Loading...
private.me Docs
Explore ACIs
PRIVATE.ME ENTERPRISE

Enterprise CLI Toolkit: Self-Hosted ACI Servers

Twenty-one self-hosted enterprise servers. One architecture. Deploy the PRIVATE.ME cryptographic platform on your own infrastructure — Docker-ready, air-gapped capable, with RBAC, JSONL audit trails, and AES-256-GCM encryption at rest. 1,924 tests. Zero external dependencies per server.

21 SERVERS 1,924 TESTS DOCKER-READY AIR-GAPPED
NOW AVAILABLE — ALL 21 SERVERS
@private.me/enterprise-cli-suite ships 21 enterprise CLI servers, each built and tested independently. 1,924 tests across all servers — all passing. Every server shares the same architecture: Node.js HTTP (zero external deps), 3-role RBAC, JSONL append-only audit, AES-256-GCM encryption at rest, Docker Alpine deployment. Air-gapped capable — no phone-home, no telemetry.
Section 01

Architecture Overview

All twenty-one servers share the same battle-tested architecture. One pattern, learned once, deployed twenty-one ways. Node.js built-in HTTP with zero external dependencies. 3-role RBAC. JSONL append-only stores. AES-256-GCM encryption at rest. Docker Alpine with read-only filesystem. Graceful shutdown.

Each server is a standalone Node.js process built on the built-in http module — no Express, no Fastify, no external dependencies. This eliminates supply chain risk entirely. Every request is authenticated via Bearer token, authorized against a 3-role RBAC model, logged to append-only JSONL with a correlation UUID, and served over a single HTTP port.

The servers compose naturally. xLink handles agent messaging. xPass enforces billing. xCompute coordinates MPC. xProve generates verification proofs. xBoot manages secure deployments. xGhost protects algorithms. Redact strips PII. Trust validates identity chains. Key Ceremony manages threshold key generation. Dead Drop enables anonymous share exchange. Audit Log provides tamper-evident event chains. Secure Ingest pipelines sensitive data ingestion. VaultDB stores encrypted records. Authorize enforces multi-party approval. xFuse orchestrates identity convergence. xChange handles fast key transport. xStore manages split-storage routing. Deploy one, deploy all twenty-one, or deploy any combination that matches your use case.

Shared Architecture Pattern

SHARED SERVER ARCHITECTURE HTTP Node.js built-in http • Zero external deps RBAC 3 roles: admin / operator / auditor STORE JSONL append-only • AES-256-GCM at rest DEPLOY Docker Alpine • non-root • read-only FS • graceful shutdown

Port Assignments

ENTERPRISE SERVER PORTS Redact :3200 xLink :3300 xProve :3400 xCompute :3500 xPass :3600 xBoot :3700 xGhost :3100 Trust :3800 KeyCeremony :3900 DeadDrop :4000 AuditLog :4100 SecureIngest :4200 VaultDB :4300 Authorize :4400 xLock :4500 xWallet :4600 xID :4700 xFuse :4800 xChange :4900 xStore :5000 xGit :3200 Row 1: Ports 3100–3700 • Row 2: Ports 3800–4400 • Row 3: Ports 4500–5000 21 servers • 21 ports • 1,924 enterprise tests • Zero external dependencies
Section 02

The Server Suite

Twenty-one enterprise servers. Each self-contained with its own CLI, tests, Docker image, and documentation. Same architecture, different capabilities. Deploy the exact combination your use case requires.

