Name | Modified | Size | Downloads / Week |
---|---|---|---|
v2-Build169 | 2018-08-29 | ||
v2-Build163 | 2017-11-01 | ||
v2-Build152 | 2017-01-06 | ||
v2-Build124 | 2016-05-11 | ||
v2-Build120 | 2016-02-04 | ||
v2-Build77 | 2015-08-15 | ||
v2-Beta-Build73 | 2015-05-30 | ||
v2-Alpha-Build37 | 2014-11-08 | ||
v1,0-Build-6 | 2011-09-27 | ||
README-skce-v2.0-build-169.txt | 2018-06-28 | 2.9 kB | |
Totals: 10 Items | 2.9 kB | 2 |
StrongKey CryptoEngine - from StrongAuth, Inc. --------------------------------------------- This is the 2.0 release (Build 169) of the StrongKey CryptoEngine (SKCE), a Java program that allows you to perform many cryptographic functions without dealing with cryptographic primitives. Build-169 fixes some minor replication bugs for a clustered setup, and also updates the JDK to version 1.8 build 172. The fidotutorial for netbeans and eclipse has not been updated, but will appear shortly in this folder. Some useful capabilities of the SKCE are: - As a FIDO Certified U2F Server to enable strong-authentication to your web-applications using the FIDO U2F protocol with hardware-based FIDO Authenticators (aka Tokens or Security Keys); - To encrypt/decrypt files and store them in public/private clouds while protecting keys in an on-premises, centralized key-management system (StrongAuth keyAppliance); - To digitally sign documents or software-code using software- based or Hardware Security Module (HSM)-based keys; - To determine authorization information about a user from LDAP grouups before decrypting files; - To get FIDO U2F "authorization" from a user's hardware Token before decrypting files, for stronger security; and - ....more. The SKCE currently works with AWS S3, Microsoft Azure and Eucalyptus Walrus for encrypted file-storage, in addition to local NAS/SAN storage on your network. The SHA256 digests of the files are: 09de283791e28ac4b49ba1fea90257307f83fb27834f5d410c896b3ce06b1220 skce-src-v2.0-build-169.zip 1dd60c17bdcbbcf01e39430db815035b0f88d0d60efa87cc48312cb899277ce2 skce-v2.0-build-169.zip The software is configured to work with our DEMO KeyAppliance on the internet. The generated symmetric keys are sent there for storage and retrieval. Please DO NOT attempt to use the DEMO machine for PRODUCTION use - there are no guarantees around the availability of the DEMO appliance - it exists purely to showcase the capabilities of our products and to allow you to play with the SKCE to try it out. If and when you decide to use the SKCE in your production applications, you must buy your own KeyAppliances, or build your own key-management solution to use with the SKCE (we, obviously, hope that you'll buy the KeyAppliance from us, so we can bring you newer features in the appliance and the SKCE). Download the binaries, source and give it a spin. Check out the wiki on this site for details on how to install the SKCE and how to FIDO-enable your web-applications for strong-authentication using the SKCE. Use the FIDO Tutorial we've defined on https://fidodemo.strongauth.com to learn how to FIDO-enable a simple JSP-based web-application in a an hour or two. If you have questions, post them on the forum at this site and we'll get back to you as soon as possible. We're interested in your feedback. Thank you for your interest and support. StrongAuth, Inc.