The Access Request System is how Successors gain permission to view the encrypted secrets stored in assets. This system implements multiple approval methods to balance security with accessibility during disaster recovery scenarios.
Submitting an access request with approval method selection
As a Successor on an asset, you cannot view the encrypted secret by default. When you need access (typically during an emergency), you must create an access request that gets approved through one of three methods:
Each method serves different security and urgency needs.
Access requests should only be made during legitimate scenarios, such as:
Always communicate with your team when requesting access, especially for high-security assets.
Best For: Most scenarios where manual approval is appropriate
How It Works:
Timeline: Depends on how quickly another guardian responds (no automatic timeout)
Who Can Approve:
Who Can Deny:
Creating a Standard Approval Request:
Best Practices:
Best For: Situations where you need guaranteed access within a specific timeframe, but want guardians to have veto power
How It Works:
Timeline Options:
Non-Business Hours Mode (default):
Business Hours Mode:
Who Can Deny:
Creating a Time-Delay Request:
Best Practices:
Important Notes:
Best For: High-security assets tied to a specific domain (like domain registrar credentials or SSL certificates)
How It Works:
Requirements:
DNS Record Details:
_keymanout-access-verification (or @ if your DNS provider requires)keymanout-access-token-abc123xyz)Creating a DNS Verification Request:
Best Practices:
Troubleshooting DNS Verification:
If verification fails:
_keymanout-access-verification.yourdomain.com, others need just _keymanout-access-verificationdig or online DNS lookup toolsExample DNS Configuration:
For domain example.com:
Record Type: TXT
Name: _keymanout-access-verification
Value: keymanout-access-token-abc123xyz
TTL: 3600
Verification query: dig TXT _keymanout-access-verification.example.com
A pending time-delay request showing the countdown timer
Actions Available:
Actions Available:
Actions Available:
Actions Available:
To see all your access requests across all assets:
To see all requests for a specific asset (if you're a Custodian or Successor):
When someone requests access to an asset where you're a guardian:
Approval Considerations:
Denial Considerations:
Gatekeepers can only deny time-delay requests (not approve or deny standard requests):
Your role is to provide security oversight - deny requests that seem suspicious, but don't block legitimate emergencies.
All access requests are logged with:
When you view an encrypted secret after approval:
Once approved (by any method), your access is permanent until:
There is no automatic revocation - the team must unseal to view secrets, but approved Successors don't need repeated approval.
Guardian System
Understand Key Man Out's three-tier guardian system with Custodians, Gatekeepers, and Successors. Learn how to manage asset-level permissions and access control.
Security Model
Understand Key Man Out's zero-knowledge security architecture, client-side encryption, sealed vault system, and best practices for protecting your sensitive assets.