Air-gapped deployment with OAuth 2.0 sounds like a contradiction. By design, OAuth 2.0 assumes connectivity—redirects, token exchanges, and validation calls to an authorization server. But when your system is sealed from the internet, the rules change. The challenge is to keep the zero-trust security model of OAuth while operating in an isolated environment with no outbound or inbound external traffic.
The first step is rethinking the architecture. Instead of relying on a remote authorization server, you need an on-premises OAuth 2.0 authorization server deployed inside the air-gapped network. Every endpoint—from authorization to token issuance—lives within the same secured perimeter. This includes handling user consent flows locally, managing client registrations on-site, and enforcing the same scopes and claims you would use in a connected system.
Token security becomes even more important in an air-gapped setup. While the attack surface from the internet is zero, local compromise risks are higher if operational discipline slips. Short token lifetimes, strong cryptographic signing, and strict client authentication are essential. Using asymmetric keys allows you to rotate and audit without outside key distribution services.