🔐

Cryptographic Security

Enterprise-grade cryptographic protection ensures your data remains secure, authentic, and tamper-proof throughout its entire lifecycle.

Multiple Cryptographic Algorithms

ED25519

Edwards-curve Digital Signature Algorithm

  • Fast signature generation and verification
  • 256-bit security level
  • Resistant to timing attacks
  • Ideal for high-throughput scenarios

NISTP256

NIST P-256 Elliptic Curve

  • FIPS 186-4 compliant
  • Widely supported standard
  • 128-bit security strength
  • Best for regulatory compliance

RSA4096

4096-bit RSA Encryption

  • Maximum security for sensitive data
  • Industry-proven reliability
  • Long-term security guarantee
  • Compatible with legacy systems

Comprehensive Security Features

🔑

Key Management

Automated key generation, secure storage, and rotation policies. Support for Hardware Security Modules (HSM) and key escrow.

✍️

Digital Signatures

Sign data at any point in your pipeline to ensure authenticity and detect tampering. Verify signatures before processing.

🔒

Transaction Security

Every transaction is cryptographically secured with immutable records and verifiable proof of execution.

📝

Audit Trail

Complete audit logs with cryptographic signatures ensure non-repudiation and compliance with regulatory requirements.

🎯

Visual Blueprint Designer

Design complex data workflows visually with our intuitive Blazor WebAssembly interface. No code required for basic flows, yet powerful enough for advanced scenarios.

Drag & Drop Interface

Intuitive visual editor lets you build workflows by dragging components onto the canvas and connecting them together.

Real-Time Validation

Instant feedback as you design. Catch errors before deployment with schema validation and connection checks.

Template Library

Start with pre-built templates for common scenarios. Customize and save your own templates for reuse.

Version Control

Track changes to your blueprints over time. Rollback to previous versions and compare differences.

Collaborative Design

Share blueprints with your team. Comment, review, and approve changes before deployment.

Export & Import

Export blueprints as JSON or code. Import existing configurations and migrate between environments.

⚙️

Fluent API for Developers

Powerful C# fluent API provides a type-safe, IntelliSense-enabled development experience for programmatic blueprint creation.

Type-Safe Blueprint Construction

var dataFlow = Blueprint.Create("CustomerDataPipeline")
    // Define data source
    .AddSource<CustomerData>(config => config
        .FromDatabase("CustomerDB")
        .WithPolling(TimeSpan.FromMinutes(5)))

    // Transform and validate
    .Transform<CustomerData, EnrichedCustomer>(data =>
        data.EnrichWithExternalData()
            .ValidateAgainstSchema())

    // Apply cryptographic security
    .Sign(signature => signature
        .WithAlgorithm(CryptoAlgorithm.ED25519)
        .UsingKey("customer-signing-key"))

    // Route based on conditions
    .Route(routing => routing
        .When(c => c.Region == "EU")
            .ToDestination("EU-DataLake")
        .When(c => c.Region == "US")
            .ToDestination("US-DataLake")
        .Otherwise()
            .ToDestination("Global-DataLake"))

    // Error handling
    .OnError(error => error
        .Log()
        .RetryWithBackoff(maxAttempts: 3)
        .FallbackTo("ErrorQueue"))

    .Build();

API Capabilities

IntelliSense Support

Full IDE support with auto-completion and inline documentation

Type Safety

Compile-time validation prevents runtime errors

Extensible

Create custom transforms, validators, and destinations

Testable

Unit test your blueprints with built-in testing utilities

☁️

Cloud-Native Architecture

Built on .NET Aspire with microservices patterns, YARP-based API gateway, and support for modern cloud deployment scenarios.

.NET Aspire Integration

Leverages .NET Aspire for cloud-native development with built-in observability, service discovery, and resilience patterns.

YARP API Gateway

High-performance reverse proxy for intelligent routing, load balancing, and API composition across microservices.

Microservices Ready

Deploy as independent services that scale horizontally. Each blueprint can run in its own isolated container.

Container Support

Docker and Kubernetes ready with health checks, graceful shutdown, and configuration management.

Observability

OpenTelemetry integration for distributed tracing, metrics, and logging across your entire data flow.

Resilience Patterns

Built-in circuit breakers, retries, timeouts, and fallback mechanisms ensure reliability at scale.

📊

Schema Management & Validation

Robust schema validation and evolution ensures data integrity and compatibility across your entire pipeline.

📋

Schema Definition

Define schemas using JSON Schema, Avro, or Protocol Buffers. Version your schemas and track evolution over time.

Runtime Validation

Validate data against schemas at runtime with detailed error reporting and automatic rejection of invalid data.

🔄

Schema Evolution

Manage breaking and non-breaking changes with versioning. Automatic compatibility checks prevent deployment issues.

🔗

Schema Registry

Centralized schema registry for sharing schemas across teams and applications with access control.

Experience These Features Today

Start building secure, scalable data flows with Sorcha