The problem
Portability Is the Weakness
Bearer authentication is portable by design. Cookies and JWTs grant access to whoever presents them. Strong authentication — MFA, passkeys — verifies identity at login. It does not change what happens to the credential after issuance.
Session replay — reuse of valid authentication materials outside the origin that established them — is a recognized class of risk, with dedicated standards addressing sender-constrained authorization:
- OWASP Session Management Cheat Sheet
- OWASP API Security Top 10 – Broken Authentication
- NIST SP 800-63B – Digital Identity Guidelines
- RFC 9449 – OAuth 2.0 Demonstrating Proof-of-Possession (DPoP)
- RFC 8705 – OAuth 2.0 Mutual TLS Client Authentication and Certificate-Bound Access Tokens
Sender-constrained approaches exist. Adopting them requires identity provider cooperation and token format changes — which is why most deployed systems continue to rely on portable bearer semantics despite the documented guidance.
The gap
Authentication Proves Identity.
It Does Not Constrain Origin.
Existing controls protect the authentication flow. Plumbus protects the credential after authentication completes.
| Control | What it enforces | Prevents credential replay? |
|---|---|---|
| MFA | Identity at login | No |
| Passkeys / FIDO2 | Phishing-resistant identity at login | No |
| WAF / Anomaly Detection | Probabilistic signal analysis | No — heuristic, not deterministic |
| Plumbus | Deterministic origin enforcement per request | Yes |
The change
Authentication Materials Become Non-Portable
Authentication materials function as bearer tickets. Whoever holds them can use them from any origin. Exfiltration equals access.
Authentication materials are bound to the origin that established authentication. Requests from outside that origin are rejected before reaching application logic.
- Exfiltrated credentials cannot be replayed from a different origin
- Proof of possession is verified on every protected request — not only at login
- Enforcement is deterministic: cryptographic verification, not behavioral heuristics
- Works with existing tokens, cookies, and proprietary credentials as-is
Authentication proves identity.
Plumbus enforces origin continuity.
Standards alignment
Two Standards Define the Right Guarantee.
Plumbus Delivers Both Without Infrastructure Changes.
RFC 9449 (DPoP) is the published standard for sender-constrained token binding. RFC 9700 explicitly recommends it. Plumbus implements it.
Standard DPoP requires your identity provider to embed a public-key thumbprint in issued tokens and resource servers to validate that claim on every request. DPoP is also JWT-centric — systems using cookies or proprietary credentials must rework token issuance to participate.
Plumbus enforces the same cryptographic guarantee at the service boundary, treating existing authentication materials as opaque. The identity provider is never involved. Nothing in your authentication stack changes. It is a layered control, not a replacement.
RFC 8705 (Mutual TLS) is the certificate-based counterpart — sender constraint via client certificates rather than proof-of-possession tokens. Both are published standards. Both require infrastructure that most deployed systems do not have. Plumbus enforces the equivalent guarantee at the service boundary without either.
Deployment
One Sidecar. One Config File.
Plumbus is a reverse-proxy sidecar. It runs alongside your existing services — no application refactoring, no identity provider changes, no token format migration.
- One container — pull and run. Plumbus proxies traffic between clients and your backend.
- JSON configuration — specify which routes are enforced, the mode (Enforce / Monitor / Passthrough), and the signing key source.
- Secrets integration — reads signing keys from AWS Secrets Manager, GCP Secret Manager, or Azure Key Vault.
- Gradual rollout — start in Monitor mode to observe without affecting traffic. Promote to Enforce per route. Revert by changing one config field.
Typical proof of concept: two weeks.
Where it matters
Any Endpoint Where "The Token Was Valid"
Is Not an Acceptable Incident Report
- Administrative consoles and privileged access
- Financial transactions — withdrawals, transfers, billing
- API key issuance and credential management
- Actions that are irreversible or externally visible
- Any surface where WAF heuristics are insufficient and deterministic enforcement is required
Plumbus does not replace application authorization. It enforces that requests come from the authenticated origin before any application logic runs.
Scope
Plumbus Adds One Property.
Everything Else Is Unchanged.
- Not an identity provider or authorization server
- Not a replacement for MFA, passkeys, or SSO
- Does not issue, inspect, or modify authentication materials
- Does not introduce fingerprinting, device tracking, or behavioral profiling
- Does not alter application-level authentication or authorization logic
- Does not store session state or authentication materials server-side