Article · draft for review

Overview

Ezkey at a glance — trust zone, mobile, and core flows

Context

Ezkey is an open-source cryptographic MFA platform for teams that want strong authentication without reducing it to a browser-centric story or a stack of complex, general-purpose protocols. The product is deliberately backend-first: trust rests on clear APIs, explicit server-side state, and cryptographic continuity across participants — with a mobile client that joins the chain in a concrete, verifiable way.

The chain of trust: two foundations

At the highest level, trust in Ezkey rests on two complementary anchors:

  1. The organization as the trust anchor
    This is your Ezkey deployment running inside the organization’s environment (on-premises or equivalent). It defines where policy applies, who operates the service, and which back end holds operational and cryptographic truth for integrations. In short, the institutional foundation: the team relies on its instance, under its control, not on opaque or external mediation.
  2. Trust tied to each participant and device
    Each user relies on a cryptographic key bound to their device, protected by the security mechanisms the mobile platform provides (hardware-backed or strongly isolated storage, depending on the device). That is not cosmetic: it is the user-side foundation of the chain — the assurance that identity and proofs presented from the phone remain tied to hardware and context the user can reasonably treat as trustworthy.

These two foundations do not replace each other: they interlock. The Ezkey back end verifies and orchestrates; the phone holds and uses keys in an environment built to protect them — so the mobile client is a full participant in the trust zone, not a mere “screen” next to the server.

Organization side: one deployment, one trust zone

One Ezkey deployment = the organization’s trust zone: the server-side foundation for state, verification, and policy — under the organization’s control.

Mobile side: platform security and shared truth

The Ezkey mobile app builds on the security APIs and abstractions native to mobile platforms — in particular protected key storage (including, when hardware allows, stronger paths such as dedicated cryptographic hardware). Without vendor jargon, the idea is simple: participants can trust that using the phone in this model adds real protection — the kind operating systems and devices attach to secret handling and controlled use.

That choice is part of Ezkey’s DNA: the product reuses what platforms already do well for on-device identity, instead of pretending the UI alone is enough. The phone is not a weak middle layer: it is where the user’s proof gains meaning inside a hardened environment, consistent with a back end that validates that proof in the overall flow.

Many “authenticator” apps stop at a code to copy or a tap to confirm: security then depends on the human channel (reading, copying, dictation), not on a cryptographically bound proof for the current attempt. The Ezkey app is different: responses follow the protocol and keys protected on the device — not a rotating six-digit code you can copy outside the flow like a typical generator, nor a “yes” detached from server context.

Essential flows

Enrollment / device binding

Authentication

Logical diagram (high-level view):

Why this approach

Conclusion — positioning

Ezkey positions itself as a backend-first alternative to MFA centered on browsers, generic mediators, or one-size-fits-all standards: API-first, self-hosted, cryptographically continuous — a server that carries the organizational anchor, a mobile client that uses platform guarantees for keys. This is not a UI promise: it is a two-foundation model (organization + participant/device), pragmatic for understanding, integrating, and operating without the weight of an imposed ecosystem.