Securing NodeJS Applications

An Introduction to the OpenZiti SDK for NodeJS

Curt Tudor's photo
Curt Tudor
·Sep 28, 2022·

9 min read

Securing NodeJS Applications

Subscribe to our newsletter and never miss any upcoming articles

Play this article

Table of contents


If you are a NodeJS app developer or DevSecOps practitioner, and application security and business agility is important to you, then you're in the right place.

Here I will take the abstract notion of app-embedded zero trust, and show you how OpenZiti uniquely positions you to achieve it in your NodeJS applications.

So as our mascot Ziggy would say...

Let's get cookin' !
How to secure NodeJS apps

In case you haven't heard, OpenZiti is a free, open source project, focused on bringing zero trust networking to any application.

OpenZiti provides a best-in-class overlay network and numerous SDKs making it easy to embed secure connectivity directly into your app, without exposing incoming ports to the internet, and without VPNs!

OpenZiti is referred to as an overlay network because it provides secure connectivity on top – or “overlaying” – existing networking infrastructure, like the internet.

Everything is based on trusted identity, and we take it a step further by providing identity-specific end-to-end encryption, even before we do mTLS.

Here's an overview of an OpenZiti network:


If you want to learn more about what an OpenZiti network is, and the various ways we make it programmable, we invite you to visit our main OpenZiti documentation site.

It's important to know that you can incrementally implement your rollout of OpenZiti.

You can begin by running our Ziti Desktop Edge (or Mobile Edge) software on your client (we have versions for Mac, Windows, and Linux).

That approach would look like this:


Once you're up, running, and comfortable with your OpenZiti network, you would then work towards the ultimate goal of having app-embedded zero trust networking built directly into both your client and server software, by using our OpenZiti SDKs.

That would look like this:


No more need to run VPN-like OpenZiti edge software.


The OpenZiti SDK for NodeJS is published to NPM, and it's now waiting for you.

Our DevX philosophy is to always eliminate as much friction as we can, so we made it possible for you to install the OpenZiti SDK for NodeJS just like you would any other package, via:

npm i @openziti/ziti-sdk-nodejs


yarn add @openziti/ziti-sdk-nodejs

Simple. Straightforward. Familiar.

Native Addon

The OpenZiti SDK for NodeJS is implemented as a NodeJS Addon (a.k.a. "Native Addon", a.k.a. "Native Module").

This is why our NodeJS SDK is actually implemented in C. Here's how GitHub breaks it down:


Internally, the OpenZiti SDK for NodeJS embeds the OpenZiti SDK for C-language.

The core OpenZiti capabilities (e.g. identity enrollment, communications with OpenZiti control-plane, etc.) within our C-SDK are wrapped by our NodeJS-SDK, and that core power is then exposed to NodeJS apps at the JavaScript language level.

Beyond these core OpenZiti capabilities, additional capabilities exist within the OpenZiti SDK for NodeJS that are specific to the types of web server frameworks that reside in the NodeJS ecosystem (more on that below).


The OpenZiti SDK for NodeJS leverages the N-API (an abstraction of the underlying V8 JavaScript engine).

Details surrounding the N-API are beyond the scope of this article, but if you're curious about architectural structure and flow and about what actually happens when your NodeJS code calls one of our APIs, like ziti_dial for example, take a peek at the following diagram:


We'll cover this in greater detail in future articles.


You might be wondering:

Hey wait... if this SDK is implemented in C language code, does that mean it needs to be compiled when I install it? Am I at risk of being dragged into a quagmire of compiler/linker tooling nightmares


There is no need for install-time compilation of the OpenZiti SDK for NodeJS.

We did the heavy-lifting for you ahead of time (...again, to reduce friction).

We baked some special sauce into the @openziti/ziti-sdk-nodejs npm package that executes during the npm i (or yarn add) command.

These mechanisms will dynamically determine what OS you are using, what NodeJS version you are using, and what CPU Architecture you are using, and it will then automatically download a pre-built binary (that we publish during our SDK release process).

The binary that is installed for you is the one that is suitable for the environment where you are doing the install.


Server-side web application platform support

There are many server-side web application platforms built upon NodeJS. You may be using one of them and wonder whether these platforms are supported by the OpenZiti SDK for NodeJS.

Spoiler alert... the answer is yes!



Except for a couple JavaScript-related server-side frameworks (circled above in red), all others are currently supported by the OpenZiti SDK for NodeJS.

Note that one of my upcoming blog articles will do a deep technical dive into the underpinnings of the OpenZiti NodeJS SDK, how it transparently integrates with ExpressJS, and how with just a couple lines of code the SDK makes it trivial for a Node/Express web server to host a Ziti service and listen for incoming Ziti connections instead of listening on a port open to the internet. Be sure to subscribe to this blog to to ensure you won't miss these further educational materials

Basic usage

The OpenZiti SDK for NodeJS can be used with apps written in the CJS style as well as the more modern ESM style.