ServerPortTestsCore DepKey Endpoints
Redact Enterprise320078@private.me/redact/redact, /patterns, /audit
xLink Enterprise330084@private.me/agent-sdk/register, /relay, /store-forward
xProve Enterprise340092@private.me/xprove/prove, /verify, /proofs
xCompute Enterprise350088@private.me/xcompute/session, /beaver-pool, /compute
xPass Enterprise360076@private.me/xpass/connect, /epoch, /billing
xBoot Enterprise370082@private.me/xboot/bundle, /manifest, /revoke
xGhost Enterprise310067@private.me/xghost/heartbeat, /algorithm, /license (all 3 tiers)
Trust Enterprise380069@private.me/trust/challenge, /verify, /continuity
Key Ceremony Enterprise390043@private.me/keyceremony/ceremony, /participants, /keys
Dead Drop Enterprise400065@private.me/deaddrop/drop, /retrieve, /expire
Audit Log Enterprise410041@private.me/auditlog/events, /chain, /export
Secure Ingest Enterprise420081@private.me/secureingest/ingest, /pipeline, /validate
VaultDB Enterprise4300106@private.me/vaultdb/vault, /backends, /audit
Authorize Enterprise440097@private.me/authorize/authorize, /policies, /audit
xLock Enterprise450047@private.me/xlock/challenge, /verify, /devices
xWallet Enterprise460073@private.me/xwallet/credentials, /present, /schemas
xID Enterprise470083@private.me/xid/wallets, /credentials, /ephemeral
xFuse Enterprise4800479@private.me/xfuse/pipeline, /session, /agents
xChange Enterprise490093@private.me/xchange/keys, /encrypt, /decrypt
xStore Enterprise500065@private.me/xstore/stores, /data, /backends
xGit Enterprise320078@private.me/xgit/watermark, /verify, /repos

Redact Enterprise

PII redaction API. Strip personally identifiable information from text, documents, and structured data before processing. SHA-256 audit trail for every redaction. Custom regex patterns for domain-specific PII (medical record numbers, account IDs, case numbers). Reversible tokenization for authorized reconstruction.

xLink Enterprise

Agent relay and messaging. DID registration, store-and-forward message relay, Ed25519 + X25519 key management. Agents connect, authenticate via DID, and exchange encrypted envelopes. Enterprise xLink adds persistent store-and-forward for offline agents and fleet-wide DID directory services.

xProve Enterprise

Proof generation and verification. All four tiers: T1 HMAC chain, T2 commit-reveal Beaver, T3 IT-MAC SPDZ-style, T4 KKW N-party MPC-in-the-Head. Generate proofs server-side for batch processing. Verify incoming proofs from clients. 32 repetitions for 128-bit security at ~50KB proof size (KKW).

xCompute Enterprise

MPC coordinator. Beaver triple pool management, session lifecycle (create/join/compute/close), configurable TTL (5-60 minutes). Coordinates multi-party computation across participants. XOR gates are Class 1 (zero communication). AND gates use pre-generated Beaver triples from the pool.

xPass Enterprise

Billing enforcement. Connection lifecycle management: create, activate, rotate, suspend, terminate. Epoch-based secret rotation (24h default). Every M2M connection is a billable unit — (DID_A, DID_B, scope). Connection secrets are XorIDA-split; decryption requires both shares.

xBoot Enterprise

Secure boot and deployment. Bundle creation (XorIDA-split deployment artifacts), manifest management (signed inventory of expected shares), revocation (immediate invalidation of compromised bundles). Ensures only authorized, unmodified code runs on target infrastructure.

xGhost Enterprise

Algorithm protection. The reference implementation. Heartbeat server for 30-second authorization cycles, algorithm upload and share management, license CRUD, HMAC-chained audit logs. The pattern all other enterprise CLIs follow. 67 tests across 6 test files.

Trust Enterprise

Identity chain validation. Challenge-response trust verification with XorIDA-split attestations. Verify agent identity, validate trust chains, and maintain continuity records. Supports multi-step verification workflows where each step produces a cryptographically linked attestation. 69 tests across 5 test files.

Key Ceremony Enterprise

Threshold key generation. Coordinate multi-party key generation ceremonies with participant management and ceremony lifecycle tracking. Generate threshold-split keys where no single participant holds the complete key. Ceremony audit trails record every participant action. 43 tests across 5 test files.

Dead Drop Enterprise

Anonymous share exchange. Time-limited, anonymous drop-and-retrieve for XorIDA shares. Senders create drops with configurable TTL; recipients retrieve with claim tokens. Expired drops are automatically purged. Zero metadata linking sender to recipient. 65 tests across 5 test files.

Audit Log Enterprise

Tamper-evident event chains. HMAC-chained audit events with hash-linked integrity. Every event contains the hash of the previous event, creating an immutable chain. Export events for SIEM ingestion. Detect any gap or modification in the chain with cryptographic proof. 41 tests across 5 test files.

Secure Ingest Enterprise

Sensitive data ingestion. Pipeline-based data ingestion with multi-stage processing. Define ingestion pipelines with validation stages, threshold checks, and routing rules. Each record is XorIDA-split at rest. Pipeline status tracking from intake through final storage. 81 tests across 5 test files.

