FIG — Mesh authentication compared

Same topology. Different identity model.

An eight-service mesh, authenticated two ways. Both panels show identical connectivity. The difference is what each model has to manage to make it work — and what happens when one node is compromised.

Bearer-credential model
API keys
0 stored secrets
8 services
Each glyph is one stored API key — provisioned per service pair, per direction
Cryptographic identity
xBind ACIs
0 identities
8 services
One DID per service — the identity itself Each pulse is one signed message — verified per-message, not per-connection
Scene 1 / 4 · Topology
Connection (mesh edge — same on both sides)
Compromise event (Scene 4)