Home
Name Modified Size InfoDownloads / Week
v2-Build169 2018-08-29
v2-Build163 2017-11-01
v2-Build152 2017-01-06
v2-Build124 2016-05-11
v2-Build120 2016-02-04
v2-Build77 2015-08-15
v2-Beta-Build73 2015-05-30
v2-Alpha-Build37 2014-11-08
v1,0-Build-6 2011-09-27
README-skce-v2.0-build-169.txt 2018-06-28 2.9 kB
Totals: 10 Items   2.9 kB 0
StrongKey CryptoEngine - from StrongAuth, Inc.
---------------------------------------------

This is the 2.0 release (Build 169) of the StrongKey CryptoEngine
(SKCE), a Java program that allows you to perform many cryptographic
functions without dealing with cryptographic primitives. 

Build-169 fixes some minor replication bugs for a clustered setup, 
and also updates the JDK to version 1.8 build 172.

The fidotutorial for netbeans and eclipse has not been updated, but will appear 
shortly in this folder.

Some useful capabilities of the SKCE are:

- As a FIDO Certified U2F Server to enable strong-authentication 
  to your web-applications using the FIDO U2F protocol with 
  hardware-based FIDO Authenticators (aka Tokens or Security Keys);
- To encrypt/decrypt files and store them in public/private 
  clouds while protecting keys in an on-premises, centralized
  key-management system (StrongAuth keyAppliance);
- To digitally sign documents or software-code using software-
  based or Hardware Security Module (HSM)-based keys;
- To determine authorization information about a user from LDAP
  grouups before decrypting files;
- To get FIDO U2F "authorization" from a user's hardware Token
  before decrypting files, for stronger security; and
- ....more.   

The SKCE currently works with AWS S3, Microsoft Azure and 
Eucalyptus Walrus for encrypted file-storage, in addition to
local NAS/SAN storage on your network.  

The SHA256 digests of the files are:

09de283791e28ac4b49ba1fea90257307f83fb27834f5d410c896b3ce06b1220  skce-src-v2.0-build-169.zip
1dd60c17bdcbbcf01e39430db815035b0f88d0d60efa87cc48312cb899277ce2  skce-v2.0-build-169.zip


The software is configured to work with our DEMO KeyAppliance on
the internet.  The generated symmetric keys are sent there for
storage and retrieval.  Please DO NOT attempt to use the DEMO
machine for PRODUCTION use - there are no guarantees around the
availability of the DEMO appliance - it exists purely to showcase
the capabilities of our products and to allow you to play with 
the SKCE to try it out.  If and when you decide to use the SKCE
in your production applications, you must buy your own 
KeyAppliances, or build your own key-management solution to
use with the SKCE (we, obviously, hope that you'll buy the 
KeyAppliance from us, so we can bring you newer features in
the appliance and the SKCE).

Download the binaries, source and give it a spin.  Check out the
wiki on this site for details on how to install the SKCE and how 
to FIDO-enable your web-applications for strong-authentication
using the SKCE.  

Use the FIDO Tutorial we've defined on https://fidodemo.strongauth.com
to learn how to FIDO-enable a simple JSP-based web-application in
a an hour or two.

If you have questions, post them on the forum at this site and 
we'll get back to you as soon as possible.  We're interested in 
your feedback.

Thank you for your interest and support.

StrongAuth, Inc.
Source: README-skce-v2.0-build-169.txt, updated 2018-06-28