Vault.

Get In Touch.

Contact us:

We Guarantee.

TRUST

security-2 1

SAFETY

hand 1

SERVICE

face-scan 1

IDENTITY

Protect Your Passwords.

Protect your password

What is Vault ?

HashiCorp Vault 0.1 technology is based on software for installation on workstations and enterprise servers. When done, a user can be created and logged in using a dedicated key and root token.

Once signed in, you can start building organizational secrets and determining who you want to participate in. From simple secrets like secure password storage, to creating a collection of identities that can be given to managed users.

For example, a developer who uses an application on Kubernetes under Google Cloud that connects to GitHub that connects to any database, e.g. in Microsoft AD, in order to replicate to AWS.

We help you to manage & secure your organization passwords.

Comda has developed a system that allows central management and security of access to all the “secrets” of the organization such as passwords for access to various systems, certificates, API keys and the like. The Vault provides a strong layer of protection and identification for various systems. With the Vault you can manage and configure, in a central and uniform interface, all the secrets required to access various systems such as databases, APIs for third parties and the like. In addition, you can configure who heads to access each secret so that Vault reveals to each user only the secrets he is allowed to have.
 All sensitive information of the organization is encrypted and protected by the Master key that is created when the Vault system is set up.

cyber security
Vault security for password
encryption data

Vault Interfaces .

The Vault can be operated using two different interfaces:
• Rest API – Any action supported by the Vault can be done using API request \ response. You can define for each user which API Method it is allowed to run.
• Portal – Reveals a convenient user interface for password management and additional operations.

Authentication Methods .

The Vault system supports various identification methods such as: Kerberos identification, Radius server, PKI and more. Each type of identification is translated and saved as Entity in Vault. For each Entity, a Policy can be defined for which secrets can be accessed, for example, which database a user may access and what actions he may perform.

Documentation of operations and faults-Audit.

The Vault system supports various identification methods such as: Kerberos identification, Radius server, PKI and more. Each type of identification is translated and saved as Entity in Vault. For each Entity, a Policy can be defined for which secrets can be accessed, for example, which database a user may access and what actions he may perform.

Vault Benefits.

Ability to convert type identification

The Vault allows identification of a particular system with a different identification type that the system allows.

Contact for a uniform interface that allows access to different services

Instead of saving different credentials for different services or systems, Vault appeals to the service / system session and returns the token / session id to the access applicant.

Centralized management of secrets

Changing the credentials for a particular system A to which N clients access does not require a change in N locations. The Vault credentials can be configured and managed in System A, centrally and sweep to all N clients.

Encrypt data in transit

Encryption keys can be generated and configured using policy who can encrypt and who can decrypt. Useful in cases of requesting information encryption from an app using the Rest API

Secret Storage

The Vault can store various secrets such as: environment variables, API keys, database credentials and more. This allows you to contact a vault uniform interface to access information instead of going to a number of different places such as plaintext files, databases, and the like. All secrets are kept encrypted.

The secrets are not revealed to the user

The user who applies to the Vault and requests access to a particular system does not know the credentials, for example, what is the password to access the system

Set up access for a limited time

Creating temporary users in the database, changing passwords in AD, creating certificates (X509) with a short life cycle.

Possibility of keeping sensitive secrets in HSM

The HSM Integration - Seal Wrap guide walked through the master key wrapping, automatic unsealing and seal wrapping functionalities provided by integrating Vault with HSM.

Encrypt secrets stored outside the Vault repository

The Vault is used, among other things, to encrypt and decrypt information. Applications can send a request to Vault to encrypt or decrypt information and store the encrypted / decrypted information in the same database with which they work.

Example of using Vault.

protect your password

• Strong Vault Identification with Signer-1: A user directly accesses via the Vault API and requests access to the Singer-1 underwriting system. The underwriting. In this way, information security is maintained because the user does not know his / her password to Signer-1. (By the same token, strong OTP identification can be performed so that the user does not know the seed).


• Conversion Identification Type – The Vault enables identification with the example Wesign system, which currently allows identification using only a username and password, using another identification type such as AD or OTP. The user can contact Vault through AD for example, and the Vault with which Credentials is stored for Wesign will create a token identification for wesign without revealing the password to it.

Our Solutions.

face-scan 1

Access control systems.

Comda offers solutions to protect and ensure the completeness of the organizational information by assimilating access control.

safe 1

Digital signing systems.

ComSignTrust is a subsidiary of Comda that supplies digital signing systems for enterprises and SMB’s.

pattern 1

Biometrics solutions.

Comda is the leading company in israel for biometrics services and products by well known brands.

lock 1

Vault & Encryption.

Secure your organization's sensitive data base and Store all enterprise passwords in one safty Vault that is secured at the highest technological level.

Contact us for more detail

We would love to do any project you choose with the highest quality at the highest security level

Get In Touch.

Leave us a message