Access Request System

Learn how Successors request and gain access to protected assets using standard approval, time-delay, or DNS verification methods in Key Man Out.

Access Request System

The Access Request System is how Successors gain permission to view the encrypted secrets stored in assets. This system implements multiple approval methods to balance security with accessibility during disaster recovery scenarios.

Overview

Submitting an access request with approval method selection

As a Successor on an asset, you cannot view the encrypted secret by default. When you need access (typically during an emergency), you must create an access request that gets approved through one of three methods:

  1. Standard Approval - Another guardian manually approves your request
  2. Time-Delay - Auto-approved after a waiting period if no one denies it
  3. DNS Verification - Auto-approved by proving you control the domain

Each method serves different security and urgency needs.

When to Request Access

Access requests should only be made during legitimate scenarios, such as:

  • Emergency Access: The Custodian is unavailable and you need credentials immediately
  • Disaster Recovery: A critical system is down and you need access to restore it
  • Business Continuity: The Custodian has left the organization and you need to take over
  • Scheduled Transition: Planned handoff of responsibilities
  • Security Incident: Need to change compromised credentials

Always communicate with your team when requesting access, especially for high-security assets.

Access Request Methods

Method 1: Standard Approval

Best For: Most scenarios where manual approval is appropriate

How It Works:

  1. You submit an access request
  2. The Custodian and other Successors receive email notifications
  3. Any Custodian or Successor (who has already been approved) can approve your request
  4. Once approved, you can view the encrypted secret
  5. If denied, you must wait and can submit a new request later

Timeline: Depends on how quickly another guardian responds (no automatic timeout)

Who Can Approve:

  • The Custodian (always)
  • Any Successor who has previously received approved access

Who Can Deny:

  • The Custodian
  • Any Gatekeeper
  • Any Successor

Creating a Standard Approval Request:

  1. Navigate to the asset page
  2. Click "Request Access" button
  3. Select "Standard Approval"
  4. Optionally add a reason or explanation
  5. Click "Submit Request"

Best Practices:

  • Include a clear reason for your request
  • Contact guardians via other channels (phone, Slack) to expedite approval
  • Explain the urgency if it's time-sensitive

Method 2: Time-Delay

Best For: Situations where you need guaranteed access within a specific timeframe, but want guardians to have veto power

How It Works:

  1. You submit a time-delay access request
  2. A countdown timer starts (1 or 2 hours depending on business hours setting)
  3. All guardians are notified immediately via email
  4. During the delay period, any guardian can deny your request
  5. If no one denies it before the timer expires, your request is auto-approved
  6. Once approved, you can view the encrypted secret

Timeline Options:

Non-Business Hours Mode (default):

  • Simple 2-hour delay from submission time
  • Works 24/7, including weekends
  • Best for global teams or critical systems

Business Hours Mode:

  • 1-hour delay, but only counted during business hours (9 AM - 5 PM UTC, Monday-Friday)
  • If submitted outside business hours, timer starts at 9 AM the next business day
  • If timer would expire after 5 PM, remaining time carries over to next business day
  • Best for organizations with standard work schedules

Who Can Deny:

  • The Custodian
  • Any Gatekeeper
  • Any Successor

Creating a Time-Delay Request:

  1. Navigate to the asset page
  2. Click "Request Access" button
  3. Select "Time-Delayed Approval"
  4. Choose whether to use business hours only (checkbox)
  5. Optionally add a reason or explanation
  6. Click "Submit Request"
  7. Monitor the countdown timer on the asset page

Best Practices:

  • Use time-delay for predictable emergencies where you need assured access
  • Choose business hours mode if your team only monitors during work hours
  • Still communicate with your team - don't rely solely on the timer
  • Monitor your request status in case someone denies it

Important Notes:

  • You can only have one pending access request per asset at a time
  • If denied, you must wait and submit a new request
  • Auto-approval triggers send notifications to all guardians
  • Access granted via time-delay is permanent until revoked (no re-sealing required)

Method 3: DNS Verification

Best For: High-security assets tied to a specific domain (like domain registrar credentials or SSL certificates)

How It Works:

  1. You submit a DNS verification access request
  2. The system extracts the domain from the asset's website field
  3. You receive a unique TXT record value to add to your DNS zone
  4. You add the TXT record to your domain's DNS settings
  5. You click "Verify DNS" to check the record
  6. If the record is found, your request is auto-approved immediately
  7. Once approved, you can view the encrypted secret

