What are protective mechanisms?
The primary goal of Password Safe is to ensure data security at all times. The authorization concept is naturally the most important component when it comes to granting users the intended level of permissions for accessing data. Specifically, this makes it possible to make certain information only available to selected employees. Nevertheless, it is still necessary to have protective mechanisms above and beyond the authorization concept in order to handle complex requirements.
- is not separately configured but is instead directly controlled via the authorization concept (read right). Nevertheless, it represents an important component within the existing protective mechanisms and is why a separate section has been dedicated to this subject.
- By configuring , it is possible to grant users or roles temporary access to data.
- enables access to the system without having to reveal the passwords of users. The value of the password remains constantly hidden.
- To link the release of highly sensitive access data to a double-check principle, it is possible to use “”:https://help.passwordsafe.de/v8/813/en/topic/siegel. The configuration of users or roles with the permissions to issue a release is possible down to a granular level and is always adaptable to individual requirements.
The following diagram shows a summary of how the existing protective mechanisms are integrated into the authorization concept.
In the interplay of the with the protective mechanisms, almost all conceivable scenarios can be depicted. It is worth mentioning again that the authorization concept is already a very effective tool, with limited visibility of passwords and data records. This concept is present everywhere in Password Safe, and will be explained in more detail below.
Visibility as a basic requirement
It should always be noted that visibility is always a basic requirement for applying further protective mechanisms. A record that is completely hidden from a user (= no read right) can naturally not be given any further protective mechanisms.
Combining multiple protective mechanisms
In principle, there are a diverse range of possibilities for combining the above-mentioned protective mechanisms. Temporary access to a “masked” record is possible just as having a “masked” record which is additionally secured by a double-check principle is also possible. Nevertheless, it should be noted that temporary permissions in combination with seals always pose a risk. If releasing a seal requires approval from a person who only possesses or possessed temporary permissions or will only possess them in future, this could naturally conflict with the configured release criteria.