A Short Introduction to the Xentara Multi-Mesh Security Model
Security is critical in Xentara to protect sensitive data, prevent unauthorized access, and ensure safe control of industrial systems. Xentara secures operations through three key features: TLS for encrypted communication, Access Control Lists (ACLs) for managing user permissions, and Authentication methods (passwords, certificates, OAuth 2.0) to verify user and device identities. Together, these layers keep industrial environments safe, reliable, and resilient against cyber threats.

Why does Security matter in Xentara?
Real-time industrial automation system Xentara manages vital data and controls machinery. Improper security could let unauthorized people access or control your system, steal sensitive trade secrets or compromise your operations.
Xentara’s Three Key Security Features: TLS, ACLs and Authentication!
Secure Communication with TLS (Transport Layer Security)
TLS is similar to a safe tunnel protecting your data as it moves between Xentara and other systems. Without TLS, sending your data is like mailing a postcard; everyone can read it. TLS is like mailing a locked sealed package; only the correct individual may open it.
Why should this be important?
- It guarantees that hackers cannot eavesdrop on your data.
- It stops man-in-the-middle attacks, in which messages are changed by someone sneaking in.
- It maintains your Xentara system communication encrypted and safe from outside attacks.
Controlling Who Can Do What through Access Control Lists or ACLs
To understand this idea, try to think of a Xentara based system as a high-security factory. Surely not everyone should enter every room. Access control lists, or ACLs for short, fit here. Like security badges, ACLs specify:
- WHO can enter (Users/Roles)
- WHAT they can do (Permissions)
Here is a case demonstrating how it functions: You provide three user groups with varied rights for a production line. Operators can only read machine status. Devices may be set up by engineers. Only administrators have the ability to turn off the whole system.
ACLs in Xentara work on two levels:
- Global ACLs are general rules that apply to the whole system.
- Element ACLs are specific rules for individual components only.
<aside> 💡
Bonus Tip: Permissions can be inherited — so if you restrict access at the top level, the same restrictions automatically apply to everyone below it.
</aside>
ACLs ensure only authorized people can make changes — reducing mistakes and security risks.
Verifying Identities through various Authentication Methods
Even with using secure communications through TLS and strict access controls (ACLs), we still need to verify the identity of anyone trying to enter. Xentara offers several methods for this:
- Username & Password The classic method — but make sure to use strong passwords!
- Certificate-Based Authentication Think of this as a VIP pass. If your system has the correct digital certificate, it can access Xentara without having to enter a password. This is ideal for machines that need to constantly talk to Xentara securely.
- OAuth 2.0 (Token-Based Login) Have you ever signed in to a website using Google or Microsoft? OAuth 2.0 works just like that — it allows secure, token-based authentication for automated processes and external systems.
Why does this matter?
- Access is granted only when systems and users establish their identification.
- Using more safe authentication techniques helps to lower the likelihood of password leaks.
- Stops devices not authorized from linking to the network.
Summary
- TLS makes sure data stays private when communicating.
- ACLs decide who can do what in the system.
- Authentication makes sure only trusted users & devices can connect.
By combining these three security layers, Xentara ensures that your industrial automation system stays safe, controlled, and reliable.
If you’re using Xentara, take a few minutes to review your security settings — it could prevent a major security breach!
If you have questions or need help setting up security, feel free to reach out to our support team.
Share this article
If you found this article helpful, please share it with your friends!