Requirements:

  • The asset must have a website URL configured
  • You must have access to the domain's DNS settings
  • The domain must be publicly resolvable

DNS Record Details:

  • Record Type: TXT
  • Record Name: _keymanout-access-verification (or @ if your DNS provider requires)
  • Record Value: A unique token provided in the access request (e.g., keymanout-access-token-abc123xyz)
  • TTL: Any value (3600 recommended)

Creating a DNS Verification Request:

  1. Navigate to the asset page
  2. Click "Request Access" button
  3. Select "DNS Verification"
  4. Click "Submit Request"
  5. Copy the provided TXT record details
  6. Add the TXT record to your domain's DNS zone
  7. Wait for DNS propagation (can take 1-60 minutes)
  8. Click "Verify DNS" button
  9. If successful, access is granted immediately

Best Practices:

  • Only use for assets tied to domains you control
  • Document DNS access in your asset instructions
  • Test DNS verification ahead of time if possible
  • Remember DNS changes can take time to propagate
  • Remove the TXT record after verification (optional, for security)

Troubleshooting DNS Verification:

If verification fails:

  1. Wait longer: DNS propagation can take 5-60 minutes
  2. Check record name: Some providers need _keymanout-access-verification.yourdomain.com, others need just _keymanout-access-verification
  3. Verify TXT value: Copy-paste the exact token provided (case-sensitive)
  4. Use DNS tools: Check your TXT record with dig or online DNS lookup tools
  5. Check domain: Ensure the asset's website field has the correct domain

Example DNS Configuration:

For domain example.com:

Record Type: TXT
Name: _keymanout-access-verification
Value: keymanout-access-token-abc123xyz
TTL: 3600

Verification query: dig TXT _keymanout-access-verification.example.com

Request Lifecycle and Status

Status: Pending

A pending time-delay request showing the countdown timer

  • Request has been submitted and is awaiting resolution
  • For standard approval: waiting for someone to approve or deny
  • For time-delay: countdown timer is active, can still be denied
  • For DNS verification: waiting for you to add the TXT record and verify

Actions Available:

  • View request details
  • For time-delay: monitor countdown timer
  • For DNS verification: verify DNS record
  • Cancel request (not yet implemented - contact Custodian to deny)

Status: Approved

  • A Custodian or Successor manually approved your request
  • You now have permanent access to view the encrypted secret
  • Access remains until the Custodian revokes it or you're removed as a Successor
  • Custodian receives notification when you view the secret

Actions Available:

  • View the encrypted secret content
  • Download attached files

Status: Auto-Approved

  • Time-delay request expired without denial, OR
  • DNS verification succeeded
  • Functionally identical to "Approved" status
  • You now have permanent access to view the encrypted secret

Actions Available:

  • View the encrypted secret content
  • Download attached files

Status: Denied

  • A guardian explicitly denied your request
  • You cannot view the encrypted secret
  • The request includes a denial reason (if provided)
  • You can submit a new request after communicating with your team

Actions Available:

  • Submit a new access request
  • Contact guardians to understand why it was denied

Status: Expired

  • (Currently unused - requests don't auto-expire)
  • Reserved for future feature where requests may expire after a certain period

Viewing and Managing Your Requests

View All Your Requests

To see all your access requests across all assets:

  1. Navigate to your dashboard
  2. Look for "My Access Requests" section (or check your email notifications)
  3. Filter by status: Pending, Approved, Denied

View Asset-Specific Requests

To see all requests for a specific asset (if you're a Custodian or Successor):

  1. Navigate to the asset page
  2. Scroll to "Access Requests" section
  3. See all pending and historical requests
  4. Approve or deny requests if you have permission

Approving and Denying Requests

If You're a Custodian or Successor

When someone requests access to an asset where you're a guardian:

  1. You receive an email notification with request details
  2. Navigate to the asset page
  3. Review the request in the "Access Requests" section
  4. Click "Approve" or "Deny"
  5. Optionally provide a reason for your decision
  6. Submit your decision

Approval Considerations:

  • Is the requester's reason legitimate?
  • Have you communicated with the requester?
  • Is this an expected disaster recovery scenario?
  • Do company policies allow this access?

