Hide private keys on the cloud assemblies

   Published: 21 Apr 2024

Read article: Benefits Of Using A NET Obfuscator Software Protection

Read article: .NET source code must be protected!

Certificate IV and Key Term Requirements

To implement this scenario successfully, the application's initialization vector (Certificate IV) and key term must be explicitly defined in the function signature.

This setup is commonly used for applications that require periodic access to keys from the Keys Depot. When a Private Keys Depot is created as part of a Skater Depot license, it is automatically linked to the license's Registration ID. Callers must register and authenticate using this Registration ID to access the Keys Depot.

Private Keys Depot Authentication

Applications can access Private Keys under two authentication models: examination principal or managed identity.

Features of Skater Private Keys Depot

* Centralized Storage: Data is securely stored in the cloud, eliminating the risk of data breaches on local devices or networks.
* Key Management: A robust key management system for tracking keys, documenting handovers, and auditing stored keys.
* Multi-User Collaboration: Multiple users can access and manage keys simultaneously.
* Offline Operation: No internet connection is required, ensuring data security even without network access.
* Scalability: Supports a large number of keys, streamlining key management and handover processes.
* Cross-Platform Compatibility: Manages locking systems from various software applications in a single view.
* Comprehensive Logging: Logs key transfers and handover receipts, providing detailed audit trails.
* Advanced Locking Features: Records locking functions of keys and locks based on a locking plan, enhancing security and accountability.