Keyfactor Command Security Design Considerations

As you create your security design, be sure to cover the following:

  • Determine the list of users, groups, and other entities who will have access to Keyfactor Command. Access in Keyfactor Command is based on identity provider users and groups or roles (see Identity Providers). These will be used to create Security Claims in Keyfactor Command to which Security Roles will be assigned.

    Note:   If you require only one layer of security (all users will have full access) you may wish to simply use the Administrator role that was created during installation (see Administrative Users Tab).
    Note:  When defining the users and groups you will use to form claims, consider whether you will have a one-to-one or one-to many relationship between Claims and Roles.
  • Define the naming convention for Security Roles. Menu access and certificate security will be assigned to Roles which in turn will be applied to Security Claims.
  • Determine the Keyfactor Command menu access and Keyfactor APIClosed An API is a set of functions to allow creation of applications. Keyfactor offers the Keyfactor API, which allows third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command. access as well as the level of functionality you want to apply to each Role using the permissions information found Security Role Permissions.
  • If you need a further level of control beyond Security Roles, consider Permission Sets. Permission sets are containers which allow you to organize roles and compartmentalize permissions. They can only be configured through the Keyfactor API (see Permission Sets).
  • Determine certificate security based on collections and certificate store permissions based on containers, if any. See below for more information.