VaultDB Enterprise

Encrypted record storage. Encrypted document vault with multi-backend support. Store, retrieve, and search encrypted records. Each record is AES-256-GCM encrypted at rest with per-record IVs. Backend management for storage providers. Full audit trail on every vault operation. 106 tests across 5 test files.

Authorize Enterprise

Multi-party approval. Threshold authorization for sensitive operations. Create authorization requests that require M-of-N approvals before proceeding. Policy engine with configurable approval thresholds, approver lists, and expiration windows. HMAC-chained audit trail for every authorization decision. 97 tests across 5 test files.

xLock Enterprise

Passwordless authentication. Push-based 1-tap authentication management. Challenge generation, device registration, and verification. XorIDA-split authentication tokens ensure no single point of compromise. 47 tests across 5 test files.

xWallet Enterprise

Credential management. Verifiable credential infrastructure with schema registry, issuance, selective disclosure, and revocation. Server stores credential metadata only — actual credentials are XorIDA-split across client-managed backends. OID4VP presentation support. 73 tests across 5 test files.

xID Enterprise

Identity wallet management. Digital identity wallet with ephemeral DID derivation. Wallet CRUD, credential import, presentation lifecycle, backup, and eIDAS compliance. Per-verifier HKDF-derived DIDs from XorIDA-split master seed with ~50µs exposure window. Master seeds never stored server-side. 83 tests across 5 test files.

xFuse Enterprise

Identity orchestration hub. The most comprehensive enterprise CLI — integrates 10 packages (xID, xPass, xLock, xStore, xCompute, Redact, xWallet, Authorize, xProve, Auditlog) into a 5-step atomic pipeline: verify → validate → evaluate → execute → log. ABAC policy engine, session-bound cryptographic identity, delegation controls, credential orchestration (OID4VP), agent accountability with human-in-the-loop gates, MPC convergence, and cancelable biometric templates. 479 tests across 11 test files.

xChange Enterprise

Key transport server. XorIDA-based key transport with ~1ms latency. Key generation, encrypt/decrypt lifecycle, bundle management. Bundle = AES-256-GCM key + IV + ciphertext, split via XorIDA for information-theoretic security. ~180x faster than split-channel V3 for real-time scenarios. 93 tests across 5 test files.

xStore Enterprise

Split-storage management. Universal split-storage layer with pluggable backends (memory, filesystem, cloud). Store instance management with XorIDA-split shares, HMAC verification before reconstruction, namespace isolation, and TTL expiry. Route shares to geographically diverse backends for regulatory compliance. 65 tests across 5 test files.

xGit Enterprise

DID watermarking. Cryptographic watermarking for source code and documents. Embed and verify DID-based provenance markers. Track document lineage across organizational boundaries with tamper-evident attribution. 78 tests across 5 test files.

Section 03

Security Architecture

Every enterprise server enforces the same security model. Three RBAC roles. SHA-256 hashed API keys. AES-256-GCM encryption at rest. Append-only audit trails. Docker hardening. No exceptions, no shortcuts.

3-Role RBAC

RoleCreateReadUseAuditManage Keys
AdminYesYesYesYesYes
OperatorNoYesYesNoNo
AuditorNoYesNoYesNo

Admin has full access: create resources, manage API keys, rotate encryption keys, read audit logs. Operator can read state and invoke operations but cannot modify configuration or access audit trails. Auditor has read-only access to resources and full access to audit logs — they see what happened but cannot change anything.

API Key Management

API keys are generated as cryptographically random tokens via crypto.getRandomValues(). Only the SHA-256 hash is stored in the JSONL key store — the plaintext key is shown once at creation time and never again. Authentication uses Bearer token in the Authorization header. Key rotation is atomic: new key activates before old key is revoked.

Encryption at Rest

All JSONL stores are encrypted with AES-256-GCM via the Web Crypto API. The encryption key is provided via environment variable ({PREFIX}_SHARE_ENCRYPTION_KEY) or fetched from a KMS in production. Each record has a unique IV. The GCM authentication tag ensures both confidentiality and integrity — tampered records are rejected on read.

