Encryption Keys Overview
The Encryption Keys Overview provides a summary of your organisation's Encryption Keys and Encryption Rules with which they are associated.
Features
- Add a new key button - create new Encryption Keys up to the allowed limit for your SmartEncrypt subscription plan.
- Download Keys - enables backup of keys in a preferred location for the restoration of encrypted files if required. For best practice, you should download a copy for your keys for backup & recovery purposes whenever you create a new encryption key.
- Encryption Key record including:
- Key name.
- Description.
-
Number of rules using the Encryption Key - hover over to quickly view details of associated Encryption Rules.
- The date the key was created.
- Primary Key identifier - denotes your organisation's default Encryption Key, which is automatically assigned to the Everybody group when the account is created.
- Action buttons;
- Edit button - access the edit view for the associated key.
- Delete button - deletes the key if the user has suitable permission.
- The number of available keys in use for the account.
Good to know...
1. Only system Administrators can delete Encryption Keys
2. The primary key cannot be deleted. It is required for users to be able to use ad-hoc encryption and the "Protect & Share" feature.
1. Only system Administrators can delete Encryption Keys
2. The primary key cannot be deleted. It is required for users to be able to use ad-hoc encryption and the "Protect & Share" feature.
Creating a new Encryption Key
Click the Add a new key button on the Encryption Keys Overview page and complete:
- The Key details:
- Encryption key name - user-friendly name for your key.
- Description (optional) - some information to describe the key's purpose.
- Key Assignment
- Users - if there are specific users who should have access to this key, select them here;
- Groups -
- Click the SAVE button to create the key.
Good to know...
For best practice, it is recommended that:
1. Encryption keys be assigned to groups in preference to individual users to limit the complexity of managing keys
2. You download a copy of your keys for backup and recovery purposes whenever you create a new encryption key.
For best practice, it is recommended that:
1. Encryption keys be assigned to groups in preference to individual users to limit the complexity of managing keys
2. You download a copy of your keys for backup and recovery purposes whenever you create a new encryption key.
Deleting Encryption Keys
NOTE:
- If you delete an encryption key it cannot be restored. Any files encrypted with the key will no longer be able to be decrypted.
- If you plan on deleting an encryption key, you should ensure you have:
1. Decrypted all files using that key prior to deleting the key where possible; AND
2. Downloaded a copy of the encryption keys for recovery of orphan files and files stored in backup if required.
- If you delete an encryption key it cannot be restored. Any files encrypted with the key will no longer be able to be decrypted.
- If you plan on deleting an encryption key, you should ensure you have:
1. Decrypted all files using that key prior to deleting the key where possible; AND
2. Downloaded a copy of the encryption keys for recovery of orphan files and files stored in backup if required.
To delete an Encryption Key,
- Click on the Delete button from the Action buttons next to the key you wish to delete.
-
At the prompt, type DELETE. (This helps prevent accidental deletion of keys).
- Click Delete
Good to know...
1. Only system Administrators can delete Encryption Keys
2. The primary key cannot be deleted. It is required for users to be able to use ad-hoc encryption and the "Protect & Share" feature.
1. Only system Administrators can delete Encryption Keys
2. The primary key cannot be deleted. It is required for users to be able to use ad-hoc encryption and the "Protect & Share" feature.
Comments
0 comments
Please sign in to leave a comment.