๐๏ธ Definitions
Understand key terms in Securosys365 DKE such as tenants, organization units, vaults, apps, keys, roles, and conditional access policies for secure key management.
๐๏ธ Key Management
Learn how to manage HSM-protected keys with Securosys365 DKE create, block, delete keys, and generate attestations following NIST SP 800-57 standards.
๐๏ธ User Management
Learn how to manage users and roles in Securosys365 DKE. Invite, restrict, or delete users, assign roles, and configure two-factor authentication securely.
๐๏ธ Authentication
Learn how to set up authentication in Securosys365 DKE, including two-factor authentication (2FA) and Azure AD identity provider integration.
๐๏ธ Role Based Access Control
Role Based Access Control
๐๏ธ Log Management
Learn how to configure log management in Securosys365 DKE with Splunk integration. Set up Syslog, enable audit logging, and manage security event records.
๐๏ธ Key Rollover
Learn how to handle DKE key rollover in Securosys365, apply manual or automated file labeling before migration, and overcome PowerShell challenges.
๐๏ธ URL Whitelist
Find the required URLs to whitelist for using Securosys365 Cockpit and DKE Web Service in hardened environments with strict firewall policies.
๐๏ธ B2B Collaboration
Learn how to configure B2B collaboration in Securosys365 DKE with Azure multitenant apps, external identities, and cross-tenant access for shared labels.
๐๏ธ PDF Protection
Learn how to configure Adobe Acrobat with Securosys365 DKE.