Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
SAKA30-ReleaseNotes.pdf | 2018-06-28 | 475.1 kB | |
skcc-v2.0-build-140.zip | 2018-06-28 | 16.4 MB | |
skcc-src-v2.0-build-140.zip | 2018-06-28 | 1.6 MB | |
FIDODemo-UserGuide.pdf | 2018-06-28 | 2.1 MB | |
README-skcc-v2.0-build-140.txt | 2018-06-28 | 3.1 kB | |
Totals: 5 Items | 20.6 MB | 0 |
StrongKey CryptoCabinet - from StrongAuth, Inc. ----------------------------------------------- This is the 2.0 release of the StrongKey CryptoCabinet (SKCC), a web-application that allows you to encrypt files and store them in public or private clouds. This build (140) makes minor changes to adapt to the modified FIDO U2F JavaScript 1.1 RD: https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-javascript-api.html What makes the SKCC special from other cloud-encryption software? - It stores files on AWS S3, Microsoft Azure or Eucalyptus Walrus based cloud-storage - you can choose which cloud at encrypt-time; - It uses the StrongKey CryptoEngine (sourceforge.net/projects/skce) to escrow keys in an on-premises, centralized key-management system (StrongAuth KeyAppliance); - It allows specifying who can decrypt the file(s) from LDAP groups - either Micorsoft AD or other LDAP Directories; - Since the encrypted-file's metadata contains authorization information for decryption, it digitally signs encrypted-file metadata to ensure the file hasn't been tampered with after encryption - the signing key can be on a FIPS 140-2 certified hardware security module, if desired, or a software-based JCEKS keystore; - It is FIDO U2F-enabled. You can register your FIDO U2F token with the application and use it strongly-authenticate to the web-app. It uses our open-source FIDO Certified U2F server (see URL above); - It can use FIDO U2F "authorization" from a user's hardware Token before decrypting files, for stronger security; and - ....more. The SHA256 digests of the files are: 70238b222435ee842e4d0358af57ddcdf813e596231d38ce2bcd5349bc0558e2 skcc-v2.0-build-140.zip a35bc0ea5447b135406b02e95e54aa2ed0cd1ddf646dec0ba610754315e19a67 skcc-src-v2.0-build-140.zip The software is configured to work with our DEMO KeyAppliance on the internet. The generated symmetric keys are sent there for storage and retrieval. Please DO NOT attempt to use the DEMO machine for PRODUCTION use - there are no guarantees around the availability of the DEMO appliance - it exists purely to showcase the capabilities of our products and to allow you to play with the SKCE to try it out. If and when you decide to use the SKCE and or SKCC in your production applications, you must either have your own KeyAppliances, or build your own key-management solution to use with the SKCE (we, obviously, hope that you'll buy our appliance and support us so we can bring more cool features to you in the appliance and the SKCE/SKCC). Download the binaries, source and give it a spin. Check out the wiki on this site for details on how to install the SKCE/SKCC. You can also test this application at https://fidodemo.strongauth.com/skcc to see how it works; if you have a FIDO U2F Token, check out the Settings tab. If you have questions, post them on the forum at this site and we'll get back to you as soon as possible. We're interested in your feedback. Thank you for your interest and support. StrongAuth, Inc.