📄️ Definitions
Understand key terms in Securosys365 DKE such as tenants, organization units, vaults, apps, keys, roles, and conditional access policies for secure key management.
📄️ Key Management
Learn how to manage HSM-protected keys with Securosys365 DKE create, block, delete keys, and generate attestations following NIST SP 800-57 standards.
📄️ User Management
Learn how to manage users and roles in Securosys365 DKE. Invite, restrict, or delete users, assign roles, and configure two-factor authentication securely.
📄️ Authentication
Learn how to set up authentication in Securosys365 DKE, including two-factor authentication (2FA) and Azure AD identity provider integration.
📄️ Role Based Access Control
Role Based Access Control
📄️ Log Management
Learn how to configure log management in Securosys365 DKE with Splunk integration. Set up Syslog, enable audit logging, and manage security event records.
📄️ Key Rollover
Learn how to handle DKE key rollover in Securosys365, apply manual or automated file labeling before migration, and overcome PowerShell challenges.
📄️ URL Whitelist
Find the required URLs to whitelist for using Securosys365 Cockpit and DKE Web Service in hardened environments with strict firewall policies.
📄️ B2B Collaboration
Learn how to configure B2B collaboration in Securosys365 DKE with Azure multitenant apps, external identities, and cross-tenant access for shared labels.