Overview
Discover what makes Firezone powerful
Firezone is a self‑hosted, zero‑trust access platform that replaces traditional VPNs with a modern, policy‑driven architecture built on WireGuard®. From the developer’s perspective, it abstracts the complexities of networking and identity management into a declarative policy engine that can be integrated directly into existing CI/CD pipelines or infrastructure as code frameworks. The core idea is to expose a **single API surface** for managing users, groups, resources, and access policies while delegating the heavy lifting of packet encryption, routing, and failover to WireGuard® under the hood.
Backend
Gateway
Database
Identity Sync
Overview
Firezone is a self‑hosted, zero‑trust access platform that replaces traditional VPNs with a modern, policy‑driven architecture built on WireGuard®. From the developer’s perspective, it abstracts the complexities of networking and identity management into a declarative policy engine that can be integrated directly into existing CI/CD pipelines or infrastructure as code frameworks. The core idea is to expose a single API surface for managing users, groups, resources, and access policies while delegating the heavy lifting of packet encryption, routing, and failover to WireGuard® under the hood.
Technical Stack & Architecture
- Backend: A Rust‑based service that orchestrates policy evaluation, session management, and gateway coordination. Rust’s safety guarantees provide low‑latency request handling and a minimal attack surface, which is critical for a security product.
- Gateway: Each gateway runs as a lightweight Docker container that embeds the WireGuard® kernel module and a Go‑written agent for policy enforcement. Gateways are stateless beyond the WireGuard® peers, enabling horizontal scaling with automatic load balancing.
- Database: PostgreSQL is used for durable storage of users, groups, resources, and policy definitions. The schema is intentionally simple to allow developers to query or mutate it directly via SQL when building custom tooling.
- Identity Sync: An optional connector to any SAML/OIDC provider pulls user and group attributes into Firezone, keeping the policy store in sync with external directories.
- API Layer: A REST/GraphQL endpoint exposes CRUD operations for all entities, plus a WebSocket stream that emits real‑time connection events. This API is the primary integration point for third‑party tooling, CI pipelines, or custom dashboards.
Core Capabilities
- Policy Engine: Declarative JSON/YAML policies that can reference user attributes, device location, time windows, and custom conditions. The engine evaluates policies in under 10 ms per request, making it suitable for high‑throughput environments.
- Conditional Access: Developers can embed dynamic rules (e.g., “allow only if device is enrolled in MDM”) directly into the policy, reducing manual ACL maintenance.
- Audit & Observability: Every connection event is logged with user, resource, and condition metadata. A built‑in metrics endpoint exposes Prometheus labels for connection count, latency, and error rates.
- Webhooks & Callbacks: External services can subscribe to events such as “user granted access” or “gateway failure,” enabling automated incident response or billing workflows.
Deployment & Infrastructure
Firezone is designed for container‑first deployments. The core server, gateway, and database can all run as Docker containers orchestrated by Kubernetes or a simple docker-compose file. The gateway’s statelessness allows developers to spin up additional instances behind an external load balancer (e.g., HAProxy or Traefik) without reconfiguring clients. High availability is achieved by running at least two gateways; the system automatically detects failures and re‑routes traffic. For on‑prem or hybrid clouds, Firezone supports VPC peering and custom DNS entries to keep the network footprint minimal.
Integration & Extensibility
- Plugin Hooks: Developers can inject custom logic into the policy evaluation cycle via a Go plugin interface, allowing for domain‑specific checks (e.g., compliance with PCI or HIPAA).
- SDKs & Libraries: While the official SDKs are in progress, the open‑source API is fully documented, and community contributions have produced unofficial Rust and Python clients.
- CLI Tooling: A command‑line interface wraps the API for scripting user and policy changes, making it easy to integrate into Terraform or Ansible playbooks.
- Webhooks: Custom webhooks can trigger actions in external systems (e.g., Slack notifications, ticketing tools) whenever a user is granted or revoked access.
Developer Experience
Firezone’s documentation follows the API‑first paradigm, providing detailed endpoint references, request/response examples, and a live Swagger UI. The codebase is annotated with Rust’s built‑in documentation comments (///) and includes a comprehensive test suite that can be run locally to validate policy logic. The community is active on GitHub Discussions and a Slack channel, offering quick support for integration questions. Licensing under the Apache 2.0 license removes any commercial restrictions, encouraging enterprises to fork and extend the product without licensing headaches.
Use Cases
- Enterprise Zero‑Trust – Replace legacy VPNs with policy‑driven access for remote developers, contractors, and IoT devices.
- Multi‑Tenant SaaS – Expose internal services to external partners while maintaining strict per‑tenant isolation.
- Compliance‑Heavy Environments – Leverage conditional access and audit logs to meet SOC 2, GDPR, or HIPAA requirements.
- Hybrid Cloud – Connect on‑prem workloads to cloud services without exposing them to the public internet, thanks to Firezone’s hole‑punching technology.
Advantages Over Alternatives
- Performance: WireGuard® provides 3–4× faster throughput than OpenVPN, and Firezone’s lightweight gateway reduces CPU overhead.
- Simplicity: No per‑client configuration files; the client auto‑connects using a single token.
- Transparency: Full open source stack allows security audits and custom feature additions without vendor lock‑in.
- Scalability: Stateless gateways and a declarative policy engine enable horizontal scaling with minimal operational overhead.
Open SourceReady to get started?
Join the community and start self-hosting Firezone today
Related Apps in cloud-platforms
Home Assistant
Open-source smart home hub for automation and integration
Caddy
Secure, auto‑TLS web server for every site
Traefik
Dynamic reverse proxy and load balancer for microservices
Pi‑hole
Network‑wide ad blocking with your own DNS server
CasaOS
Your Personal Cloud OS for Docker-based home servers
AdGuard Home
Network‑wide ad and tracker blocker
Weekly Views
Repository Health
Information
Tags
Explore More Apps
I Hate Money
Shared budget tracking made simple and self‑hostable
Syncthing
Peer‑to‑peer file sync, no central server
Photoview
Fast, file‑system photo gallery for photographers
Jina
Build and deploy AI services at scale
DreamFactory
Auto‑generate secure, documented APIs for your data
TeamMapper
Collaborative mindmapping for teams