LogoLogo
SupportDashboard
  • 👋Welcome to FenixPyre
  • Overview
    • 💡What we do
  • FenixPyre for Admins
    • Getting Started
      • Prerequisites Checklist
      • Creating a tenant for your Organization
      • Invite your team members
      • Create your Master Encryption Key
      • Setup SSO and automatic user provisioning
      • Create your first cloud integration
      • Setup User Policies
      • Install FenixPyre Windows Client in a machine
      • Firewall Whitelisting Requirements for FenixPyre Services
    • Admin Dashboard
      • Home
      • User Management
        • Invite your team members
        • Manage Guests
      • Groups Management
      • Installers
        • FenixPyre Windows Client
          • How to download FenixPyre Windows Agent from Installers Page
          • Auto Update and Upgrade Management of FenixPyre Windows Client
      • Reports
      • Integrations
        • SharePoint/OneDrive
          • Overview
          • How to enable FenixPyre integration in SharePoint
          • How to configure SharePoint Integration in Admin Dashboard
          • How to configure Auto Encrypted folders
        • Egnyte
        • Box
          • How to enable FenixPyre integration in Box
          • How to configure Box Integration in the Admin Dashboard
          • How to configure user policy (Protected folder)
      • Sharing Settings
      • Identity & Provisioning
        • Domain Management
          • Primary Domain
          • Guest Domain
        • SAML Single Sign-On (SSO) Setup
          • Set-up SAML SSO with Azure
            • Verify the SAML SSO
            • Sign-in to Admin Dashboard with Azure AD
            • Sign-in to SharePoint integration with Azure AD
          • Set-up SAML SSO with Okta
            • Adding users to Okta Application
            • How to verify SSO sign-in
            • Sign-in to SharePoint integration with Okta
        • Automatic Account Creation
        • SCIM
          • User Management with SCIM(SCIM events)
          • Set-up SCIM for Azure
            • How to provision a user
            • How to de-provision a user?
            • Known limitations
          • Set-up SCIM for OKTA
            • How to provision a user?
            • How to de-provision a user?
            • Known limitations
          • What happens when a user is de-provisioned?
          • Known Limitations
      • Key management
        • Master Encryption Keys
          • Create Master Encryption Key with FenixPyre
          • Setup Bring Your Own Master Encryption Key (BYOMEK) with Azure
            • Configure Azure Key Vault as Bring Your Own Key Provider
            • Create a Master Encryption Key and Store in Azure Key Vault
          • Setup Bring Your Own Master Encryption Key (BYOMEK) with Google HSM
            • Configure Google HSM as Bring Your Own Key Provider
            • Create a Master Encryption Key and Store in Google HSM
            • Import a master encryption key from Google HSM to FenixPyre
      • User Policies
        • Policy Rules Guide
      • User Applications
    • FenixPyre Windows Agent
      • Prerequisites for FenixPyre Windows Client Installation
      • How to download and install windows agent
      • How to install FenixPyre Windows Desktop Client
      • How to install FenixPyre Windows Desktop Client via command line or RMM
      • How to login to FenixPyre Windows Agent
    • Cloud Integrations
      • SharePoint/OneDrive
      • Box
      • On-Prem Secure Sharing Solution
        • Overview
  • FenixPyre For Users
    • SharePoint
      • Install and activate FenixPyre Chrome extension
      • How to encrypt files
      • How to open encrypted files
      • How to share and collaborate with a encrypted file
      • How to share and collaborate with a FenixPyre protected folder
      • How to decrypt files
      • How to view access logs for an encrypted file
      • How to clear browser cache for SharePoint
    • FenixPyre Sharing
      • How to encrypt files
      • How to open encrypted files
        • Supported File types for FenixPyre Sharing Open
      • How to share and collaborate with a encrypted file
      • How to share and collaborate with a FenixPyre protected folder
      • How to view access logs for an encrypted file
      • How to download a file
    • Windows Agent
      • How to login to FenixPyre Windows Agent
      • How to protect/un-protect folders with FenixPyre Windows Agent
      • How to encrypt a file using FenixPyre
      • How to open a file using FenixPyre
      • How to share a file using FenixPyre
      • How to un-install FenixPyre Windows Client
  • FenixPyre for Recipients
    • FenixPyre Sharing Guide
      • How to create new files from a FenixPyre shared link
      • How to request access for a link on FenixPyre
      • How to Create New Folders in a FenixPyre Shared Link
      • How to upload files to a FenixPyre shared link
      • How to download files from a FenixPyre shared link
      • How to co-edit a encrypted file from a FenixPyre shared link
      • How to open a FenixPyre encrypted file shared via SharePoint/OneDrive/Teams
  • FenixPyre Features
    • Offline mode
    • Compliance mode
  • FAQs / Trouble Shooting
    • How to collect FenixPyre agent logs
    • How to reload SharePoint Integration in FenixPyre
    • How to update SharePoint client Certificate
  • Release Notes
    • FenixPyre Windows Client Releases
      • Windows Agent v6.4.0
      • Windows Agent v6.3.0
      • Windows Agent v6.2.0
    • FenixPyre Cloud Releases
      • May 2025
      • March 2025
      • January 2025
  • References
    • Glossary
    • How to Guides
      • How to install WebView2 on your Windows Machine
      • How to enable TLS 1.2 on Windows for Agent Installation?
      • How to install Microsoft Visual C++ Redistributable (x64) 2019 or higher?
      • How to Whitelist FenixPyre's Windows Agent in your Antivirus/EDR/XDR?
      • How to zip and share FenixPyre windows client logs?
  • Group 1
    • Page 1
Powered by GitBook