Denial Considerations:

  • Does the request seem suspicious or unauthorized?
  • Is there a better alternative (e.g., contacting the Custodian)?
  • Should you communicate with the requester first?

If You're a Gatekeeper

Gatekeepers can only deny time-delay requests (not approve or deny standard requests):

  1. You receive an email notification about a time-delay request
  2. Navigate to the asset page
  3. Review the request and countdown timer
  4. If it seems unauthorized, click "Deny"
  5. Provide a reason for the denial
  6. Submit your decision

Your role is to provide security oversight - deny requests that seem suspicious, but don't block legitimate emergencies.

Email Notifications

For Requesters

  • Request Created: Confirmation that your request was submitted
  • Request Approved: Someone approved your request manually
  • Request Auto-Approved: Time-delay expired or DNS verified
  • Request Denied: Someone denied your request (includes reason)

For Custodians

  • Request Created: A Successor submitted an access request
  • Request Approved: Another guardian approved a request
  • Request Auto-Approved: A time-delay request auto-approved
  • Request Denied: Someone denied a request
  • Secret Accessed: The requester viewed the encrypted secret

For Gatekeepers and Successors

  • Request Created: A Successor submitted an access request (for time-delay, gives you opportunity to deny)
  • Request Approved: A request was approved (for awareness)
  • Request Auto-Approved: A time-delay request auto-approved
  • Request Denied: A request was denied

Security Considerations

Access Request Logging

All access requests are logged with:

  • Requester identity
  • Timestamp
  • IP address
  • Geographic location (if available)
  • Request type and parameters
  • Resolution (approved/denied/auto-approved)
  • Who resolved it

Secret Access Logging

When you view an encrypted secret after approval:

  • Custodian receives an email notification
  • Access is logged with timestamp, IP, and location
  • Multiple accesses by the same person are all logged

Approved Access Duration

Once approved (by any method), your access is permanent until:

  • The Custodian removes you as a Successor
  • A Successor removal request is approved
  • The asset is deleted

There is no automatic revocation - the team must unseal to view secrets, but approved Successors don't need repeated approval.

Best Practices

For Successors

  1. Only Request When Truly Needed: Don't request access "just in case"
  2. Communicate First: Contact the Custodian or team before requesting
  3. Provide Context: Include a clear reason in your request
  4. Choose the Right Method: Standard for most cases, time-delay for predictable emergencies, DNS for domain-related assets
  5. Follow Up: If denied, understand why before requesting again

For Custodians

  1. Respond Quickly: Don't leave Successors waiting during emergencies
  2. Set Expectations: Document when access requests are appropriate
  3. Review Carefully: Balance security with team needs
  4. Monitor Access: Pay attention to secret access notifications
  5. Revoke When Needed: Remove Successors who no longer need access

For Gatekeepers

  1. Stay Alert: Monitor time-delay request notifications
  2. Ask Questions: Reach out to requesters if something seems off
  3. Don't Over-Block: Remember you're a safety net, not a barrier to legitimate access
  4. Respond Quickly: Time-delay windows are short (1-2 hours)

Troubleshooting

I submitted a request but no one is responding

  • Check if you used the right approval method (time-delay guarantees response)
  • Contact guardians via other channels (phone, email, Slack)
  • Verify guardians are still active team members
  • Consider using time-delay method for guaranteed access

My time-delay request was denied, but I need access

  • Communicate with the person who denied it to understand why
  • Provide more context about your need for access
  • Escalate to team leadership if necessary
  • Consider whether DNS verification is appropriate

DNS verification keeps failing

  • Wait longer (DNS can take 5-60 minutes to propagate)
  • Verify you added the TXT record to the correct domain
  • Check the record name format with your DNS provider
  • Use a DNS lookup tool to verify the record is visible
  • Ensure the asset's website field has the correct domain

I was approved but can't see the secret

  • Make sure the team is "unsealed" (you need the team key phrase)
  • Check that you're logged in as the correct user
  • Verify you're looking at the right asset
  • Try refreshing the page

Someone accessed my asset's secret but I didn't approve it

  • Check if they have auto-approved status from a previous time-delay or DNS request
  • Review the access log in the email notification for details
  • If unauthorized, remove the person as a Successor
  • Contact support if you suspect a security issue