Passwordless Authentication & Immutable Identity
Configure cryptographic identity verification for workforce users, machines, workloads, and industrial endpoints.
Identity
MFA/Passwordless
OT/IoT Ready
9 min
Last updated: 2026-01-01What You’ll Achieve
Phishing-resistant access
Replace passwords with cryptographic proof tied to device + user context.
Immutable identity ledger
Write authentication and posture events to tamper-evident logs.
Unified policy enforcement
Apply consistent rules across enterprise endpoints and OT/edge nodes.
Prerequisites
- QuantLayer Agent installed on endpoints (Windows, Linux, and supported OT/edge devices).
- Device registered and visible under Assets & Devices with a healthy status (Connected / Registered).
- Time sync enabled (NTP) for consistent audit timestamps (recommended for OT/ICS environments).
- Admin role in QuantLayer to create policies and view identity events.
OT note
In segmented zones, deploy the identity service locally (on-prem) and allow only required east-west flows (zone-to-zone) via policy. This supports air-gapped or restricted OT networks.
Identity Flows Supported
- Workforce: passwordless sign-in (FIDO2/passkeys), step-up policy based on risk.
- Machine-to-machine: hardware-rooted device identity + mutual trust handshake.
- Workloads: service identity for apps/agents with short-lived keys and rotation.
- OT/ICS access: privileged remote access gated by device posture + zone policy.
Setup Steps
- Create an Identity Policy specifying allowed factors and required device posture.
- Bind the policy to a scope (Users, Devices, Groups, OT zones, or IoT fleet tags).
- Enable Immutable Identity Logging to record auth events, key changes, and posture drift.
- Test with a pilot group, then expand scope to production.
# QuantLayer Policy (illustrative)
policy "Passwordless + Device Trust" {
require factor = "passkey"; # phishing-resistant
require device.posture = "healthy"; # secure boot / agent ok
require zone = ["IT", "OT-RemoteAccess"];# zone-aware
when risk.score >= 70 {
step_up factor = "hardware-key"; # optional step-up
quarantine.session = true; # contain until verified
}
log immutable = true; # write to identity ledger
}Verify & Troubleshoot
- Confirm device shows Last Authenticated updated after sign-in.
- Check Identity Events for: key rotation, policy decisions, and posture signals.
- If sign-in fails: validate device clock, agent health, and assigned policy scope.
- For OT jump hosts: confirm allowed conduits and local policy service reachability.
Next Steps
- Create an Identity Policy.
- View Identity Events.
- Download PDF.
Best practice
Treat identity as a continuous signal: re-check posture at session start, during access, and on policy-relevant events (e.g., config changes, drift, new binaries).