Architecture Decision Record

ADR-0011: Boundary Identity Uses Mutual TLS

Status: Accepted · Date: 2026-03-06

Status: Accepted

Date: 2026-03-06

Context

BSFG connects zones that are deliberately separated by trust, network, and operational boundaries. The boundary protocol therefore requires strong peer identity, encrypted transport, and an authorization basis that is independent of network location alone.

Because BSFG is a compliance-oriented boundary appliance, identity must be:

Options Considered

Option Description Benefits Drawbacks
API keys or bearer tokens only Use shared secrets or token headers as the primary authentication mechanism.

|

| | Network trust only | Rely on firewalls, routing, and source networks without strong cryptographic peer identity. |

|

| | mTLS plus application JWT | Use mutual TLS for transport authentication and add JWT claims for higher-level service identity. |

|

| | Mutual TLS with zone-issued certificates (Selected) | Use mTLS for all BSFG peer connections, with zone identity derived from certificate subject or SAN. |

|

|

Decision

BSFG will use mutual TLS for all boundary RPC connections.

Each BSFG peer presents a certificate whose identity maps to a zone. Zone authorization is derived from certificate identity rather than network location alone.

transport security = mTLS
peer identity      = certificate subject or SAN
authorization      = zone-aware policy

The envelope fields from_zone and to_zone are therefore declarative metadata, not unauthenticated claims. Implementations must validate that the authenticated peer is permitted to assert the declared origin.

Consequences

Benefits:

Tradeoffs: