Cypherdog Encryption Business
How the Business version differs from the Single User version
- management of user’s domains
- management of user’s private keys
- management of user(s)
- automatization of installation user’s App
- no e-mail aliases (user has only one e-mail)
- automated backup of private keys to Vault only (no user’s backup to any file)
- scalable command line text/file encryption/decryption
- cooperation with security systems on gateway
Components of the Business version
Admin Panel
- ability to add administrators
- ability to add allowed domains
- ability to add, remove, deactivate users
- setting the URL of a Proxy Server
- checking private keys integrity
- generating a configuration file for adding and configuring user accounts
- recovering private keys from Vault for accessing to encrypted employees’ content and files
Vault Server
- Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing
- ability to use any, but we recommend Hashi Corp
- Cypherdog uses Vault for storing private keys of users
- Vault Server is separated from the Internet, so Cypherdog uses Proxy Server
Proxy Server
- server application that acts as an intermediary between a client requesting a resource and the server providing that resource
- ability to create https connections between user applications, Admin Panel and Vault Server
- securing connections between components of the Cypherdog solution
CMD Service/Plugin
- backups the user's private key for restoration and monitoring purposes
- enables the use of the command line to enable batch processing
- enables monitoring of all encrypted outbound and inbound traffic on the gateway