OAuth 2.1  ·  OpenID Connect  ·  WebAuthn

Zero passwords.
Zero compromise.

BlackWall is a production-grade authorization server where passwords simply don't exist. Hardware keys, passkeys, and platform authenticators — combined with fully standards-compliant OAuth 2.1 and OpenID Connect — give your applications authentication infrastructure that can't be phished, breached, or guessed.

WebAuthn OAuth 2.1 OpenID Connect PKCE S256 AES-256-GCM XChaCha20-Poly1305 RFC 7009 · RFC 7662 Multi-tenant
Authentication

Built for engineers who take
security seriously

Every login through BlackWall is backed by a cryptographic assertion from a hardware device or platform authenticator. There is no password database to breach, no credential stuffing surface, no phishing vector.

Passwordless by design

Every user authenticates via WebAuthn — hardware security keys, Touch ID, Face ID, or Windows Hello. No passwords are accepted, stored, or ever transmitted. The attack surface simply doesn't exist.

OAuth 2.1 with mandatory PKCE

Issue authorization codes, access tokens, and refresh tokens to any OAuth-capable client. PKCE (S256 only) is enforced on every flow — no exceptions, no legacy bypass.

OpenID Connect

Full OIDC support: discovery document, JWKS endpoint, signed ID tokens, and UserInfo endpoint. Drop BlackWall behind any OIDC-aware application without touching a line of auth code.

Multi-tenant project isolation

Organisations, projects, users, and OAuth clients are fully isolated. Every issued token carries project context. Run your entire product portfolio from a single BlackWall instance.

Named privilege levels

Define up to ten named, tiered privilege levels per project — "viewer", "editor", "manager", whatever your domain demands. Fine-grained access without bespoke role logic in every service.

Comprehensive audit trail

Every authentication, token issue, admin action, and security event is logged with correlation IDs. Searchable, exportable, and retention-controlled — compliance-ready out of the box.

OIDC Discovery is live at /.well-known/openid-configuration — any OIDC-aware library or framework (Passport, Spring Security, Keycloak adapter, Auth.js) will auto-configure from that single endpoint. No manual token endpoint wrangling required.

Cryptbin — Secure sharing

Share a secret.
Never the plaintext.

Cryptbin is an end-to-end encrypted pastebin built directly into BlackWall. Your browser generates the encryption key — it never touches the server. Even with full server access, an attacker sees only ciphertext.

AES-256-GCM Client-side only WebAuthn gated Auto-expiry
Open Cryptbin
How it works
1
Key generation in the browser

An AES-256-GCM data encryption key is generated client-side and never transmitted to the server. It lives only in the URL fragment, which browsers don't include in requests.

2
Ciphertext-only storage

Your browser encrypts the content locally, then uploads only the ciphertext. The server receives encrypted bytes and a wrapped key — never your actual data.

3
WebAuthn-gated access

Creating, viewing, updating, and deleting entries requires a live WebAuthn assertion. Every operation is cryptographically bound — replay attacks are impossible.

4
Automatic expiry

Entries expire on a configurable schedule. Set a retention window per-entry or rely on system defaults — no digital residue left behind.

Use cases
Handing off API keys
Sharing incident logs
Passing credentials in onboarding
Safe inter-team token transfer
Encrypted security notes
Diagnostics without Slack leakage

Who it's for

Auth infrastructure that scales
with your ambitions

Teams & operators

Eliminate password reset tickets. Replace shared credentials with hardware-verified identities. Onboard contractors with time-limited access, enforce privilege tiers, and get a full audit trail for every authentication event — all from a single admin panel.

  • → Centralized user & project management
  • → Audit logs for every security event
  • → Approval workflows & role delegation
  • → Multi-organisation tenant isolation
Developers & engineers

Integrate once via standard OIDC discovery and every framework takes care of itself. Token introspection, revocation, JWKS rotation, and flexible JWT or opaque token formats. Build on open protocols — no proprietary lock-in, no SDK dependency.

  • → RFC-7009 revocation & RFC-7662 introspection
  • → JWT (RS256) or opaque tokens
  • → Works with Passport, Spring, Auth.js, and more
  • → Self-hostable, open architecture

Where do you want to go?

Every entry point to BlackWall — from day-to-day user access to full administrative control.