© 2018-2025 FenixPyre Inc

On this page

Was this helpful?

  1. FenixPyre for Admins
  2. Admin Dashboard

Key management

Effective Key Management is essential for ensuring the security and integrity of your data within FenixPyre. FenixPyre utilizes a hierarchical encryption approach where files are encrypted using unique Encryption Keys, and these encryption keys are subsequently encrypted with Master Encryption Keys. The encrypted encryption keys are securely stored in the database, adding an extra layer of protection and simplifying key lifecycle management.

How It Works

  1. File Encryption:

    • When you upload a file to FenixPyre, it is encrypted using a unique Encryption Key. This ensures that each file has its own distinct layer of security.

  2. Encryption Key Protection:

    • Each Encryption Key is encrypted using a Master Encryption Key. This means that even if an encryption key is compromised, the master key adds an additional layer of security, safeguarding your data against unauthorized access.

  3. Secure Storage:

    • The encrypted encryption keys are stored in the database, ensuring they are protected and accessible only through authorized processes and personnel.

Key Components

  1. Master Encryption Keys

    • Function: Serve as the primary keys that encrypt and protect subordinate encryption keys.

    • Storage: Stored securely using Hardware Security Modules (HSMs) or integrated with cloud-based key management services such as Azure HSM and Google Cloud HSM.

  2. Encryption Keys

    • Function: Used to encrypt and decrypt individual files within FenixPyre.

    • Protection: Each encryption key is encrypted with a master encryption key before being stored in the database.

  3. Hardware Security Modules (HSMs)

    • Function: Provide a tamper-resistant environment for storing and managing cryptographic keys.

    • Integration: FenixPyre integrates with leading HSM providers like Azure HSM and Google Cloud HSM to ensure keys are stored securely and operations are performed within a protected hardware environment.

Importance of Key Management

  • Data Security: Ensures that both your files and the keys that encrypt them are protected against unauthorized access and breaches.

  • Compliance: Helps your organization adhere to regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS) by maintaining robust key management practices.

  • Operational Efficiency: Streamlines the encryption process, reducing the complexity and overhead associated with managing multiple keys.

Key Management in FenixPyre

FenixPyre offers a comprehensive key management solution that integrates seamlessly with leading Key Management Services (KMS) and Hardware Security Modules (HSMs).

PreviousKnown LimitationsNextMaster Encryption Keys

Last updated 4 months ago

Was this helpful?