Skip to main content

Features

This page gives an overview of the features available in the Securosys Key Manager UI.

Dashboard

The dashboard provides a real-time overview of the HSM state, including key and certificate counts by type, storage utilization, HSM vendor and version information, and a compliance alert summary.

Screenshot of the Dashboard

FeatureDescription
Key & Certificate MetricsTotal keys, certificates, private keys, secret keys, data objects, and invalidated keys at a glance.
HSM InformationVendor, API version, active partition, and HSM system time.
Keystore OverviewVisual distribution of key types (private, secret, public, certificates).
Storage MonitoringUsed, available, and maximum HSM storage with color-coded capacity indicators.
Compliance InsightsSummary of compliance alerts by severity (critical, warning, info) with direct link to the Compliance module.
License StatusDisplay of enabled HSM client flags and feature availability.

General

These features cover the foundational aspects of the Key Manager UI, including how users authenticate, manage secrets, and work in a multi-tenant environment.

FeatureDescription
AuthenticationSupports OAuth 2.0 via Microsoft Entra ID, GitHub, Keycloak, and local HSM Authentication with optional TOTP-based two-factor authentication.
Role-Based Access ControlThree roles - Admin (full access, user management), User (standard operations), Readonly (read-only access).
Secrets ManagementCreate and manage HSM data objects alongside cryptographic keys.
Multi-Tenancy SupportPartition-based isolation with runtime partition switching. Per-user credentials stored in HSM data objects, Azure Key Vault, or GCP Secret Manager.
Multi-LanguageAvailable in English and German with runtime language switching.
API Access KeysManage Key Management, Approver Management, and Service API keys from the Security Settings page.

Key Management

Key management capabilities allow users to create, inspect, modify, and lifecycle-manage cryptographic keys. This includes symmetric, asymmetric, and post-quantum algorithms, as well as policies, attestation, and secure deletion.

Screenshot of the Keys Dashboard

FeatureDescription
Create SymmetricAES, Camellia, ChaCha20, TDEA, HMACSHA256
Create AsymmetricRSA, DSA, ECDSA, EdDSA, BLS, ISS
Create Post-QuantumML-DSA, ML-KEM, SLH-DSA, LMS
Key PolicyRule Use, Block, Unblock, Modify
InspectAlgorithm, Key Usage Count, Status, Created, OIDs, Size, Certificate, Attributes, Key Policy
ModifyAttributes, Policies, Password, Rename
ExportPKCS12, Plain, XPUB
ImportPrivateKey, PublicKey, SecretKey, PKCS12, Seed, xPub (available formats vary by algorithm)
DeriveEC, ED (BIP32 derivation)
RotateSymmetric, Asymmetric (with optional certificate rollover: self-signed, CSR-based, or certificate import)
AttestationGenerate and verify key origin
DeleteSecure deletion and decommissioning of keys (single and bulk)

Screenshot of the Create Key dialog

Certificate Management

Certificate management provides tools to create, issue, import, and securely manage certificates for cryptographic operations, ensuring trust and authenticity in digital communication.

Screenshot of the Certificate Management view

FeatureDescription
Create Self-SignedCreate self-signed certificates with Validity, Standard Certificate Attributes, Key Usage, Extended Key Usage, Subject Alternative Name, and Certificate Authority
Create IssuedIssue certificates with Validity, Standard Certificate Attributes, Key Usage, Extended Key Usage, Subject Alternative Name, and Certificate Authority
Generate CSRCreate Certificate Signing Requests (CSRs) with Validity, Standard Certificate Attributes, Key Usage, Extended Key Usage, Subject Alternative Name
Certificate ProfilesBuilt-in profiles (WebServer TLS, Client Authentication, Code Signing, CA Certificate) and custom profile creation for streamlined certificate issuance
ImportImport existing certificates into the HSM
DeleteSecurely delete certificates from the HSM

KMIP User Management

The Key Manager UI includes management of KMIP users, enabling secure generation of mTLS authentication and certificate-based access control.

FeatureDescription
Create KMIP UserCreate a KMIP user with mTLS certificate & private-key export (PKCS12)
Delete KMIP UserSecurely remove a KMIP user from the system

Approver Management

Approver management enables fine-grained access control for critical workflows using SKA policies, including onboarding and managing approvers together with the Securosys Authorization App.

FeatureDescription
View Approver StatusCheck approver status (ONBOARDED, PENDING)
Create ApproverRegister a new approver for SKA workflows
Onboard ApproverEnroll approvers via QR code with the Securosys Authorization App
Renew One-Time CodeGenerate a new one-time code for the Securosys Authorization App
Delete ApproverRemove an approver from the system
SKA ProfilesCreate and manage custom approval policy profiles with configurable approval groups, quorum (M-of-N), timelock, and timeout constraints

User Management

The Security tab gives options to users and administrators on managing their own or other users' accounts.

FeatureDescription
User DetailsAn overview of the logged in user, including Role, 2FA status and last login
Two-Factor AuthenticationEnable or disable TOTP-based 2FA for your own user, with QR code enrollment for authenticator apps (Google Authenticator, Authy)
User ManagementCreation of new users, role assignment (Admin, User, Readonly), and enable/disable accounts - Available only for Administrators

Discovery

The Discovery tab scans preconfigured hosts to identify existing TLS certificates and evaluate their security posture.

Screenshot of the Discovery view

FeatureDescription
Certificate ScanningScan configured hosts and subnets for TLS certificates with expiration tracking
TLS Version CheckDetect weak TLS versions (SSLv2, SSLv3, TLS 1.0, TLS 1.1)
Cipher Suite ValidationFlag weak cipher suites (RC4, DES, 3DES, NULL, etc.)
Forward SecrecyCheck for ECDHE/DHE support
Self-Signed DetectionIdentify self-signed certificates

Compliance

The Compliance module provides cryptographic posture assessment, regulatory compliance checks, and HSM partition log analysis.

Screenshot of the Compliance view

FeatureDescription
PQC Readiness AssessmentClassify keys as quantum-safe, quantum-vulnerable, or quantum-resistant with migration recommendations
Regulatory ComplianceAssess key and certificate compliance against NIST SP 800-56B, NIST SP 800-131A, ISO/IEC 27001, and BSI TR-02102
Certificate Expiration MonitoringDetect upcoming certificate expirations and key age violations
Log AnalysisStructured HSM partition log viewer with audit dashboards, key-usage analytics (sign/verify/encrypt/decrypt/wrap/unwrap), and anomaly detection

Self-Test

The Self-Test module validates cryptographic operations across all supported algorithms to ensure correct HSM functionality.

FeatureDescription
Algorithm ValidationTest key creation, signing, verification, encryption, decryption, and wrap/unwrap across RSA, AES, EC, EdDSA, and all PQC algorithms
Key Derivation TestValidate BIP32 master key creation and child key derivation
Certificate OperationsTest CSR generation, self-signed certificate creation, and certificate signing
Approver OperationsValidate approver creation and SKA workflow operations

AI Chat Assistant

The optional Chat Assistant provides natural language interaction with HSM operations via the Model Context Protocol (MCP).

FeatureDescription
LLM Provider SupportConfigurable providers: Anthropic Claude, OpenAI GPT, Google Gemini, and local LLMs (Ollama, LM Studio, vLLM)
Context-Aware AssistanceSuggestions based on available keys, certificates, and HSM state
Runtime Provider SwitchingSwitch between LLM providers without restarting the application
Get started withCloudHSM for free.
Other questions?Ask Sales.
Feedback
Need help?