Home » Sphereon EDK (Enterprise Developer Kit)

Sphereon EDK
Enterprise Development Kit

Deploy secure, production-ready infrastructure for credential enforcement.

The Enterprise Development Kit (EDK) provides the containerized runtimes, secure key management, and policy enforcement engines required for high-assurance environments.

While the IDK provides core libraries, the EDK is built for engineering teams who need to deploy secure, scalable infrastructure for real-time safety enforcement and compliance.

By integrating with HSMs and QTSPs, the EDK ensures your trust architecture is auditable, NIS2 compliant, and ready for production-grade duty of care.

VIEW DOCUMENTATION

Explore Identity Development Kit →

Core technical capabilities

Production-grade runtimes

Deployable, containerized environments designed for high-availability production use. Includes pre-configured persistence layers and administrative interfaces to manage the lifecycle of your identity infrastructure.

Enterprise key management

Move beyond local software keys. The EDK integrates natively with Hardware Security Modules (HSMs) and Qualified Trust Service Providers (QTSPs) to provide legally binding signatures and secure key custody.

Dynamic policy enforcement

Configure complex business and safety rules that are evaluated in real-time. Return secure “Go/No-go” decisions directly to machine controllers, access points, or enterprise applications.

Auditable evidence generation

Satisfy NIS2 and regulatory requirements with automated, immutable audit trails. Every decision is recorded with cryptographic proof, providing a defensible record for insurance and compliance.

From deployment to enforcement: how it works.

1. Deploy

Launch the containerized EDK runtime within your secure cloud or on-premise infrastructure.

This establishes the scalable backbone of your trust architecture, including pre-configured database adapters and administrative interfaces.

2. Secure

Integrate with enterprise key management systems, HSMs, or Qualified Trust Service Providers.

Ensure that all credential operations meet legal and regulatory standards for high-assurance environments through secure, hardware-backed key custody.

3. Define

Configure the policy engine with your specific business, safety, or compliance rules.

Define the requirements for access—such as valid certifications or site inductions—that must be met before a digital or physical action is authorized.

4. Enforce

Enable real-time decision making based on set policies at the point of access or transaction.

The EDK evaluates incoming proofs against your active policies to return an immediate, cryptographically signed “Go/No-go” decision to your systems.

Ready to secure your production infrastructure?

Speak with our team to see how the EDK provides the enforcement layer for your industrial safety, workforce compliance, or high-assurance credential pilots.

TALK TO AN EXPERT

Logo Sphereon

Sorry

De versie van de browser die je gebruikt is verouderd en wordt niet ondersteund.
Upgrade je browser om de website optimaal te gebruiken.