Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
FIDODemo-UserGuide.pdf | 2016-10-13 | 2.1 MB | |
SAKA30-ReleaseNotes.pdf | 2016-10-13 | 539.3 kB | |
skcc-v2.0-build-130.zip | 2016-10-13 | 15.5 MB | |
skcc-src-v2.0-build-130.zip | 2016-10-13 | 1.6 MB | |
README-skcc-v2.0-build-130.txt | 2016-10-13 | 3.1 kB | |
Totals: 5 Items | 19.7 MB | 0 |
StrongKey CryptoCabinet - from StrongAuth, Inc. ----------------------------------------------- This is the 2.0 release of the StrongKey CryptoCabinet (SKCC), a web-application that allows you to encrypt files and store them in public or private clouds. This build (130) makes minor changes to adapt to the modified FIDO U2F JavaScript 1.1 RD: https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-javascript-api.html What makes the SKCC special from other cloud-encryption software? - It stores files on AWS S3, Microsoft Azure or Eucalyptus Walrus based cloud-storage - you can choose which cloud at encrypt-time; - It uses the StrongKey CryptoEngine (sourceforge.net/projects/skce) to escrow keys in an on-premises, centralized key-management system (StrongAuth KeyAppliance); - It allows specifying who can decrypt the file(s) from LDAP groups - either Micorsoft AD or other LDAP Directories; - Since the encrypted-file's metadata contains authorization information for decryption, it digitally signs encrypted-file metadata to ensure the file hasn't been tampered with after encryption - the signing key can be on a FIPS 140-2 certified hardware security module, if desired, or a software-based JCEKS keystore; - It is FIDO U2F-enabled. You can register your FIDO U2F token with the application and use it strongly-authenticate to the web-app. It uses our open-source FIDO Certified U2F server (see URL above); - It can use FIDO U2F "authorization" from a user's hardware Token before decrypting files, for stronger security; and - ....more. The SHA256 digests of the files are: a55b984118aca635613c0c709b42993a801536f044c7dedef8cb10ddc1ae6fe1 skcc-src-v2.0-build-130.zip 2aae5eeb1adbf4006a91ec47f22099c9269ed9b8cb26c1195304f4f092489d6d skcc-v2.0-build-130.zip The software is configured to work with our DEMO KeyAppliance on the internet. The generated symmetric keys are sent there for storage and retrieval. Please DO NOT attempt to use the DEMO machine for PRODUCTION use - there are no guarantees around the availability of the DEMO appliance - it exists purely to showcase the capabilities of our products and to allow you to play with the SKCE to try it out. If and when you decide to use the SKCE and or SKCC in your production applications, you must either have your own KeyAppliances, or build your own key-management solution to use with the SKCE (we, obviously, hope that you'll buy our appliance and support us so we can bring more cool features to you in the appliance and the SKCE/SKCC). Download the binaries, source and give it a spin. Check out the wiki on this site for details on how to install the SKCE/SKCC. You can also test this application at https://fidodemo.strongauth.com/skcc to see how it works; if you have a FIDO U2F Token, check out the Settings tab. If you have questions, post them on the forum at this site and we'll get back to you as soon as possible. We're interested in your feedback. Thank you for your interest and support. StrongAuth, Inc.