, no agent, no listening ports.

  • Tunnelers (Linux, Windows, macOS, iOS, Android): lightweight apps that provide OpenZiti connectivity to unmodified software. Traffic is intercepted and routed through the overlay transparently. No code changes required.


Zero Trust, Dark Services, and End-to-End Encryption

Zero Trust and Application Segmentation

Every participant (e.g., user, service, device, workload) in an OpenZiti network carries a unique cryptographic identity backed by x509 certificates. When a connection is attempted, OpenZiti verifies:

  1. The identity is valid and enrolled
  2. A policy exists granting that identity access to the requested service
  3. The connection is through an authorized edge router

If any check fails, the connection is denied. If access is later revoked, active connections are terminated immediately. There is no implicit trust based on network location. Being on the same LAN grants no more access than being across the internet, unless policy explicitly allows it.

This model provides zero trust application segmentation: each service is independently authorized. Gaining access to one service does not grant access to any other.

Dark Services

A "dark" service has no open ports. It doesn't listen on any network interface for incoming connections. Instead, the service (or a tunneler alongside it) makes an outbound connection to an OpenZiti edge router and registers itself. Clients reach it only through the OpenZiti fabric, after authentication and authorization.

What this means in practice:

  • Port scans find nothing: there are no listening ports to discover
  • No attack surface: you can't exploit what you can't reach
  • DDoS resistance: there is no public endpoint to flood
  • Invisible to unauthorized users: only identities with matching policy even know the service exists
  • NAT and firewall friendly: all connections are outbound, so CG-NAT, double-NAT, and restrictive firewalls are not a concern

Edge routers can also be dark. Private routers make only outbound connections, so no inbound firewall rules are needed in your private network.

End-to-End Encryption

With OpenZiti SDKs, traffic is encrypted from the sending application to the receiving application using libsodium for the data path and mTLS for identity authentication. Even if routers or intermediate networks are compromised, traffic cannot be decrypted or tampered with.

With tunnelers, encryption covers the path from tunneler to tunneler (or tunneler to SDK), providing machine-to-machine encryption without application changes.


SDKs

Embed zero-trust networking directly in your applications:

LanguageRepositoryNotes
Gosdk-golangUsed by the OpenZiti project itself
Cziti-sdk-cIdeal for embedded systems, IoT, and high-performance use cases
Java / Kotlinziti-sdk-jvmIncludes Android support
Swiftziti-sdk-swiftiOS and macOS
Node.jsziti-sdk-nodejs
C# / .NETziti-sdk-csharp
Pythonziti-sdk-py

All SDKs are listed under the OpenZiti GitHub organization.


Security

OpenZiti is a security-focused project. Responsible disclosure of vulnerabilities helps us keep the platform and its users safe.

Reporting a vulnerability: If you discover a security issue, please review our Vulnerability Disclosure Policy for full details. Sensitive issues should be reported to security@openziti.org. Non-sensitive issues can be filed as GitHub issues in the appropriate repository. You should receive a response within 7 days.

How we handle vulnerabilities: Our Product Security Incident Response Process describes how reported vulnerabilities are triaged, documented, and resolved — including how CVE releases are coordinated with fixes.

Safe harbor: OpenZiti and NetFoundry will not pursue legal action against anyone who researches and reports vulnerabilities in good faith. We encourage security research and attribute reported findings to their reporters in advisories and release notes.


Community & Support

OpenZiti has an active and growing community:

  • Discourse Forum: Ask questions, share projects, get help from the community and maintainers
  • YouTube: Tutorials, demos, and deep dives
  • Blog: Project updates and technical articles
  • Twitter/X: News and announcements

Contributing

The OpenZiti project welcomes contributions including code, documentation, bug reports, and feedback.

Key Repositories

RepositoryDescription
openziti/zitiCore platform: controller, routers, CLI
sdk-golangGo SDK
ziti-sdk-cC SDK
ziti-sdk-jvmJava / Kotlin / Android SDK
ziti-sdk-swiftSwift / iOS SDK
ziti-sdk-nodejsNode.js SDK
ziti-sdk-csharpC# SDK
ziti-sdk-pyPython SDK
ziti-tunnel-sdk-cLinux tunneler and core tunneler SDK
ziti-tunnel-applemacOS and iOS edge clients
desktop-edge-winWindows desktop edge client
ziti-docDocumentation site

Building from Source

See the local development tutorial for build instructions.

Developer Documentation


Adopters

OpenZiti is used in production by organizations including DeltaSecure (managed SOC), Resulticks (marketing automation), Chirp Wireless (IoT/telecom), GIGO Dev (cloud dev environments), OSMIT (managed IT/GDPR compliance), and open-source projects like zrok and BlueBubbles.

See the full list: ADOPTERS.md. Using OpenZiti? We'd love to add you — open an issue or submit a PR.


Managed Solution

For zero-trust networking without managing your own infrastructure, NetFoundry provides a fully managed, globally distributed OpenZiti network as a service, with SLAs, enterprise support, and a global fabric of edge routers.


OpenZiti is developed and open-sourced by NetFoundry, Inc.

Global Ranking

8.5
Trust ScoreMCPHub Index

Based on codebase health & activity.

Manual Config

{ "mcpServers": { "openziti-ziti": { "command": "npx", "args": ["openziti-ziti"] } } }