SAKA uses a hardware-based cryptographic module to protect all cryptographic keys generated and used within the appliance. SAKA uses either a Trusted Platform Module (TPM) or a Hardware Security Module (HSM). While there are many differences between these two types of devices, they deliver similar benefits for some functions. SAKA leverages those specific functions and can, thus, deliver identical cryptographic services regardless of the type of cryptographic hardware used in the appliance.
Keys used within SAKA are organized into hierarchies, as shown here:
Copyright (c) 2001-2024 StrongAuth, Inc. (dba StrongKey) All Rights Reserved