Audit Trails

Every request generates a JSONL audit entry with: request_id (UUID v4 for SIEM correlation), timestamp (ISO 8601), method, path, role, outcome (success/denied/error), and latency. Audit logs are append-only — entries cannot be modified or deleted. Auditor role provides read access for compliance review and forensic analysis.

Docker Hardening

Docker Security Flags
# Read-only root filesystem
--read-only

# Temporary filesystem for /tmp only
--tmpfs /tmp:rw,noexec,nosuid,size=64m

# Prevent privilege escalation
--security-opt no-new-privileges:true

# Non-root user (UID 1001)
USER appuser

# Drop all capabilities
--cap-drop ALL

# Alpine base (minimal attack surface)
FROM node:20-alpine
Section 04

Deployment Guide

From docker compose up to production. Quick start in seconds, production-hardened in minutes. Every server runs offline — no phone-home, no telemetry, no external dependencies at runtime.

Quick Start

Docker Compose — All 21 Services
# Start all enterprise servers
docker compose up -d

# Verify all services are healthy
curl http://localhost:3200/health  # Redact
curl http://localhost:3300/health  # xLink
curl http://localhost:3400/health  # xProve
curl http://localhost:3500/health  # xCompute
curl http://localhost:3600/health  # xPass
curl http://localhost:3700/health  # xBoot
curl http://localhost:3100/health  # xGhost
curl http://localhost:3800/health  # Trust
curl http://localhost:3900/health  # Key Ceremony
curl http://localhost:4000/health  # Dead Drop
curl http://localhost:4100/health  # Audit Log
curl http://localhost:4200/health  # Secure Ingest
curl http://localhost:4300/health  # VaultDB
curl http://localhost:4400/health  # Authorize
curl http://localhost:4500/health  # xLock
curl http://localhost:4600/health  # xWallet
curl http://localhost:4700/health  # xID
curl http://localhost:4800/health  # xFuse
curl http://localhost:4900/health  # xChange
curl http://localhost:5000/health  # xStore

Environment Variables

Every server follows the same naming convention. Replace {PREFIX} with the server name (e.g., REDACT, XLINK, XPROVE).

VariableDescriptionDefault
{PREFIX}_PORTHTTP listen portServer-specific (3100-5000)
{PREFIX}_DATA_DIRJSONL store directory./data
{PREFIX}_SHARE_ENCRYPTION_KEYAES-256-GCM key (hex)Required in production
{PREFIX}_ADMIN_API_KEYInitial admin API keyAuto-generated on first run

Production Deployment

TLS reverse proxy: Place Nginx or Caddy in front of each server for TLS termination. Internal traffic between servers stays on a private Docker network.

KMS integration: In production, fetch {PREFIX}_SHARE_ENCRYPTION_KEY from AWS KMS, Azure Key Vault, or HashiCorp Vault at startup. Never hardcode encryption keys.

Network isolation: Each server listens on its own port. Use Docker network policies or firewall rules to restrict which services can communicate. xCompute should only accept connections from authenticated agents.

Air-Gapped Deployment

Offline Installation
# On internet-connected machine: save images
docker compose build
docker save privateme-redact privateme-xlink privateme-xprove \
  privateme-xcompute privateme-xpass privateme-xboot privateme-xghost \
  privateme-trust privateme-keyceremony privateme-deaddrop \
  privateme-auditlog privateme-secureingest privateme-vaultdb \
  privateme-authorize privateme-xlock privateme-xwallet privateme-xid \
  privateme-xfuse privateme-xchange privateme-xstore privateme-xgit \
  | gzip > privateme-enterprise.tar.gz

# Transfer to air-gapped machine via USB/secure media

# On air-gapped machine: load and run
docker load < privateme-enterprise.tar.gz
docker compose up -d

# All servers run fully offline — zero phone-home

Monitoring

/health endpoints: Every server exposes GET /health returning JSON with status, uptime, and version. Wire into your existing monitoring (Prometheus, Datadog, Nagios).

Audit log analysis: JSONL audit logs are structured JSON — ingest directly into Splunk, ELK, or any SIEM. The request_id UUID enables cross-service request tracing.

SIEM integration: Forward audit logs via syslog, file shipping, or a dedicated log aggregator. Every entry has timestamp, role, action, and correlation ID — the fields your SOC team expects.

