Solution Deployment Examples in OT
Explore how swIDch's adaptable OTAC solution
seamlessly integrates into diverse OT environments,
offering flexible deployment options tailored to your unique operational needs.
In the realm of operational technology (OT), environments can be quite diverse, each with its unique characteristics. As a result, it’s essential for solution providers to offer adaptability—to seamlessly integrate into various settings. Enter the OTAC solution: highly configurable and designed to flexibly fit different environments. This versatile solution can be deployed in multiple ways: directly onto a programmable logic controller (PLC) in standalone mode, on a central server within the OT network or in hybrid mode which bring the best of standalone and server mode deployments.
Deployment Model
Standalone
In standalone mode the solution is deployed directly onto a PLC. This offers the most robust solution as everything is running on the PLC and does not require any network connection. Since the OTAC auth MFA is running locally on the PLC, all authentication requests are handled locally.
Server
In server mode the solution is deployed centrally on a server in the OT network. This offers the best solution for large scale deployment where you want to protect multiple PLCs with MFA. Each PLC redirects the authentication request to OTAC auth MFA server to verify the login details.
Hybrid
In hybrid mode the solution is deployed both on the individual PLC’s as well as centrally on a server in the OT network. This offers the best solution for large scale deployment where you want to protect multiple PLCs with MFA as well as have complete resilience for fail overs. Each PLC redirects the authentication request to OTAC auth MFA server to verify the login details, however in the event of a network failure or if the central server is down, the PLC is able to authenticate the user locally.
Software Components
OTAC auth MFA can be installed as a complete software with an Admin Portal for user management and onboarding as well as the accompanying mobile app (where OTAC is generated) available on Android and iOS.
REST API
The REST API is hosted on a web server and offers important core functions to Verify OTAC, Register a new user and De-Register an existing user.
Admin Portal
The solution also comes with an intuitive administration web portal for managing users, roles, policies as well as license details.
User Database
The user database is used to hold user information. The user database can be integrated into the customer’s existing database server such as MS SQL, Oracle DB, Maria DB…etc.
Mobile App
The solution comes with an out of the box mobile app on Android and iOS available on the Google Play store and the Apple app store respectively. The mobile app is responsible for generating OTAC and enforcing an additional factor of authentication such as a PIN or device biometrics such as fingerprint and FaceID.
SDK
For customers who like more flexibility and integration, the OTAC auth MFA also provides SDK.
Application SDK
We provide an Application SDK in C++ that will allow customers to integrate user management and onboarding into their existing application.
Mobile SDK
We also provide a mobile SDK for Android and iOS to integrate the OTAC generation into their native mobile app.
Customer Deployment Examples
Customer A
One of the top-tier PLC manufacturers made a strategic decision to safeguard their PLCs using OTAC authentication with MFA. Now, every newly manufactured PLC comes equipped with OTAC auth MFA right out of the box—a smart move to enhance security for their customers. To seamlessly blend with their existing services, they opted for the Standalone deployment approach, integrating OTAC auth MFA as an embedded SDK.
Understanding Customer A’s Deployment and Installation Model:
1. User Interaction:
● When a user needs to log in to the engineering application, they are prompted for an entry code—the OTAC
2. OTAC Generation:
● Within their mobile app, we’ve embedded our mobile SDK.
● The user generates an OTAC using our mobile SDK. This OTAC serves as a secure token.
3. Connecting to the Engineering Application:
● Armed with the OTAC, the user then provides it to the engineering application.
● The engineering application establishes a connection via Modbus—a communication protocol—directly to the Security Service residing inside the PLC.
4. Security Service Handling:
● Inside the PLC, the Security Service extracts the OTAC.
● To ensure the user’s authenticity, the Security Service employs our Application SDK.
5. Validation and Authentication:
● Finally, the Application SDK validates and authenticates the user, granting access to the engineering application.
Customer B
Customer B wanted to fortify the security of existing PLCs for their valued customers. They opted for OTAC auth MFA in server deployment mode. Here’s the breakdown:
- Centralized Management: Customer B appreciated the centralized approach of OTAC auth MFA. It’s like having a vigilant guardian overseeing multiple PLCs simultaneously.
- Deployment Strategy: For this setup, they chose the server deployment route and to complete the picture, they went all-in with a full Software install.
Customer B’s PLCs come with their very own Web Management Portal (WMP)—a web portal to control and oversee the PLC. Here’s how it all unfolds:
1. User Interaction: When a user wants to access the WMP they are prompted for an entry code—the OTAC.
2. OTAC Generation: Our trusty standard mobile app (available on both Android and iOS) generates the OTAC.
3. Forwarding the Request: The user hands over the OTAC to the WMP. The WMP forwards the request to the Verification API running on the central server via a secure HTTPS channel.
4. The Verification: Once the OTAC has been verified it returns the result back to the PLC and to the WMP.
Customer C
Customer C, another leading PLC manufacturer, wanted to give their customers flexibility and a choice on whether to have OTAC auth MFA deployed in standalone mode running on each individual PLC or on a central server.
- Standalone Mode:
○ For customers with a small number of PLCs, they offered standalone mode.
○ Everything—OTAC auth MFA and all—runs directly on each individual PLC.
- Server Deployment:
○ Customers with larger deployments could choose server deployment.
○ In this setup, everything runs on a central server, and each PLC forwards authentication requests there.
Contact us today
Why swIDch
that provides all of the following features, tested and substantiated
by the University of Surrey technical report
sufficient to IDENTIFY user
and AUTHENTICATION
off-the-network environment
Single-step identification and authentication with the code alone. Include our biometric option and get single-step MFA. Vastly improved UX by removing steps.
OTAC is a dynamic code, which means the code is constantly changing. Eliminates all use of static information. Forget usernames and passwords forever. Vastly reduced workload for IT helpdesks.
No network connection required for generating OTAC, enabling uninterrupted use no matter where you are. No more waiting for additional tokens/OTPs and no need for heavy public key infrastructure (PKI).
Highly configurable code parameters and lightweight SDK/applet means wide range of deployment options on many devices across multiple sectors.