Tenancies
Tenancies are a centralised location for an organisation’s administrator(s) to perform activities that relate to user management, policy enforcement, usage reports and audit logging. Tenancies govern Hubs that are assigned to them, and an organisation can have one or many tenancies depending on their plan with DekkoSecure.
An organisation can have multiple tenancies if they have multiple requirements sets for governance. In effect, this means that varying policies can be applied for groups of Hubs (and users). For users that are part of multiple Tenancies, the strictest policy set is applied.
Hubs
Hubs are useful for segregating teams, projects, workflows or engagements in to seperate workspaces to mirror real-world business processes. Hubs function as a ‘whitelist’ so that content uploaded to a Hub can only be shared with Hub members, preventing misaddressing. Hubs are also where visibility control is assigned. Audit trails are able to be viewed per-Hub by Hub or tenancy admins.
Hubs belong to a Tenancy, and Tenancy polices apply to users in each Hub (i.e., 2FA enforcement).
Example uses for Hubs:
Law enforcement agency - warrants, reports, plans, suppliers, tenders
Defence prime - suppliers, subcontractors, clients
Health - clients, providers, hospitals, agencies
Example Hub and folder structure:
Restricting who in a Tenancy can create Hubs can be managed via a Tenancy policy.
User registration
Internal and external users are able to register quickly via an invite link that is originated from an existing user. The invite link leads to a short form which has the invitee’s email address pre-filled - the only info required is a name and account password.
This process automatically generates the user’s public and private encryption keys. Private keys are encrypted using the user’s password, which is hashed and salted before it is send to DekkoSecure’s servers. Automatic account provisioning is supported for clients w/ Azure AD SSO integration.
Admin access to files and folders
Files in DekkoSecure are owned by the users who upload them. This means that before sharing, they are only accessible to the owner. When they are shared, they are accessible to the owner and the recipient(s). This means that an IT administrator in the organisation who manages the platform cannot access information in that is shared, which is very important for protecting from internal leaks.