HashiCorp Vault 0.1 technology is based on software for installation on workstations and enterprise servers. When done, a user can be created and logged in using a dedicated key and root token.
Once signed in, you can start building organizational secrets and determining who you want to participate in: From simple secrets like secure password storage, to creating a collection of identities that can be given to managed users.
For example, a developer who uses an application on Kubernetes under Google Cloud that connects to GitHub that connects to any database, e.g. in Microsoft AD, in order to replicate to AWS.
Dedicated plugins can be downloaded for access to all identity providers
Comda has developed a system that allows central management and security of access to all the “secrets” of the organization such as passwords for access to various systems, certificates, API keys and the like. The Vault provides a strong layer of protection and identification for various systems. With the Vault you can manage and configure, in a central and uniform interface, all the secrets required to access various systems such as databases, APIs for third parties and the like. In addition, you can configure who heads to access each secret so that Vault reveals to each user only the secrets he is allowed to have.
All sensitive information of the organization is encrypted and protected by the Master key that is created when the Vault system is set up.
The Vault can be operated using two different interfaces:
• Rest API – Any action supported by the Vault can be done using API request \ response. You can define for each user which API Method it is allowed to run.
• Portal – Reveals a convenient user interface for password management and additional operations.
The Vault system supports various identification methods such as: Kerberos identification, Radius server, PKI and more. Each type of identification is translated and saved as Entity in Vault. For each Entity, a Policy can be defined for which secrets can be accessed, for example, which database a user may access and what actions he may perform.
The system records to all logs all requests sent to it to perform such actions as: what user did authentication and what kind of identification, what secrets it accessed, what user changed password and etc. This information, along with the fault documentation, was written to SYSLOG and log files in various formats.
The Vault allows identification of a particular system with a different identification type of the identification that the system allows.
Instead of saving different credentials for different services or systems, Vault appeals to the service / system session and returns the token / session id to the access applicant.
Changing the credentials for a particular system A to which N clients access does not require a change in N locations. The Vault credentials can be configured and managed in System A, centrally and sweep to all N clients.
Encryption keys can be generated and configured using policy who can encrypt and who can decrypt. Useful in cases of requesting information encryption from an app using the Rest API
The Vault can store various secrets such as: environment variables, API keys, database credentials and more. This allows you to contact a vault uniform interface to access information instead of going to a number of different places such as plaintext files, databases, and the like. All secrets are kept encrypted.
The user who applies to Vault and requests access to a particular system does not know the credentials, for example, what is the password to access the system
Creating temporary users in the database, changing passwords in AD, creating certificates (X509) with a short life cycle.
Creating temporary users in the database, changing passwords in AD, creating certificates (X509) with a short life cycle.
The Vault is used, among other things, to encrypt and decrypt information. Applications can send a request to Vault to encrypt or decrypt information and store the encrypted / decrypted information in the same database with which they work.
• Strong Vault Identification with Signer-1: A user directly accesses via the Vault API and requests access to the Singer-1 underwriting system. The underwriting. In this way, information security is maintained because the user does not know his / her password to Signer-1. (By the same token, strong OTP identification can be performed so that the user does not know the seed).
• Conversion Identification Type – The Vault enables identification with the example Wesign system, which currently allows identification using only a username and password, using another identification type such as AD or OTP. The user can contact Vault through AD for example, and the Vault with which Credentials is stored for Wesign will create a token identification for wesign without revealing the password to it.
Comsign Encrypt enables organizations to easily protect sensitive data transmitted in any application, database or file. The system enables compliance with regulations – a unified solution for PCI, HIPAA, PII, etc. With the platform, organizations can protect their files without changes to the software code
Easy to implement and deploy
Comsign Encrypt is designed to seamlessly integrate into the existing enterprise infrastructure and involves only minor changes to the network that will hardly be noticed. Installation takes place within minutes and does not affect business processes. It provides an end-to-end encryption solution which can encrypt the below:
And any structured and unstructured data.