Air-Gap Guarantee
Every enterprise server runs completely offline. No license server callbacks. No telemetry. No analytics beacons. No update checks. The only network traffic is between your own services on your own infrastructure. Deploy in classified environments, SCIF facilities, or disconnected data centers with confidence.
Section 05

Use Cases

🏥
Healthcare
HIPAA-Compliant PII Redaction

Redact + xLink + xProve. Strip PHI from medical records before processing, relay anonymized data between systems via authenticated agents, and generate verifiable proof that redaction was performed correctly — all on-premises.

Redact + xLink + xProve
💳
Financial
Privacy-Preserving Credit Scoring

xCompute + xProve + xPass. Multiple banks contribute encrypted data to an MPC computation. xProve generates zero-knowledge proof that the score was calculated correctly. xPass enforces per-connection billing for each participant.

xCompute + xProve + xPass
🏛
Government
Air-Gapped Secure Boot

xBoot + xGhost + xLink. Deploy signed, XorIDA-split binaries to classified infrastructure. xGhost protects proprietary algorithms. xLink provides DID-authenticated agent relay. Everything runs air-gapped — no external connectivity required.

xBoot + xGhost + xLink
🤖
AI / ML
Private AI Inference

Redact + xCompute + xProve. Strip PII from training data and inference inputs. Run model inference under MPC so neither party sees the other's data. Generate verifiable proof that inference was performed on redacted inputs only.

Redact + xCompute + xProve
Section 06

CLI Reference

Every enterprise CLI follows the same conventions. Standard commands, standard flags, standard exit codes. Learn one, operate all twenty-one.

Standard Commands

Every CLI ships with serve to start the HTTP server, plus domain-specific commands for its ACI. The --json flag outputs structured JSON to stdout (for scripting) while human-readable messages go to stderr.

Common CLI Patterns
# Every CLI has `serve`
redact serve   --port 3200 --data-dir ./data
xlink serve    --port 3300 --data-dir ./data
xprove serve   --port 3400 --data-dir ./data
xcompute serve --port 3500 --data-dir ./data
xpass serve    --port 3600 --data-dir ./data
xboot serve    --port 3700 --data-dir ./data
xghost serve   --port 3100 --data-dir ./data
trust serve    --port 3800 --data-dir ./data
keyceremony serve --port 3900 --data-dir ./data
deaddrop serve --port 4000 --data-dir ./data
auditlog serve --port 4100 --data-dir ./data
secureingest serve --port 4200 --data-dir ./data
vaultdb serve  --port 4300 --data-dir ./data
authorize serve --port 4400 --data-dir ./data
xlock serve     --port 4500 --data-dir ./data
xwallet serve  --port 4600 --data-dir ./data
xid serve      --port 4700 --data-dir ./data
xfuse serve    --port 4800 --data-dir ./data
xchange serve  --port 4900 --data-dir ./data
xstore serve   --port 5000 --data-dir ./data
xgit serve     --port 3200 --data-dir ./data

# Domain-specific commands
redact scan --input data.json --patterns hipaa --json
xghost build --source algo.js --exports "score,classify"
xghost verify --audit-log ./audit.json
xboot bundle --source ./dist --threshold "2-of-3"
xprove verify --proof ./proof.json --statement ./stmt.json

Standard Exit Codes

CodeMeaningExample
0SuccessOperation completed normally
1General errorUnexpected failure
2Usage errorInvalid arguments or missing required flags
10Authentication failureInvalid or expired API key
11UnreachableServer not responding
12Integrity failureHMAC verification failed, tampered data

Config Hierarchy

Configuration resolves in order of precedence: CLI flags (highest) > environment variables > defaults (lowest). This lets you set base configuration via environment and override per-invocation via flags.

