A Short Introduction to the Xentara Multi-Mesh Security Model

Industrial automation • By Tobias Schneider • April 25, 2025
Security is critical in Xentara to protect sensitive data, prevent unauthorized access, and ensure safe control of industrial systems. Xentara secures operations through three key features: TLS for encrypted communication, Access Control Lists (ACLs) for managing user permissions, and Authentication methods (passwords, certificates, OAuth 2.0) to verify user and device identities. Together, these layers keep industrial environments safe, reliable, and resilient against cyber threats.
A Short Introduction to the Xentara Multi-Mesh Security Model
Industrial-grade encryption.

Why does Security matter in Xentara?

Real-time industrial automation system Xentara manages vital data and controls machinery. Improper security could let unauthorized people access or control your system, steal sensitive trade secrets or compromise your operations.

Xentara’s Three Key Security Features: TLS, ACLs and Authentication!

Secure Communication with TLS (Transport Layer Security)

TLS is similar to a safe tunnel protecting your data as it moves between Xentara and other systems. Without TLS, sending your data is like mailing a postcard; everyone can read it. TLS is like mailing a locked sealed package; only the correct individual may open it.

Why should this be important?

Controlling Who Can Do What through Access Control Lists or ACLs

To understand this idea, try to think of a Xentara based system as a high-security factory. Surely not everyone should enter every room. Access control lists, or ACLs for short, fit here. Like security badges, ACLs specify:

Here is a case demonstrating how it functions: You provide three user groups with varied rights for a production line. Operators can only read machine status. Devices may be set up by engineers. Only administrators have the ability to turn off the whole system.

ACLs in Xentara work on two levels:

<aside> 💡

Bonus Tip: Permissions can be inherited — so if you restrict access at the top level, the same restrictions automatically apply to everyone below it.

</aside>

ACLs ensure only authorized people can make changes — reducing mistakes and security risks.

Verifying Identities through various Authentication Methods

Even with using secure communications through TLS and strict access controls (ACLs), we still need to verify the identity of anyone trying to enter. Xentara offers several methods for this:

  1. Username & Password The classic method — but make sure to use strong passwords!
  2. Certificate-Based Authentication Think of this as a VIP pass. If your system has the correct digital certificate, it can access Xentara without having to enter a password. This is ideal for machines that need to constantly talk to Xentara securely.
  3. OAuth 2.0 (Token-Based Login) Have you ever signed in to a website using Google or Microsoft? OAuth 2.0 works just like that — it allows secure, token-based authentication for automated processes and external systems.

Why does this matter?

Summary

By combining these three security layers, Xentara ensures that your industrial automation system stays safe, controlled, and reliable.

If you’re using Xentara, take a few minutes to review your security settings — it could prevent a major security breach!

If you have questions or need help setting up security, feel free to reach out to our support team.