Some code snippets below are crafted as CJS, and some as ESM, to illustrate differences in coding style.

Importing the SDK


const ziti = require('@openziti/ziti-sdk-nodejs');


import ziti from '@openziti/ziti-sdk-nodejs';

Identity enrollment

Once you have created an OpenZiti enrollment token, it is easy to perform the enrollment, and create an OpenZiti Network Identity from the enrollment token, using the ziti_enroll API, as shown in the demo app below:


import fs from 'fs';
import ziti from '@openziti/ziti-sdk-nodejs';

const ziti_enroll = async (jwt_path) => {
    return new Promise((resolve, reject) => {
        let rc = ziti.ziti_enroll(jwt_path, (data) => {
            if (data.identity) {
            } else {

let jwt_path = process.argv[2];

console.log('Specified Enrollment JWT is (%o)', jwt_path);

let data = await ziti_enroll(jwt_path).catch((data) => {
    console.log('Enroll failed with error (%o)', data);

if (data) {
    console.log("data is:\n\n%s", data);

    if (data.identity) {
        fs.writeFileSync('identity.json', data.identity);


You would run the above app like this:

node index.js path/to/enrollment.jwt

If the enrollment JWT file is valid (e.g. unexpired, not enrolled previously, etc.), then the app will write the OpenZiti Identity file in the local directory with the name identity.json.

Authenticate with Control Plane

Authenticating your client or server app onto the OpenZiti network is done via the init API.

In the snippet below, let's assume you exported the path to the identity.json file created in the above example into an env var named ZITI_IDENTITY_FILE.

With that in place, network authentication is one API call away, as shown here:

// Somehow provide path to identity file, e.g. via env var
const zitiIdentityFile  = process.env.ZITI_IDENTITY_FILE;
// Authenticate ourselves onto the Ziti network
await ziti.init( zitiIdentityFile )
  .catch(( err ) => { /* probably exit */ });

Following that, you're now free to read and write data across the network, as discussed below.

Make a client-side REST call to a dark service

Once your OpenZiti network has been configured with a service, your NodeJS app can make REST calls to it.

Let's assume there is a web server on your network, and it is represented by the OpenZiti Service name myDarkWebService. You'd make REST calls to that service from your NodeJS app like this:

const on_resp_data = ( obj ) => {
    console.log(`response is: ${obj.body.toString('utf8')}`);

// Perform an HTTP GET request to a dark OpenZiti web service
  '/',              // path
  ['Accept: application/json' ], // headers
  undefined,        // optional on_req cb 
  undefined,        // optional on_req_data cb
  on_resp_data      // optional on_resp_data cb

The above example used GET, but POST operations, and all other REST verbs, are supported too.

Host a server-side OpenZiti service

If you have a NodeJS/ExpressJS web server, and you want to make it dark to the internet, we have you covered.

Here is how things are traditionally done (without OpenZiti), which involve the risks of opening a TCP port to the internet, and listening for insecure, unauthenticated incoming connections:

import express from 'express';
let app = express();
app.listen(myExposedTCPport, function() { ... }

The attack vector above can be easily eliminated with OpenZiti.

Here is how things are done with the OpenZiti NodeJS SDK, involving none of the risks of opening an insecure TCP port to the internet, and instead, listening only for pre-authenticated, secure, trusted OpenZiti connections:

import express from 'express';
let app = express, zitiServiceName );//<-easy peasy
app.listen(ignored, function() { ... }

That's right.

With only a single-line code change (the call), your web server is now capable of being dark on the internet.

Nothing else in your existing ExpressJS web server code needs to change!

Existing routing, middleware, etc., all operates the same as it always did... but now you enjoy the comfort of knowing that if a connection comes in, it is from a trusted identity on the client side.

No malicious actors can see your dark web server, and thus, no malicious actors can attack it.

Next Steps

The API exposed by the OpenZiti NodeJS SDK extends beyond the examples rendered above, so we encourage you to come explore the repo.

Projects using this SDK

You might also want to check out a couple of our projects that use the OpenZiti NodeJS SDK (yes, we use OpenZiti, to build more OpenZiti):

  • Call a Dark Webhook from GitHub Actions (Ziti Webhook Action). We self-host a dark instance of Mattermost) at our company, and this webhook tooling is a way we securely allow our GitHub Actions CI pipelines to post status messages to developer-oriented notification channels on a Mattermost app that would otherwise be inaccessible to the GitHub runners.

  • Zitified Ziti Admin Console, optionally capable of hosting a Ziti service.

Connect with us

We'd love to hear from you about your NodeJS-based applications and whether or not you decide OpenZiti is the right fit to secure them, so please join us and your peers in conversation:

We are here to help.

Also feel free to leave us comments or questions below, right here on this article.

Share this