Public beta scope: AD workflows have real-system path validation, but NOBA is still under active verification. Treat compliance evidence and self-healing claims as evaluation surfaces unless the source and configured state are shown. Read validation boundaries.

Open Beta

NOBA is live in beta. Core migration flows have been validated across two real remote locations over WAN/ISP links using four Proxmox hosts, four AD environments, and an Azure dev tenant; the next phase is broader customer-scale validation.

Who should talk to us

Design partners with hard infrastructure.

The best fit is a team willing to evaluate NOBA against larger real operational workflows, not just a polished demo dataset.

Directory migration teams

Hybrid AD / Entra, Samba or LDAP edge cases, M&A domain merges, cross-domain reconciliation, LAPS/BitLocker coverage, and compliance-evidence expectations.

Infrastructure operators

Remote agents, service control, endpoint monitoring, self-healing trust levels, approval gates, maintenance windows, and incident-response workflows.

Security-minded admins

SAML/OIDC, SCIM, WebAuthn, RBAC, audit trails, retention, SIEM/OTel export, vault controls, backups, updater posture, and procurement questions.

What to expect

Transparent beta boundaries.

What can be evaluated

The command center, enterprise identity surfaces, agents, audit/evidence flows, AD project workflows, downloads/updater path, and interactive demos are exposed for technical evaluation.

What we want validated

Larger scale, messy directory topology, real firewall/DNS constraints, migration edge cases, operator workflows, compliance-evidence expectations, and go-live expectations. See what has already been exercised in the validation topology.

How to evaluate safely

Start with the mock-data demo, then reproduce the flow in your own lab, then use dry-run workflows and explicit rollback plans before any production cutover.

AD validation

Real path coverage, not scale theater.

AD integration has been exercised against real Samba AD, Windows Server 2025 AD, and Azure AD / Entra ID surfaces across a 2-site, 4-Proxmox-host topology. Current evidence supports workflow path coverage; larger-volume validation depends on customer or design-partner infrastructure.

Directory paths

LDAP-to-LDAP, Azure-to-LDAP, LDAP-to-Azure, sync, migration, acquisition, reconciliation, pre-flight, and authentication verification paths have evidence in the AD PoC.

AD edge cases

Server 2025 LDAPS, Windows LAPS, PSOs, nested groups, tombstones, AdminCount/AdminSDHolder, service-account SPNs, and Azure eventual consistency were exercised or explicitly bounded.

Boundary

This is real-system validation at small load, including 100-user throughput runs on the SQLite-backed beta profile while the 4-host lab also carried cross-site AD testing. PostgreSQL and Redis-backed caching are available for heavier deployments, but multi-thousand-user evidence still needs customer-scale infrastructure.

Read AD validation evidence
Current recovery work

Closing honesty gaps and wiring the remaining edges.

The latest enterprise changelog entries show two things happening in parallel: the remaining honesty gaps are being closed explicitly, and the integration surface is being wired through to real implementations and live-test coverage instead of placeholder success states.

What landed

The latest releases closed concrete honesty gaps: Trust Center and health scoring now treat missing or failed evidence as unknown instead of green, workflow runs return a real run_id, SIEM forwarding re-enqueues failed batches with durability counters, backup metadata reports real PostgreSQL/MySQL values, and WebAuthn plus SAML validation paths were hardened.

What changed operationally

The integration surface is no longer mostly aspirational wiring. The changelog now records a live test harness for real instances, execute-op retrofits for older modules, and full implementations replacing the last placeholder modules across security, surveillance, file-sync, NAS, hypervisor, and identity categories. Live testing is now actively finding and fixing real bugs that mocks did not catch.

What still needs closure

The changelog still calls out bounded gaps where evidence is not there yet: some platforms remain explicitly UNVERIFIED or unsupported, and the public beta copy stays limited to what the current app, live tests, and documented evidence can actually support.

Start here

Pick the path that matches your risk.

Evaluate AD migration flow

Walk the cross-domain flow with mock data before connecting real directories.

Read architecture and updater path

Review deployment boundaries, agent data flow, security model, and release infrastructure.

Review tested topology

Understand the real remote lab coverage before planning your own customer-scale validation.

Run your own lab install

Install the beta build in a controlled environment and compare it against your own topology and constraints.

Want to follow beta updates or talk about validation?

You're on the list.

Start a technical discussion