Your VPN doesn't know who is connected. Zylock does.
Single binary. WireGuard speed. Complete audit trail.
Legacy VPNs are secure doors — anyone with the key can enter. Zylock is a secure door with a bouncer.
Everything you need to replace your legacy VPN. Nothing you don't.
OIDC/SSO integration with any provider (Google, Microsoft, Okta). Admin approval workflow. Know exactly who is connected.
Mutual TLS certificates bound to each device. Cryptographic device identity, not just network location.
Modern kernel-space encryption. High throughput, low latency, resistant to network scanning.
Immutable append-only logs. Every login, every approval, every revocation. Compliance-ready.
Server and agent in one executable. All assets embedded. No runtime dependencies. Air-gap ready.
Terminate sessions immediately from the dashboard. No waiting for token expiry. True Zero Trust.
From login to connection in five steps. No shared credentials. No credential files.
Google, Microsoft, Okta — any OIDC provider. MFA enforced by your IdP.
New users appear in dashboard. One-click approval with full audit trail.
Receives mTLS certificate and WireGuard keys. Device identity is cryptographically bound.
Kernel-space tunnel established. Every heartbeat is mutually authenticated.
See who's connected, from where, when. Revoke access instantly if needed.
No per-seat fees. No usage limits. No surprises.
Community Edition is not a trial — it's a fully functional, secure product.
Commercial License adds compliance and operational features for production use.
How Zylock compares to other approaches.
| Capability | Zylock | Tailscale | OpenVPN | Traditional VPN |
|---|---|---|---|---|
| Self-hosted | ✓ 100% | ✕ Coordination server | ✓ | ✓ |
| Identity/SSO | ✓ Any OIDC | ✓ | ✕ Certs only | ✕ Shared keys |
| Audit trail | ✓ Built-in | ✓ Enterprise | ✕ Manual | ✕ |
| Protocol | WireGuard | WireGuard | OpenVPN | IPsec |
| Deployment | Single binary | Agent + SaaS | Complex | Appliance |
| Air-gap ready | ✓ | ✕ | ✓ | ✓ |
| Instant revocation | ✓ | ✓ | ✕ | ✕ |
Assume failure. Design around it.
Single binary deployment. No containers. No orchestration.
# Download the latest release curl -LO https://github.com/zylock-security/zylock/releases/latest/download/zylock-linux # Make executable chmod +x zylock-linux # Initialize the server (interactive wizard) sudo ./zylock-linux server init
The wizard will prompt for master key, admin credentials, and OIDC configuration.
sudo ./zylock-linux server # Dashboard available at https://your-server:8443
# On Windows client .\zylock.exe connect login --server https://vpn.yourcompany.com:8443 \ --ca-cert .\zylock-ca.pem \ --ca-fingerprint <SHA256> # Browser opens for SSO login # Paste enrollment token when prompted # VPN tunnel established automatically
# Make connection persistent across reboots
.\zylock.exe connect service install
.\zylock.exe connect service start