Industrial Control Systems IDentity


  1. Connecting to the VPN
  2. Configuring the software and hardware either onsite or in the cloud

Security, Scalability and Audit compliance are the core of IXID.


By having a central source for a users password, you create an account for a user once. Providing them access to equipment involves logging into the site specific Keycloak and assigning them the Group or Role.

Additionally if a users account is compromised and their password is stolen, they reset it once and all sites are immediately updated. The old credential will no longer work in any hardware or software.


Our product aims to handle all authentication, from when the user logs on to the VPN to when they login to a device on site we log every authentication attempt for auditing.

Additionally we log when a user is added or removed from a group/role - effectively we can use this to audit the admin actions for what users they give access to what services.

Complete Operation

The design of IXID means that each site is fully independent of cloud infrastructure for operation. Each site is fully equipped with an onsite replica of the IdP, allowing for local operation in case of any outages.

An engineer that is physically on site can continue to operate the plant.

The OpusV Promise

You can rely on us for the following:

  • Take time to listen to your team and understand your needs
  • Genuinely care about your business and its' success
  • Build solutions to be as simple and efficient as possible
  • Help you better understand your options at each stage
  • Always seek to save you time and money
  • Proactively update you about new technologies or solutions that may boost your business

Contact Us

To talk more, please don't hesitate to fill out the form, give us a call, or send us an email.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.