<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
Protect your data now — and for the post-quantum era. Securosys CloudHSM supports PQC and hybrid cryptographic algorithms.

Start your Free Trial

About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

Challenge

Organizations operating in regulated environments or handling critical digital assets require strict multi-authorization workflows for cryptographic tasks such as code signing, document signing, blockchain transactions, and key management. Traditionally, this setup involves complex onboarding processes, limited mobility, and high operational overhead.

Securosys Authorization App - Visual module website

Solution

The Securosys Authorization App is a lightweight mobile application that enables stakeholders to securely approve cryptographic operations ─ such as signing, decryption, unwrapping and key modifications ─ directly from their smartphones.

The app integrates seamlessly with the Securosys Transaction Security Broker (TSB) and our Primus Hardware Security Modules, whether deployed on-premises or as CloudHSM. At its core is a powerful feature: Smart Key Attributes (SKA) keys, which enables true multi-authorization policies that are highly customizable. With SKA-based policies, users can authorize operations and transactions, manage key blocking/unblocking, adjust policy settings with ease, and even define security protocols triggered by time-lock settings.

The app streamlines approver onboarding through centralized certificate management and includes easy restore capabilities in case of phone loss or replacement ─ making it ideal for large, distributed teams.

 

Securosys Authorization App - Visual module website

Key Benefits

people-circle-blocks-b&w
Easy Onboarding and Fast Deployment
Simplified approver onboarding via TSB, using pre-registered names and certificates, allows for smooth implementation of multi-authorization schemes.
key-circle-people-b&w
Flexible Authorization Policies
Enforce fine-grained controls using Smart Key Attributes (SKA), enabling highly customizable multi-authorization policies for approving operations, authorizing transactions, and more.
key-hand-b&w
Mobile Convenience
Approve or reject requests anytime, anywhere, with secure key material stored within the HSM.
locket-2-b&w
Secure Recovery
Built with a secure and intuitive recovery process that ensures minimal disruption in case of device loss, damage, or other unforeseen issues.
locket-circle-blocks-b&w
Broad Range of Use Cases
Works with any application integrated with the TSB, such as Docker, HashiCorp Vault, and many others.
How does it work?

For a detailed description of the different roles, please refer to our documentation

Step 1
Create Approvers
The approver manager creates approvers, their certificates as well as credentials using the TSB.
Step 2
Initiate the Authorization App
The approver sets up the app by entering the credentials and other configuration data. The approver’s private key is securely injected into the app.
Step 3
Create SKA-Enabled Keys
The key manager creates a key on the HSM with a Smart Key Attribute policy referencing the approver certificates or names.
Step 4
Approve Cryptographic Requests
When a transaction is triggered, the SKA policy enforces the required approvals. Before the transaction proceeds, the SKA policy is checked, and all approvers receive notifications in the app to approve or reject the operation. The transaction only executes once all conditions are met.

Use Cases

colourful-background-patterns-14 Code Signing Protect CI/CD pipelines with quorum approval before signing builds or artifacts.
colourful-background-patterns-11 Document Signing Securely authorize sensitive documents with in-app PDF previews and approvals.
colourful-background-patterns-13 Blockchain Transactions Request multi-party approval for crypto transactions, asset transfers, or contract executions.
colourful-background-patterns-2 Database & File Decryption Enforce approval before unsealing sensitive datasets or backups.
colourful-background-patterns PKI Root Key Management Protect root and issuing CA operations by requiring trusted human approvals.
colourful-background-patterns-5 Key Lifecycle Control Approve key blocking/unblocking or policy changes to prevent unauthorized use or instantly react to fraud.