Securosys Authorization App
Challenge
Organizations operating in regulated environments or handling critical digital assets require strict multi-authorization workflows for cryptographic tasks such as code signing, document signing, blockchain transactions, and key management. Traditionally, this setup involves complex onboarding processes, limited mobility, and high operational overhead.
Solution
The Securosys Authorization App is a lightweight mobile application that enables stakeholders to securely approve cryptographic operations ─ such as signing, decryption, unwrapping and key modifications ─ directly from their smartphones.
The app integrates seamlessly with the Securosys Transaction Security Broker (TSB) and our Primus Hardware Security Modules, whether deployed on-premises or as CloudHSM. At its core is a powerful feature: Smart Key Attributes (SKA) keys, which enables true multi-authorization policies that are highly customizable. With SKA-based policies, users can authorize operations and transactions, manage key blocking/unblocking, adjust policy settings with ease, and even define security protocols triggered by time-lock settings.
The app streamlines approver onboarding through centralized certificate management and includes easy restore capabilities in case of phone loss or replacement ─ making it ideal for large, distributed teams.
Key Benefits
For a detailed description of the different roles, please refer to our documentation
Use Cases
Code Signing
Protect CI/CD pipelines with quorum approval before signing builds or artifacts.
Document Signing
Securely authorize sensitive documents with in-app PDF previews and approvals.
Blockchain Transactions
Request multi-party approval for crypto transactions, asset transfers, or contract executions.
Database & File Decryption
Enforce approval before unsealing sensitive datasets or backups.
PKI Root Key Management
Protect root and issuing CA operations by requiring trusted human approvals.
Key Lifecycle Control
Approve key blocking/unblocking or policy changes to prevent unauthorized use or instantly react to fraud.
