The Fortanix Data Security Manager (DSM) allows you to manage, store, and use your keys and secrets. You can generate keys in Fortanix DSM or import your own keys. You can use these keys to perform cryptographic operations on your data that you can provide to Fortanix DSM using the REST APIs, the PKCS#11, KMIP, JCE, Microsoft CAPI, or Microsoft CNG providers, or the command-line client. All requests to Fortanix DSM are logged and may be reviewed and monitored using the Fortanix DSM web UI.
- What KMIP coverage do we provide?
- Can I use a proxy with Fortanix Self-Defending KMS?
- Does Fortanix Self-Defending KMS include a Web Application Firewall (WAF)? Should I configure a WAF with Self-Defending KMS?
- What is Intel Attestation Service (IAS) and why should I use IAS service?
- How does Self-Defending KMS compare with other KMS?
- Can I import keys into Self-Defending KMS?
- Where is encryption and decryption done if I use Self-Defending KMS?
- Can Fortanix employees access my keys?
- Where do my keys live if I use Fortanix Data Security Manager?
- How does Fortanix Data Security Manager work?