Docker Compose — All 21 Services

docker-compose.yml
version: '3.8'
services:
  redact:
    image: privateme/redact-enterprise
    ports: ["3200:3200"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
    environment:
      - REDACT_SHARE_ENCRYPTION_KEY=${REDACT_KEY}
  xlink:
    image: privateme/xlink-enterprise
    ports: ["3300:3300"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xprove:
    image: privateme/xprove-enterprise
    ports: ["3400:3400"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xcompute:
    image: privateme/xcompute-enterprise
    ports: ["3500:3500"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xpass:
    image: privateme/xpass-enterprise
    ports: ["3600:3600"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xboot:
    image: privateme/xboot-enterprise
    ports: ["3700:3700"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xghost:
    image: privateme/xghost-enterprise
    ports: ["3100:3100"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  trust:
    image: privateme/trust-enterprise
    ports: ["3800:3800"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  keyceremony:
    image: privateme/keyceremony-enterprise
    ports: ["3900:3900"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  deaddrop:
    image: privateme/deaddrop-enterprise
    ports: ["4000:4000"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  auditlog:
    image: privateme/auditlog-enterprise
    ports: ["4100:4100"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  secureingest:
    image: privateme/secureingest-enterprise
    ports: ["4200:4200"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  vaultdb:
    image: privateme/vaultdb-enterprise
    ports: ["4300:4300"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  authorize:
    image: privateme/authorize-enterprise
    ports: ["4400:4400"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xlock:
    image: privateme/xlock-enterprise
    ports: ["4500:4500"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xwallet:
    image: privateme/xwallet-enterprise
    ports: ["4600:4600"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xid:
    image: privateme/xid-enterprise
    ports: ["4700:4700"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xfuse:
    image: privateme/xfuse-enterprise
    ports: ["4800:4800"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xchange:
    image: privateme/xchange-enterprise
    ports: ["4900:4900"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xstore:
    image: privateme/xstore-enterprise
    ports: ["5000:5000"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
  xgit:
    image: privateme/xgit-enterprise
    ports: ["3200:3200"]
    read_only: true
    tmpfs: ["/tmp:size=64m"]
Section 07

Integration Patterns

Deploy one server or all twenty-one. Six standard patterns cover the most common enterprise deployments. Cross-service communication uses the same RBAC key management pattern — one API key model across the entire suite.

Pattern 1: Full Stack (All 21 Ports)

Deploy the complete PRIVATE.ME enterprise platform. All twenty-one servers on a single host or distributed across a cluster. Full capabilities: redaction, messaging, computation, verification, billing, deployment, algorithm protection, trust validation, key ceremonies, anonymous exchange, audit chains, secure ingestion, encrypted storage, multi-party authorization, identity fusion, key transport, split storage, and DID watermarking. Best for organizations building a comprehensive cryptographic infrastructure.

Pattern 2: Minimal (Redact + xLink)

PII redaction with authenticated agent relay. Two servers, two ports. Redact strips sensitive data; xLink provides DID-authenticated message delivery. Deploy when you need to process sensitive data across organizational boundaries without exposing PII.

Pattern 3: Computation (xCompute + xProve)

Privacy-preserving computation with verifiable proof. xCompute coordinates MPC sessions; xProve generates proofs of correct execution. Deploy when multiple parties need to compute over shared data without revealing their inputs to each other — credit scoring, collaborative analytics, joint risk assessment.

Pattern 4: Protection (xGhost + xPass + xBoot)

Algorithm protection with billing enforcement and secure deployment. xGhost protects the code, xPass enforces payment, xBoot ensures only authorized builds run. Deploy when you license proprietary algorithms to customers and need cryptographic enforcement of both IP protection and subscription compliance.

Cross-Service Communication
All twenty-one servers share the same RBAC key management pattern. An admin API key generated on one server can authorize cross-service calls when servers need to coordinate. In Pattern 1 (full stack), configure a shared service account with operator-level access across all twenty-one servers for internal communication, while external clients get scoped keys per server.

Pattern Summary

PatternServersPortsUse Case
Full StackAll 213100-5000Complete cryptographic infrastructure
MinimalRedact + xLink3200, 3300PII redaction with secure relay
ComputationxCompute + xProve3500, 3400Privacy-preserving analytics
ProtectionxGhost + xPass + xBoot3100, 3600, 3700Algorithm licensing enforcement
GovernanceAuthorize + AuditLog + Trust4400, 4100, 3800Multi-party approval with audit chains
Data VaultVaultDB + SecureIngest + DeadDrop4300, 4200, 4000Encrypted ingestion and storage
Section 08

Platform Statistics

The Enterprise CLI Toolkit is part of the PRIVATE.ME platform — 94 packages, 7,207+ tests, 140 ACIs. Twenty-one enterprise servers extend the platform to your infrastructure.

94
Packages
7,207+
Total tests
411+
Test files
35
Available Now ACIs
21
Enterprise CLIs
1,924
Enterprise tests
140
Total ACIs
0
External deps per server
Section 09

Benchmarks

Performance and test coverage across all 21 Enterprise CLI servers. Each server cold-starts in under 100ms and handles typical API operations in under 5ms.

21
CLI Servers
1,924+
Test Cases
<100ms
Cold Start
~5ms
Typical API Op
CLI ServerPortTestsTypical Latency
redact-cli320076~5ms (redact pipeline)
xlink-cli330074~5ms (agent message)
xprove-cli340072~30ms (KKW proof)
xcompute-cli350068~10ms (MPC multiply)
xpass-cli360062~1ms (billing check)
xboot-cli370058~50ms (deploy 100KB)
trust-cli380072<1ms (registry lookup)
keyceremony-cli390068~5ms (ceremony step)
deaddrop-cli400074~3ms (drop + retrieve)
auditlog-cli410070<1ms (log append)
secureingest-cli420066~5ms (ingest pipeline)
vaultdb-cli430072~3ms (encrypted query)
authorize-cli440068<1ms (auth check)
xlock-cli450047~1ms (challenge gen)
xwallet-cli460073~2ms (credential op)
xid-cli470083~50µs (ephemeral derive)
xfuse-cli4800479~6ms (identity pipeline)
xchange-cli490093~1ms (key transport)
xstore-cli500065~3ms (split store/get)
xghost-cli310067~5ms (heartbeat cycle)
xgit-cli320078~2ms (watermark embed)

Enterprise Deployment Comparison

PropertyTraditional (HashiCorp/CyberArk)Enterprise CLI Toolkit
Setup timeDays to weeks (infrastructure)Minutes (Docker compose)
External dependenciesDatabase, KMS, network infraZero — self-contained
Air-gap capableRequires license serverYes — all CLIs run offline
Cryptographic modelAES/RSA (computational)XorIDA (information-theoretic)
Test coverageVendor-dependent1,963+ tests, all passing
Section 10

Honest Limitations

Five known limitations documented transparently. The Enterprise CLI Toolkit prioritizes simplicity and air-gap capability over enterprise-scale orchestration.

LimitationImpactMitigation
No centralized management planeEach CLI server runs independently. There is no unified dashboard or control plane for managing all 21 servers together.Docker Compose orchestrates all servers with a single command. The xGit Admin Panel provides a web UI for the most common management tasks. Centralized orchestration is on the roadmap.
Fixed 3-role RBACAll CLI servers use the same 3-role model (admin/operator/viewer). Custom roles or fine-grained permissions are not supported per-server.Three roles cover most enterprise structures. Role assignment is per-server, allowing different users to have different roles across different services.
No horizontal scaling built-inEach CLI server is a single-instance Node.js process. High-availability deployments require external load balancing and replication.Stateless API design allows standard load balancer deployment. JSONL stores can be replicated via filesystem sync. Container orchestration (K8s) handles scaling naturally.
Individual server configurationEach of the 21 servers requires its own configuration (port, DID keys, RBAC). Initial setup scales linearly with server count.Docker Compose template pre-configures all servers. Environment variable templates and the key ceremony CLI automate initial credential generation.
JSONL storage limitsAll CLI servers use JSONL append-only logs for persistence. At very high write volumes (>100K entries/day), file I/O becomes a bottleneck.JSONL is sufficient for enterprise workloads up to ~1M entries. For higher volumes, the storage layer can be swapped to SQLite or Postgres without changing the API surface.
VERIFIED BY XPROVE

Verifiable Enterprise Operations

Every enterprise server operation produces a verifiable audit trail via xProve. HMAC-chained integrity proofs confirm that data was processed correctly, access was authorized, and results are tamper-evident.

XPROVE AUDIT TRAIL
Every enterprise server generates HMAC-SHA256 integrity tags on every operation. xProve chains these into a tamper-evident audit trail that proves operations were performed correctly — data was redacted, proofs were verified, computations were honest, algorithms were protected. Upgrade to zero-knowledge proofs when regulators or auditors need public verification without accessing underlying data.

Read the xProve white paper →
GET STARTED

Ready to deploy Enterprise CLI Toolkit?

Talk to Sol, our AI platform engineer, or book a live demo with our team.

Book a Demo